CALL FOR PAPERS
Financial Cryptography and Data Security 2021
Twenty-Fifth International Conference
March 1–5, 2021
Radisson Grenada Beach Resort, Grenada
Financial Cryptography and Data Security is a major international
forum for research, advanced development, education, exploration, and
debate on information security with a specific focus on financial and
commercial systems. Original works on all aspects of financial
security and privacy are solicited, from fundamental theory to
real-world deployments. Submissions need not be exclusively concerned
with cryptography. Systems security, economic or behavioral
perspectives and interdisciplinary efforts are particularly
encouraged.
Since 2019, Financial Cryptography merged with the BITCOIN workshop to
incorporate both traditional financial security topics as well as
blockchains and cryptocurrencies.
Topics of particular interest are listed below:
Access Control, Authorization, and Trust Management
Anonymity and Privacy Enhancing Technologies
Applied Cryptography
Attacks, attack techniques, and attack case studies
Auctions and Incentive Design
Authentication, Identity Management, and Biometrics
Behavioral Aspects of Security and Privacy
Blockchain Applications
Blockchain protocols, including PoW, -stake, -burn, permissioned/permissionless
Censorship circumvention and resistance
Certification and Audits
Cloud Computing and Data Outsourcing Security
Data Security and Privacy
Digital Cash and Payment Systems
Distributed Consensus Protocols
Digital Rights Management
Economics of Security and Privacy
Economic and Monetary Aspects of Cryptocurrencies
Electronic Crime and Underground Markets
Electronic Payments and Ticketing Systems
Empirical studies, Real-world Measurements, and Metrics
Forensics, Monitoring, and Transaction Graph Analysis
Fraud Detection and Management
Game Theory for Security, Privacy, and Blockchain
Language-based security and formal verification
Machine Learning and AI Security
Malware and Software Security
Mobile Payments
Network and distributed system security
Legal and Regulatory Issues of Blockchains, Cryptocurrencies, and
Electronic Payments
Peer-to-Peer Networks
Phishing and Social Engineering
Reputation Systems
Security of Banking, Financial Services, and Electronic Commerce
Smart Contracts and Financial Instruments
Smartcards, Secure Tokens, and Secure Hardware
Surveillance and Tracking
System security
Trusted Execution Environments (TEE) Security and Applications
Usability and Security
Web Security
IMPORTANT DATES
Paper registration: September 17, 2020 (firm!)
Paper submission: September 24, 2020 (firm!)
Paper notification: December 3, 2020
Workshop proposal submission: September 15, 2020 (for full
consideration; later submissions considered on rolling basis)
Workshop proposal notification: September 30, 2020 (on-time submissions)
Poster and panel submission: December 8, 2020
Poster and panel notification: December 22, 2020
Final pre-proceeding papers: February 1, 2021
Conference: March 1–5, 2021
Submissions are accepted until 11:59 pm, AoE UTC-12.
SUBMISSION
Submissions are sought in the following categories:
(i) regular papers (15 pages LNCS format excluding references and appendices),
(ii) short papers (8 pages LNCS format in total),
(iii) systematization of knowledge papers (20 pages LNCS format
excluding references and appendices),
(iv) panel and workshop proposals (2 pages), and
(v) posters (1 page).
Papers must be formatted in standard LNCS format and submitted as PDF
files. Submissions in other formats will be rejected. All papers must
be submitted electronically according to the instructions and forms
found here and at the submission site. For each accepted paper/poster
the conference requires at least one registration at the general or
academic rate and paper authors must sign the IFCA copyright form
when submitting the final version. Alternatively, individual papers
can be published as fully open access—the publisher charges authors a
fee for this (currently EUR 38 per page).
Original submissions: Authors may submit only work that does not
substantially overlap with work that is currently submitted or has
been accepted for publication to any other peer-reviewed
conference/workshop with proceedings or a journal. We consider double
submission of serious research fraud and will treat it as such. Note that
it is acceptable for papers to appear in non-peer-reviewed formats
(for example, as technical reports or in online archives such as
ePrint). In case of doubt contact the program chairs for any
clarifications at fc21chair@ifca.ai.
