Call for Papers: Financial Cryptography and Data Security (FC’21), submit by Sep 24

September 6, 2020



Financial Cryptography and Data Security 2021

Twenty-Fifth International Conference

March 1–5, 2021

Radisson Grenada Beach Resort, Grenada



Financial Cryptography and Data Security is a major international

forum for research, advanced development, education, exploration, and

debate on information security with a specific focus on financial and

commercial systems. Original works on all aspects of financial

security and privacy are solicited, from fundamental theory to

real-world deployments. Submissions need not be exclusively concerned

with cryptography. Systems security, economic or behavioral

perspectives and interdisciplinary efforts are particularly


Since 2019, Financial Cryptography merged with the BITCOIN workshop to

incorporate both traditional financial security topics as well as

blockchains and cryptocurrencies.

Topics of particular interest are listed below:

Access Control, Authorization, and Trust Management

Anonymity and Privacy Enhancing Technologies

Applied Cryptography

Attacks, attack techniques, and attack case studies

Auctions and Incentive Design

Authentication, Identity Management, and Biometrics

Behavioral Aspects of Security and Privacy

Blockchain Applications

Blockchain protocols, including PoW, -stake, -burn, permissioned/permissionless

Censorship circumvention and resistance

Certification and Audits

Cloud Computing and Data Outsourcing Security

Data Security and Privacy

Digital Cash and Payment Systems

Distributed Consensus Protocols

Digital Rights Management

Economics of Security and Privacy

Economic and Monetary Aspects of Cryptocurrencies

Electronic Crime and Underground Markets

Electronic Payments and Ticketing Systems

Empirical studies, Real-world Measurements, and Metrics

Forensics, Monitoring, and Transaction Graph Analysis

Fraud Detection and Management

Game Theory for Security, Privacy, and Blockchain

Language-based security and formal verification

Machine Learning and AI Security

Malware and Software Security

Mobile Payments

Network and distributed system security

Legal and Regulatory Issues of Blockchains, Cryptocurrencies, and

Electronic Payments

Peer-to-Peer Networks

Phishing and Social Engineering

Reputation Systems

Security of Banking, Financial Services, and Electronic Commerce

Smart Contracts and Financial Instruments

Smartcards, Secure Tokens, and Secure Hardware

Surveillance and Tracking

System security

Trusted Execution Environments (TEE) Security and Applications

Usability and Security

Web Security


Paper registration: September 17, 2020 (firm!)

Paper submission: September 24, 2020 (firm!)

Paper notification: December 3, 2020

Workshop proposal submission: September 15, 2020 (for full

consideration; later submissions considered on rolling basis)

Workshop proposal notification: September 30, 2020 (on-time submissions)

Poster and panel submission: December 8, 2020

Poster and panel notification: December 22, 2020

Final pre-proceeding papers: February 1, 2021

Conference: March 1–5, 2021

Submissions are accepted until 11:59 pm, AoE UTC-12.


Submissions are sought in the following categories:

(i) regular papers (15 pages LNCS format excluding references and appendices),

(ii) short papers (8 pages LNCS format in total),

(iii) systematization of knowledge papers (20 pages LNCS format

excluding references and appendices),

(iv) panel and workshop proposals (2 pages), and

(v) posters (1 page).

Papers must be formatted in standard LNCS format and submitted as PDF

files. Submissions in other formats will be rejected. All papers must

be submitted electronically according to the instructions and forms

found here and at the submission site. For each accepted paper/poster

the conference requires at least one registration at the general or

academic rate and paper authors must sign the IFCA copyright form

when submitting the final version. Alternatively, individual papers

can be published as fully open access—the publisher charges authors a

fee for this (currently EUR 38 per page).

