Papers

18th INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYPTOLOGY

ISCTURKEY 2025

ICT Main Conference Hall, 22-23 October 2025

Important Dates for Paper Submission
Paper submission deadline:         8 August 2025
Announcement date of accepted papers:   26 August 2025
Final version deadline: : 15 September 2025
Deadline for conference registration:    21 October 2025

ISCTURKIYE 2025: We hope to come together!

The aim of this conference is to bring together researchers and scientists from various sub-disciplines from the fields of information security and cryptology in Turkey. The scope of the conference is quite wide as it aims to bring together scientists from various sub-disciplines from the fields of information and cyber security. Information Security and Cryptography conferences are a forum where the main aspects and new trends in information security and cryptography are shared, discussed and critized at the highest level of national and international expertise in Turkey. October 22-23, 2025, researchers and practitioners working in the field of information security and cryptography are invited to participate and contribute to this conference. Papers submitted to the conference are reviewed. Accepted papers are requested to be present in person at the conference. They will then be sent for publication in IEEE Xplore, subject to meeting the scope and quality requirements of IEEE Xplore.

We invite researchers and practitioners working in the field of information security and cryptography to join us on October 22-23, 2025.

Paper Submission:
You must register and submit your papers via this link. Papers can have maximum 6 pages.

A fee of 150 $ Dollars will be charged for each paper and 110 $ Dollars for IEEE members.

Copyright:
Click to View Copyright.

Paper format:
The paper format must be prepared according to A4-size paper (NOT US Letter) format as presented in IEEE website (IEEE Manuscript Template for Conference Proceedings.)

Call for Papers
Conference topics are given below but not limited to:

Information Security
5G Security
Access Control
Authentication
Big Data Security and Privacy
Biometry Applications and Standards
Cloud Security / Privacy
Computer Forensics
Cyber Crime
Cyber Security
Database Security
Embedded Systems Security
Identity Management Systems
Information Laws and Regulations
IoT Security
Mobile Security
Network Security
Operating Systems Security
Secure Software
Security Protocols
Sensor Systems
Surveillance Systems
Threats, Vulnerabilities, and Risk Management
Wireless Security


Cryptology
Applications of Finite Fields
Applied Cryptography
Cryptographic Architectures and Applications
Cryptographic Attacks, Theory, Implementation and Countermeasures
Cryptographic Protocols
Error Correcting Codes
Finite Field Arithmetic
Homomorphic Encryption
Lightweight Cryptography
Post-Quantum Cryptography
Pseudorandom Number Generators
Quantum Computing for Cryptography
Quantum Cryptanalysis
Quantum Cryptography
Side Channel Attacks


Registration fee:
Fee is requested for participation with articles.