20th International Conference on
Applied Cryptography and Network Security

Instructions for Authors

Submissions must be done via the Easychair website at the following link: https://easychair.org/conferences/?conf=acns2022.

Considering the uncertain evolution of the COVID pandemic, the conference will very likely take place in hybrid mode: authors will have the option to present papers remotely so that they will not worry about any health risk or travel restriction for attending the conference.

Submitted papers must not substantially overlap with papers that have been published (other than preprint) or accepted for publication or that are simultaneously in submission to a journal, conference, or workshop with published proceedings. Information about submissions may be shared with program chairs of other conferences for that purpose.

ACNS encourages promising students to submit and present their best results at the conference. Any paper co-authored by at least one full-time student who will present the paper at the conference is eligible for the best student paper award, with a cash reward of Euro 1000 sponsored by Springer.

Submissions must be anonymous, with no author names, affiliations, acknowledgment, or obvious references. Each submission must begin with a title, short abstract, and a list of keywords. The introduction should summarise the contributions of the paper at a level appropriate for a non-specialist reader. All submissions must follow the regular LNCS format (accessible on the Springer LCNS author guidelines webpage) with a page limit of 20 pages (including references) for the central part (reviewers are not required to read beyond this limit) and 30 pages in total. Papers should be in PDF format. Papers rejected at the first round can be submitted at the second round (together with a response letter).

Submissions not meeting the submission guidelines risk rejection without consideration of their merits. It is strongly encouraged to prepare submissions in LaTeX.

Authors of accepted papers must guarantee that they will be presented at the conference and make a full version of their papers available online. Submissions may focus on the modelling, design, analysis (including security proofs and attacks), development (e.g. implementations), deployment (e.g. system integration), and maintenance (e.g. performance measurements, usability studies) of algorithms, protocols, standards, implementations, technologies devices, systems standing in relation with applied cryptography, cyber security and privacy, while advancing or bringing new insights to the state of the art.

We will publish our proceedings with Springer as a volume of the Lecture Notes in Computer Science (LNCS) series.

Conflict of interest

We use the following definition on conflicts of Interest: The program co-chairs require cooperation from both authors and program committee members to prevent submissions from being evaluated by reviewers who have a conflict of interest. During the submission process, we will ask authors to identify members of the program committee with whom they share a conflict of interest.


This includes:

  • (1) Anyone who shares an institutional affiliation with an author at the time of submission,

  • (2) Anyone who was the advisor or advisee of an author at any time in the past,

  • (3) Anyone the author has collaborated or published with in the prior two years,

  • (4) Anyone who is serving as the sponsor or administrator of a grant that funds your research,

  • or (5) close personal friendships.

    For other forms of conflict, authors must contact the chairs and explain the perceived conflict. Program committee members who are in conflict of interest with a paper, including program co-chairs, will be excluded from evaluation and discussion of the paper by default.