Original submissions: Authors may submit only work that does not

substantially overlap with work that is currently submitted or has

been accepted for publication to any other peer-reviewed

conference/workshop with proceedings or a journal. We consider double

submission of serious research fraud and will treat it as such. Note that

it is acceptable for papers to appear in non-peer-reviewed formats

(for example, as technical reports or in online archives such as

ePrint). In case of doubt contact the program chairs for any

clarifications at

Research paper submission: Paper submissions should be uploaded

through the conference submission website, where authors should also

report any conflicts with program committee members. A conflict exists

if an author has the same affiliation as a committee member, has ever

acted as their Ph.D. supervisor or been supervised by them, or if they

have been co-authors on a paper within the past two years.

Anonymous submission: Regular and short research paper submissions

must be anonymized with no author names, affiliations,

acknowledgments, or obvious references. Failure to properly anonymize

submitted papers are grounds for a desk rejection without review. It is

acceptable (but by no means required) for submitted papers to be

published online in a non-anonymous form (e.g., on authors’ websites or

archives like ePrint or Program committee members will be

instructed not to actively seek to de-anonymize papers.

Panel, poster, and workshop submission: Poster submissions and

workshop/panel proposals should be sent by email to

and should not be anonymized.

Re-submission to affiliated workshops: Papers that are submitted but

ultimately not accepted to the main conference may be considered for

acceptance at one of the associated workshops. If you would like to

take advantage of this, please indicate this preference when

submitting your paper.


Research papers should describe a novel, previously unpublished

scientific contributions to the field and they will be subject to

rigorous peer review. Accepted submissions will be included in the

conference proceedings to be published in the Springer-Verlag Lecture

Notes in Computer Science (LNCS) series. Submissions are limited to 15

pages in standard LNCS format excluding references and appendices. A

total page restriction may apply for the printed proceedings version.

Committee members are not required to read the appendices, so the full

papers should be intelligible without them.


Short papers are also subject to peer review; however, the intention

is to encourage authors to introduce work in progress, novel

applications, and corporate/industrial experiences. Short papers will

be evaluated with a focus on novelty and potential for sparking

participants’ interests and future research avenues. Short paper

submissions are limited to 8 pages in standard LNCS format in total.

The paper title for short papers must include the text “Short Paper:”.

Accepted submissions will be included in the conference proceedings.

The authors of some submissions not accepted as regular research

papers may be offered the option of acceptance as a short paper.


We also solicit the Systematization of Knowledge (SoK) papers. To be

suitable for publication, SoK articles must provide an added value

beyond a literature review, such as novel insights, identification of

research gaps, or challenges to commonly held assumptions. SoK paper

submissions are limited to 20 pages in standard LNCS format excluding

references and appendices. Accepted submissions will be included in

the conference proceedings. A total page restriction may apply for the

printed proceedings version. Committee members are not required to

read the appendices, so the full papers should be intelligible without

them. The paper title for systematization of knowledge papers must

include the text “SoK:”.


We especially would like to encourage submissions of panel proposals.

These should include a brief description of the panel topics, as well

as of the prospective panelists. Accepted panel sessions will be

presented at the conference. Please feel free to contact us directly

if you would like to further discuss the suitability of a certain

topic. Panel submissions must not be anonymous and should be up to 2

pages sent to


The poster session is the perfect venue to share a provocative

opinion, interesting established or preliminary work, or a cool idea

that will spark discussion. Poster presenters will benefit from a

multi-hour session to discuss their work, get exposure and receive

feedback from attendees. Note that the poster session will only take

place if there is a physical event. Poster submissions should be a

1-page abstract (in the same LNCS format) describing the poster.

Please keep in mind that the poster deadline is later than the main

paper notification deadline. Poster proposals must not be anonymous

and should be sent to the posters chair at


Proposals for workshops to be held at FC21 are also solicited. A

workshop can be a full day or half day in length. Workshop proposals

should include: (i) a title; (ii) a call for papers; (iii) a brief

summary and justification, including how it would fit into the greater

FC scope; (iv) a (tentative) Program Committee and its Chair(s); (v)

one-paragraph biographies for key organizers; and (vi) the expected

(or previous, if the workshop has been held in previous years) number

of submissions, participants and acceptance rates. Workshop proposals

must not be anonymous and should be sent to

Proposals received after the submission deadline will be considered on

a rolling basis for any remaining slots.


