The 1st Codes, Cryptology & Information Security Southeast Asia 2018 (C2IS-SEA 2018) is organized by the Malaysian Society for Cryptology Research (MSCR), CyberSecurity Malaysia and the Institute for Mathematical Research, Universiti Putra Malaysia (UPM). This event is organized in cooperation with the International Association for Cryptologic Research (IACR).

The conference aims to bring together researchers in the fields of coding theory, cryptology and information Security, practitioners, developers, and users to foster cooperation, exchange techniques, tools, experiences and ideas.

The conference seeks submissions in these fields from academia, government, and industry presenting novel research. The primary focus is on original, high quality, unpublished research of theoretical and practical impact, including concepts, techniques, applications and practical experiences.

In addition to a single track of high-quality presentations, C2IS-SEA will offer invited talks. All submitted papers will be reviewed by at least three Program Committee members.

Guideline for article preparation:


  1. Cryptography And Security
  2. Key Management Protocols
  3. Block/Stream Ciphers
  4. Watermarking and Fingerprinting
  5. Quantum Cryptography
  6. Post Quantum Cryptography
  7. Hash Functions
  8. Number Theory
  9. Electronic Commerce and Payment
  10. Elliptic Curve Cryptography
  11. Secret Key Cryptography
  12. Public Key Cryptography
  13. Anonymity
  14. Digital Signature Schemes
  15. Message Authentication Codes
  16. Public-Key Cryptanalysis
  17. Symmetric-key Cryptanalysis
  18. Group Communication
  19. Information Theory and Security
  20. Secret Sharing
  21. Cryptanalysis
  22. Threshold Cryptography
  23. Design and Implementation
  1. Broadcast Encryption
  2. Applications of Cryptography
  3. Information Security Education
  4. Information Security Management
  5. Information Technology Mis-Use and the Law
  6. Information hiding and watermarking
  7. Malware threat and detection
  8. Mobile and wireless security
  9. Access control and authentication
  10. Cloud and big data security
  11. Critical Infrastructure Protection
  12. Data and Applications Security
  13. Digital Forensics
  14. Human Aspects of Information Security and Assurance
  15. Identity Management
  16. Managing information security functions
  17. Multilateral Security
  18. Network & Distributed Systems Security
  19. Pervasive Systems Security
  20. Privacy protection
  21. Trust Management
  22. Audit and risk analysis

It is planned to publish the proceedings with Springer in the Lecture Notes in Computer Science (LNCS) series (Final Approval Pending).