Research paper submission: Paper submissions should be uploaded
through the conference submission website, where authors should also
report any conflicts with program committee members. A conflict exists
if an author has the same affiliation as a committee member, has ever
acted as their Ph.D. supervisor or been supervised by them, or if they
have been co-authors on a paper within the past two years.
Anonymous submission: Regular and short research paper submissions
must be anonymized with no author names, affiliations,
acknowledgments, or obvious references. Failure to properly anonymize
submitted papers are grounds for a desk rejection without review. It is
acceptable (but by no means required) for submitted papers to be
published online in a non-anonymous form (e.g., on authors’ websites or
archives like ePrint or arXiv.org). Program committee members will be
instructed not to actively seek to de-anonymize papers.
Panel, poster, and workshop submission: Poster submissions and
workshop/panel proposals should be sent by email to fc21chair@ifca.ai
and should not be anonymized.
Re-submission to affiliated workshops: Papers that are submitted but
ultimately not accepted to the main conference may be considered for
acceptance at one of the associated workshops. If you would like to
take advantage of this, please indicate this preference when
submitting your paper.
REGULAR RESEARCH PAPERS
Research papers should describe a novel, previously unpublished
scientific contributions to the field and they will be subject to
rigorous peer review. Accepted submissions will be included in the
conference proceedings to be published in the Springer-Verlag Lecture
Notes in Computer Science (LNCS) series. Submissions are limited to 15
pages in standard LNCS format excluding references and appendices. A
total page restriction may apply for the printed proceedings version.
Committee members are not required to read the appendices, so the full
papers should be intelligible without them.
SHORT PAPERS
Short papers are also subject to peer review; however, the intention
is to encourage authors to introduce work in progress, novel
applications, and corporate/industrial experiences. Short papers will
be evaluated with a focus on novelty and potential for sparking
participants’ interests and future research avenues. Short paper
submissions are limited to 8 pages in standard LNCS format in total.
The paper title for short papers must include the text “Short Paper:”.
Accepted submissions will be included in the conference proceedings.
The authors of some submissions not accepted as regular research
papers may be offered the option of acceptance as a short paper.
SYSTEMATIZATION OF KNOWLEDGE PAPERS
We also solicit the Systematization of Knowledge (SoK) papers. To be
suitable for publication, SoK articles must provide an added value
beyond a literature review, such as novel insights, identification of
research gaps, or challenges to commonly held assumptions. SoK paper
submissions are limited to 20 pages in standard LNCS format excluding
references and appendices. Accepted submissions will be included in
the conference proceedings. A total page restriction may apply for the
printed proceedings version. Committee members are not required to
read the appendices, so the full papers should be intelligible without
them. The paper title for systematization of knowledge papers must
include the text “SoK:”.
PANEL PROPOSALS
We especially would like to encourage submissions of panel proposals.
These should include a brief description of the panel topics, as well
as of the prospective panelists. Accepted panel sessions will be
presented at the conference. Please feel free to contact us directly
if you would like to further discuss the suitability of a certain
topic. Panel submissions must not be anonymous and should be up to 2
pages sent to fc21chair@ifca.ai.
POSTERS
The poster session is the perfect venue to share a provocative
opinion, interesting established or preliminary work, or a cool idea
that will spark discussion. Poster presenters will benefit from a
multi-hour session to discuss their work, get exposure and receive
feedback from attendees. Note that the poster session will only take
place if there is a physical event. Poster submissions should be a
1-page abstract (in the same LNCS format) describing the poster.
Please keep in mind that the poster deadline is later than the main
paper notification deadline. Poster proposals must not be anonymous
and should be sent to the posters chair at fc21chair@ifca.ai.