FC21 will also include the popular “rump session” held on one of the

evenings in an informal, social atmosphere. The rump session is a

program of short (5 minutes), informal presentations on works in

progress, off-the-cuff ideas, and any other matters pertinent to the

conference. Any conference attendee is welcome to submit a

presentation to the Rump Session Chair (to be announced at the

conference). This submission should consist of a talk title, the name

of the presenter, and, if desired, a very brief abstract. Submissions

may be sent via e-mail or submitted in person in the morning on the

day of the session.


IFCA is seeking funding to continue its program of financial support

specifically for students attending FC, and students are encouraged to

submit work in anticipation that funding will be found. Previous

grants prioritized students presenting at the conference or associated

workshops and students fresh to the field, but all students are

encouraged to apply. If you are interested in applying for stipend

support, please email the FC21 general chairs at

with subject line “student stipend” and a letter of support from your

thesis supervisor or home institution confirming your student status

and stating that a stipend would help make it possible for you to

attend the conference.


Due to the ongoing global pandemic, depending on the developing

circumstances, it is possible that a physical meeting for FC21 will

not take place. Even if it does, we expect that some authors may have

difficulty traveling to the conference and we will make accommodations

for remote presentations.

Program Chairs

Nikita Borisov, University of Illinois at Urbana-Champaign

Claudia Diaz, KU Leuven

Program Committee

Ittai Abraham, VMware Research

Gunes Acar, KU Leuven

Shashank Agrawal, Western Digital Research

Ross Anderson, University of Cambridge

Elli Androulaki, IBM Research – Europe

Diego F. Aranha, Aarhus University

Man Ho Au, The University of Hong Kong

Zeta Avarikioti, ETH Zurich

Erman Ayday, Case Western Reserve University, Bilkent University

Foteini Baldimtsi, George Mason University

Shehar Bano, Facebook

Iddo Bentov, Cornell Tech

Bobby Bhattacharjee, University of Maryland

Alex Biryukov, University of Luxembourg

Dan Boneh, Stanford University

Joseph Bonneau, New York University

Karima Boudaoud, Université Côte d’Azur

Ioana Boureanu, University of Surrey, Surrey Centre for Cyber Security (SCCS)

Xavier Boyen, Queensland University of Technology

Jeffrey Burdges, Web 3 Foundation

Rainer Böhme, University of Innsbruck

Benedikt Bünz, Stanford University

Christian Cachin, University of Bern

L Jean Camp, Indiana University

Srdjan Capkun, ETH Zurich

Pern Hui Chia, Google

Tom Chothia, University of Birmingham

Jeremy Clark, Concordia University

Shaanan Cohney, Princeton University / University of Melbourne

George Danezis, University College London / Novi

Sanchari Das, University of Denver

Vanesa Daza, Pompeu Fabra University

Jean Paul Degabriele, TU Darmstadt

Matteo Dell’Amico

Sven Dietrich, City University of New York

Benjamin Edwards, Cyentia Institute

Tariq Elahi, University of Edinburgh

Kaoutar Elkhiyaoui, IBM Research

William Enck, North Carolina State University

Zekeriya Erkin, Delft University of Technology

Ittay Eyal, Technion

Antonio Faonio, IMDEA Software Institute

Dario Fiore, IMDEA Software Institute

Ben Fisch, Stanford University

Simone Fischer-Hübner, Karlstad University

Juan Garay, Texas A&M University

Christina Garman, Purdue University

Arthur Gervais, Imperial College London

Esha Ghosh, Microsoft Research

Thomas Gross, University of Newcastle

Jens Grossklags, Technical University of Munich

Feng Hao, University of Warwick

Ethan Heilman, Boston University

Urs Hengartner, University of Waterloo

Ryan Henry, University of Calgary

Jordi Herrera-Joancomartí, Universitat Autònoma de Barcelona

Jaap-Henk Hoepman, Radboud University / University of Groningen

Nicholas Hopper, University of Minnesota

Kévin Huguenin, University of Lausanne (UNIL)

