18th INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYPTOLOGY
ISCTURKEY 2025
ICT Main Conference Hall, 22-23 October 2025
Important Dates for Paper Submission
Paper submission deadline: 15 August 2025
Announcement date of accepted papers: 5 September 2025
Final version deadline: : 15 September 2025
Deadline for conference registration: 21 October 2025
ISCTURKIYE 2025: We hope to come together!
We invite researchers and practitioners working in the field of information security and cryptography to join us on October 22-23, 2025.
Paper Submission:
You must register and submit your papers via this link. Papers can have maximum 6 pages.
Academic Fee: 4,000 TL / 150 USD for each paper; 3,000 TL / 110 USD for IEEE members.
The word "Donation" will be written in the description section.
You can make the payment for your articles accepted by the Review Committee for the ISC Turkey 2025 Conference to the accounts mentioned below.
USD Transfers:
SWIFT Bank Code: ISBKTRIS
Account No: TR70 0006 4000 0024 2120 4264 54
Account Holder: Bilgi Guvenligi Dernegi
Account Holder Address: Mutlukent Mahallesi 1979. Cad. Binsesin Sitesi No: 15/3 Umitkoy - Cankaya/ANKARA
TRY Transfers:
Bank: İŞ BANKASI MALTEPE ŞUBESİ 4212
Account IBAN: TR45 0006 4000 0014 2120 9663 26
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.
Copyright:
Click to View Copyright.
Paper format:
The paper format must be prepared according to A4-size paper (NOT US Letter) format as presented in IEEE website (IEEE Manuscript Template for Conference Proceedings.)
Call for Papers
Conference topics are given below but not limited to:
ISCTURKEY 2025
ICT Main Conference Hall, 22-23 October 2025
Important Dates for Paper Submission
Paper submission deadline: 15 August 2025
Announcement date of accepted papers: 5 September 2025
Final version deadline: : 15 September 2025
Deadline for conference registration: 21 October 2025
ISCTURKIYE 2025: We hope to come together!
Accepted Articles (Click here for the list)
The aim of this conference is to bring together researchers and scientists from various sub-disciplines from the fields of information security and cryptology in Turkey. The scope of the conference is quite wide as it aims to bring together scientists from various sub-disciplines from the fields of information and cyber security. Information Security and Cryptography conferences are a forum where the main aspects and new trends in information security and cryptography are shared, discussed and critized at the highest level of national and international expertise in Turkey. October 22-23, 2025, researchers and practitioners working in the field of information security and cryptography are invited to participate and contribute to this conference. Papers submitted to the conference are reviewed. Accepted papers are requested to be present in person at the conference. They will then be sent for publication in IEEE Xplore, subject to meeting the scope and quality requirements of IEEE Xplore.We invite researchers and practitioners working in the field of information security and cryptography to join us on October 22-23, 2025.
Paper Submission:
You must register and submit your papers via this link. Papers can have maximum 6 pages.
Academic Fee: 4,000 TL / 150 USD for each paper; 3,000 TL / 110 USD for IEEE members.
The word "Donation" will be written in the description section.
You can make the payment for your articles accepted by the Review Committee for the ISC Turkey 2025 Conference to the accounts mentioned below.
USD Transfers:
SWIFT Bank Code: ISBKTRIS
Account No: TR70 0006 4000 0024 2120 4264 54
Account Holder: Bilgi Guvenligi Dernegi
Account Holder Address: Mutlukent Mahallesi 1979. Cad. Binsesin Sitesi No: 15/3 Umitkoy - Cankaya/ANKARA
TRY Transfers:
Bank: İŞ BANKASI MALTEPE ŞUBESİ 4212
Account IBAN: TR45 0006 4000 0014 2120 9663 26
The Microsoft CMT service was used for managing the peer-reviewing process for this conference. This service was provided for free by Microsoft and they bore all expenses, including costs for Azure cloud services as well as for software development and support.
Copyright:
Click to View Copyright.
Paper format:
The paper format must be prepared according to A4-size paper (NOT US Letter) format as presented in IEEE website (IEEE Manuscript Template for Conference Proceedings.)
Call for Papers
Conference topics are given below but not limited to:
Information Security
5G Security
Access Control
Authentication
Big Data Security and Privacy
Biometry Applications and Standards
Cloud Security / Privacy
Computer Forensics
Cyber Crime
Cyber Security
Database Security
Embedded Systems Security
Identity Management Systems
Information Laws and Regulations
IoT Security
Mobile Security
Network Security
Operating Systems Security
Secure Software
Security Protocols
Sensor Systems
Surveillance Systems
Threats, Vulnerabilities, and Risk Management
Wireless Security
5G Security
Access Control
Authentication
Big Data Security and Privacy
Biometry Applications and Standards
Cloud Security / Privacy
Computer Forensics
Cyber Crime
Cyber Security
Database Security
Embedded Systems Security
Identity Management Systems
Information Laws and Regulations
IoT Security
Mobile Security
Network Security
Operating Systems Security
Secure Software
Security Protocols
Sensor Systems
Surveillance Systems
Threats, Vulnerabilities, and Risk Management
Wireless Security
Cryptology
Applications of Finite Fields
Applied Cryptography
Cryptographic Architectures and Applications
Cryptographic Attacks, Theory, Implementation and Countermeasures
Cryptographic Protocols
Error Correcting Codes
Finite Field Arithmetic
Homomorphic Encryption
Lightweight Cryptography
Post-Quantum Cryptography
Pseudorandom Number Generators
Quantum Computing for Cryptography
Quantum Cryptanalysis
Quantum Cryptography
Side Channel Attacks
Registration fee:
Fee is requested for participation with articles.
Applications of Finite Fields
Applied Cryptography
Cryptographic Architectures and Applications
Cryptographic Attacks, Theory, Implementation and Countermeasures
Cryptographic Protocols
Error Correcting Codes
Finite Field Arithmetic
Homomorphic Encryption
Lightweight Cryptography
Post-Quantum Cryptography
Pseudorandom Number Generators
Quantum Computing for Cryptography
Quantum Cryptanalysis
Quantum Cryptography
Side Channel Attacks
Registration fee:
Fee is requested for participation with articles.