WORKSHOP PROPOSALS
Proposals for workshops to be held at FC21 are also solicited. A
workshop can be a full day or half day in length. Workshop proposals
should include: (i) a title; (ii) a call for papers; (iii) a brief
summary and justification, including how it would fit into the greater
FC scope; (iv) a (tentative) Program Committee and its Chair(s); (v)
one-paragraph biographies for key organizers; and (vi) the expected
(or previous, if the workshop has been held in previous years) number
of submissions, participants and acceptance rates. Workshop proposals
must not be anonymous and should be sent to fc21workshops@ifca.ai.
Proposals received after the submission deadline will be considered on
a rolling basis for any remaining slots.
THE RUMP SESSION
FC21 will also include the popular “rump session” held on one of the
evenings in an informal, social atmosphere. The rump session is a
program of short (5 minutes), informal presentations on works in
progress, off-the-cuff ideas, and any other matters pertinent to the
conference. Any conference attendee is welcome to submit a
presentation to the Rump Session Chair (to be announced at the
conference). This submission should consist of a talk title, the name
of the presenter, and, if desired, a very brief abstract. Submissions
may be sent via e-mail or submitted in person in the morning on the
day of the session.
STUDENT STIPENDS
IFCA is seeking funding to continue its program of financial support
specifically for students attending FC, and students are encouraged to
submit work in anticipation that funding will be found. Previous
grants prioritized students presenting at the conference or associated
workshops and students fresh to the field, but all students are
encouraged to apply. If you are interested in applying for stipend
support, please email the FC21 general chairs at fc21general@ifca.ai
with subject line “student stipend” and a letter of support from your
thesis supervisor or home institution confirming your student status
and stating that a stipend would help make it possible for you to
attend the conference.
COVID-19 INFORMATION
Due to the ongoing global pandemic, depending on the developing
circumstances, it is possible that a physical meeting for FC21 will
not take place. Even if it does, we expect that some authors may have
difficulty traveling to the conference and we will make accommodations
for remote presentations.
Program Chairs
Nikita Borisov, University of Illinois at Urbana-Champaign
Claudia Diaz, KU Leuven
Program Committee
Ittai Abraham, VMware Research
Gunes Acar, KU Leuven
Shashank Agrawal, Western Digital Research
Ross Anderson, University of Cambridge
Elli Androulaki, IBM Research – Europe
Diego F. Aranha, Aarhus University
Man Ho Au, The University of Hong Kong
Zeta Avarikioti, ETH Zurich
Erman Ayday, Case Western Reserve University, Bilkent University
Foteini Baldimtsi, George Mason University
Shehar Bano, Facebook
Iddo Bentov, Cornell Tech
Bobby Bhattacharjee, University of Maryland
Alex Biryukov, University of Luxembourg
Dan Boneh, Stanford University
Joseph Bonneau, New York University
Karima Boudaoud, Université Côte d’Azur
Ioana Boureanu, University of Surrey, Surrey Centre for Cyber Security (SCCS)
Xavier Boyen, Queensland University of Technology
Jeffrey Burdges, Web 3 Foundation
Rainer Böhme, University of Innsbruck
Benedikt Bünz, Stanford University
Christian Cachin, University of Bern
L Jean Camp, Indiana University
Srdjan Capkun, ETH Zurich
Pern Hui Chia, Google
Tom Chothia, University of Birmingham
Jeremy Clark, Concordia University
Shaanan Cohney, Princeton University / University of Melbourne
George Danezis, University College London / Novi
Sanchari Das, University of Denver
Vanesa Daza, Pompeu Fabra University
Jean Paul Degabriele, TU Darmstadt
Matteo Dell’Amico
Sven Dietrich, City University of New York