Stephanie Hurder, Prysm Group

Alice Hutchings, University of Cambridge

Marc Juarez, University of Southern California

Sreeram Kannan, University of Washington Seattle

Gabriel Kaptchuk, Boston University

Ghassan Karame, NEC Laboratories Europe

Aniket Kate, Purdue University

Stefan Katzenbeisser, University of Passau

Hassan Khan, University of Guelph

Aggelos Kiayias, University of Edinburgh & IOHK

Katharina Kohls, Ruhr University Bochum

Markulf Kohlweiss, University of Edinburgh & IOHK

Johannes Krupp, CISPA Helmholtz Center for Information Security

Albert Kwon, Badge Biometrics

Aron Laszka, University of Houston

Kirill Levchenko, University of Illinois

Jiasun Li, George Mason University

Benjamin Livshits, Brave Software / Imperial College London

Wouter Lueks, EPFL

Xiapu Luo, The Hong Kong Polytechnic University

Loi Luu, Kyber Network

Travis Mayberry, US Naval Academy

Patrick McCorry, anydot

Catherine Meadows, US Naval Research Laboratory

Sarah Meiklejohn, University College London

Andrew Miller, University of Illinois at Urbana-Champaign

Pedro Moreno-Sanchez, IMDEA Software Institute

Steven Murdoch, University College London

Neha Narula, MIT Media Lab

Kartik Nayak, Duke University

Russell O’Connor, Blockstream

Satoshi Obana, Hosei University

Simon Oya, University of Waterloo

Giorgos Panagiotakos, University of Athens

Olivier Pereira, UCLouvain

Andrew Poelstra, Blockstream

Bart Preneel, COSIC, KU Leuven

Cristina Pérez-Solà, Universitat Oberta de Catalunya (UOC)

Elizabeth Quaglia, Royal Holloway, University of London

Joel Reardon, University of Calgary

Ling Ren, University of Illinois Urbana-Champaign

Alfredo Rial, University of Luxembourg

Stefanie Roos, TU Delft

Burton Rosenberg, University of Miami

Ahmad-Reza Sadeghi, TU Darmstadt

Reihaneh Safavi-Naini, University of Calgary

Alessandra Scafuro, NCSU

Nolen Scaife, University of Colorado Boulder

Jean-Pierre Seifert, TU Berlin

abhi shelat, Northeastern University

Jared M. Smith, Oak Ridge National Laboratory

Yonatan Sompolinsky, The Hebrew University of Jerusalem

Kyle Soska, Carnegie Mellon University

Douglas Stebila, University of Waterloo

Koutarou Suzuki, Toyohashi University of Technology

Vanessa Teague, University of Melbourne

Alin Tomescu, VMware Research

Luke Valenta, Cloudflare Research

Aad van Moorsel, Newcastle University

Marie Vasek, University College London

Pramod Viswanath, University of Illinois at Urbana-Champaign

Artemij Voskobojnikov, University of British Columbia

Marko Vukolić, IBM Research – Zurich

Riad S. Wahby, Stanford University

Nicholas Weaver, International Computer Science Institute

Edgar Weippl, University of Vienna, SBA Research

Philipp Winter, The Tor Project

Jiangshan Yu, Monash University

Fan Zhang, Chainlink and Duke University

Ren Zhang, Nervos

Dionysis Zindros, University of Athens

Aviv Zohar, The Hebrew University of Jerusalem

This conference is organized annually by the International Financial

Cryptography Association.