Benjamin Edwards, Cyentia Institute
Tariq Elahi, University of Edinburgh
Kaoutar Elkhiyaoui, IBM Research
William Enck, North Carolina State University
Zekeriya Erkin, Delft University of Technology
Ittay Eyal, Technion
Antonio Faonio, IMDEA Software Institute
Dario Fiore, IMDEA Software Institute
Ben Fisch, Stanford University
Simone Fischer-Hübner, Karlstad University
Juan Garay, Texas A&M University
Christina Garman, Purdue University
Arthur Gervais, Imperial College London
Esha Ghosh, Microsoft Research
Thomas Gross, University of Newcastle
Jens Grossklags, Technical University of Munich
Feng Hao, University of Warwick
Ethan Heilman, Boston University
Urs Hengartner, University of Waterloo
Ryan Henry, University of Calgary
Jordi Herrera-Joancomartí, Universitat Autònoma de Barcelona
Jaap-Henk Hoepman, Radboud University / University of Groningen
Nicholas Hopper, University of Minnesota
Kévin Huguenin, University of Lausanne (UNIL)
Stephanie Hurder, Prysm Group
Alice Hutchings, University of Cambridge
Marc Juarez, University of Southern California
Sreeram Kannan, University of Washington Seattle
Gabriel Kaptchuk, Boston University
Ghassan Karame, NEC Laboratories Europe
Aniket Kate, Purdue University
Stefan Katzenbeisser, University of Passau
Hassan Khan, University of Guelph
Aggelos Kiayias, University of Edinburgh & IOHK
Katharina Kohls, Ruhr University Bochum
Markulf Kohlweiss, University of Edinburgh & IOHK
Johannes Krupp, CISPA Helmholtz Center for Information Security
Albert Kwon, Badge Biometrics
Aron Laszka, University of Houston
Kirill Levchenko, University of Illinois
Jiasun Li, George Mason University
Benjamin Livshits, Brave Software / Imperial College London
Wouter Lueks, EPFL
Xiapu Luo, The Hong Kong Polytechnic University
Loi Luu, Kyber Network
Travis Mayberry, US Naval Academy
Patrick McCorry, anydot
Catherine Meadows, US Naval Research Laboratory
Sarah Meiklejohn, University College London
Andrew Miller, University of Illinois at Urbana-Champaign
Pedro Moreno-Sanchez, IMDEA Software Institute
Steven Murdoch, University College London
Neha Narula, MIT Media Lab
Kartik Nayak, Duke University
Russell O’Connor, Blockstream
Satoshi Obana, Hosei University
Simon Oya, University of Waterloo
Giorgos Panagiotakos, University of Athens
Olivier Pereira, UCLouvain
Andrew Poelstra, Blockstream
Bart Preneel, COSIC, KU Leuven
Cristina Pérez-Solà, Universitat Oberta de Catalunya (UOC)
Elizabeth Quaglia, Royal Holloway, University of London
Joel Reardon, University of Calgary
Ling Ren, University of Illinois Urbana-Champaign
Alfredo Rial, University of Luxembourg
Stefanie Roos, TU Delft
Burton Rosenberg, University of Miami
Ahmad-Reza Sadeghi, TU Darmstadt
Reihaneh Safavi-Naini, University of Calgary
Alessandra Scafuro, NCSU
Nolen Scaife, University of Colorado Boulder
Jean-Pierre Seifert, TU Berlin
abhi shelat, Northeastern University
Jared M. Smith, Oak Ridge National Laboratory
Yonatan Sompolinsky, The Hebrew University of Jerusalem
Kyle Soska, Carnegie Mellon University
Douglas Stebila, University of Waterloo
Koutarou Suzuki, Toyohashi University of Technology
Vanessa Teague, University of Melbourne
Alin Tomescu, VMware Research
Luke Valenta, Cloudflare Research
Aad van Moorsel, Newcastle University
Marie Vasek, University College London
Pramod Viswanath, University of Illinois at Urbana-Champaign
Artemij Voskobojnikov, University of British Columbia
Marko Vukolić, IBM Research – Zurich
Riad S. Wahby, Stanford University
Nicholas Weaver, International Computer Science Institute
Edgar Weippl, University of Vienna, SBA Research
Philipp Winter, The Tor Project
Jiangshan Yu, Monash University
Fan Zhang, Chainlink and Duke University
Ren Zhang, Nervos
Dionysis Zindros, University of Athens
Aviv Zohar, The Hebrew University of Jerusalem
This conference is organized annually by the International Financial
Cryptography Association.