Call for Papers

Financial Cryptography and Data Security 2021

Twenty-Fifth International Conference
March 1–5, 2021
Radisson Grenada Beach Resort

Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate on information security with a specific focus on financial and commercial systems. Original works on all aspects of financial security and privacy are solicited, from fundamental theory to real-world deployments. Submissions need not be exclusively concerned with cryptography. Systems security, economic or behavioral perspectives, and interdisciplinary efforts are particularly encouraged.

Since 2019, Financial Cryptography merged with the BITCOIN workshop to incorporate both traditional financial security topics as well as blockchains and cryptocurrencies.

Topics of particular interest are listed below:

  • Access Control, Authorization and Trust Management
  • Anonymity and Privacy Enhancing Technologies
  • Applied Cryptography
  • Attacks, attack techniques, and attack case studies
  • Auctions and Incentive Design
  • Authentication, Identity Management and Biometrics
  • Behavioral Aspects of Security and Privacy
  • Blockchain Applications
  • Blockchain protocols, including PoW, -stake, -burn, permissioned/permissionless
  • Censorship circumvention and resistance
  • Certification and Audits
  • Cloud Computing and Data Outsourcing Security
  • Data Security and Privacy
  • Digital Cash and Payment Systems
  • Distributed Consensus Protocols
  • Digital Rights Management
  • Economics of Security and Privacy
  • Economic and Monetary Aspects of Cryptocurrencies
  • Electronic Crime and Underground Markets
  • Electronic Payments and Ticketing Systems
  • Empirical studies, Real-world Measurements and Metrics
  • Forensics, Monitoring and Transaction Graph Analysis
  • Fraud Detection and Management
  • Game Theory for Security, Privacy, and Blockchain
  • Language-based security and formal verification
  • Machine Learning and AI Security
  • Malware and Software Security
  • Mobile Payments
  • Network and distributed system security
  • Legal and Regulatory Issues of Blockchains, Cryptocurrencies, and Electronic Payments
  • Peer-to-Peer Networks
  • Phishing and Social Engineering
  • Reputation Systems
  • Security of Banking, Financial Services, and Electronic Commerce
  • Smart Contracts and Financial Instruments
  • Smartcards, Secure Tokens, and Secure Hardware
  • Surveillance and Tracking
  • System security
  • Trusted Execution Environments (TEE) Security and Applications
  • Usability and Security
  • Web Security

Important Dates

Paper registrationSeptember 17, 2020 (firm!)
Paper submissionSeptember 24, 2020 (firm!)
Paper notificationDecember 3, 2020
Workshop proposal submissionSeptember 15, 2020 (for full consideration;
later submissions considered on rolling basis)
Workshop proposal notificationSeptember 30, 2020 (on-time submissions)
Poster and panel submissionDecember 8, 2020
Poster and panel notificationDecember 22, 2020
Final pre-proceeding papersFebruary 1, 2021
ConferenceMarch 1–5, 2021

Submissions are accepted until 11:59pm, AoE UTC-12.


Submissions are sought in the following categories:
(i) regular papers (15 pages LNCS format excluding references and appendices),
(ii) short papers (8 pages LNCS format in total),
(iii) systematization of knowledge papers (20 pages LNCS format excluding references and appendices),
(iv) panel and workshop proposals (2 pages), and
(v) posters (1 page).

Papers must be formatted in standard LNCS format and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found here and at the submission site. For each accepted paper/poster the conference requires at least one registration at the general or academic rate, and paper authors must sign the IFCA copyright form when submitting the final version. Alternatively, individual papers can be published as fully open access—the publisher charges authors a fee for this (currently EUR 38 per page).

Original submissions: Authors may submit only work that does not substantially overlap with work that is currently submitted or has been accepted for publication to any other peer-reviewed conference/workshop with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. Note that it is acceptable for papers to appear in non-peer-reviewed formats (for example, as technical reports or in online archives such as ePrint). In case of doubt contact the program chairs for any clarifications at

Research paper submission: Paper submissions should be uploaded through the conference submission website, where authors should also report any conflicts with program committee members. A conflict exists if an author has the same affiliation as a committee member, has ever acted as their PhD supervisor or been supervised by them, or if they have been co-authors on a paper within the past two years.

Anonymous submission: Regular and short research paper submissions must be anonymized with no author names, affiliations, acknowledgments, or obvious references. Failure to properly anonymize submitted papers is grounds for a desk rejection without review. It is acceptable (but by no means required) for submitted papers to be published online in non-anonymous form (e.g., on authors' websites or archives like ePrint or Program committee members will be instructed not to actively seek to de-anonymize papers.

Panel, poster and workshop submission: Poster submissions and workshop/panel proposals should be sent by email to and should not be anonymized.

Re-submission to affiliated workshops: Papers that are submitted but ultimately not accepted to the main conference may be considered for acceptance at one of the associated workshops. If you would like to take advantage of this, please indicate this preference when submitting your paper.

Regular Research Papers

Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages in standard LNCS format excluding references and appendices. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them.

Short Papers

Short papers are also subject to peer review; however, the intention is to encourage authors to introduce work in progress, novel applications, and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format in total. The paper title for short papers must include the text "Short Paper:". Accepted submissions will be included in the conference proceedings. The authors of some submissions not accepted as regular research papers may be offered the option of acceptance as a short paper.

Systematization of Knowledge Papers

We also solicit Systematization of Knowledge (SoK) papers. To be suitable for publication, SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions. SoK paper submissions are limited to 20 pages in standard LNCS format excluding references and appendices. Accepted submissions will be included in the conference proceedings. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them. The paper title for systematization of knowledge papers must include the text "SoK:".

Panel Proposals

We especially would like to encourage submissions of panel proposals. These should include a brief description of the panel topics, as well as of the prospective panelists. Accepted panel sessions will be presented at the conference. Please feel free to contact us directly if you would like to further discuss the suitability of a certain topic. Panel submissions must not be anonymous and should be up to 2 pages, sent to


The poster session is the perfect venue to share a provocative opinion, interesting established or preliminary work, or a cool idea that will spark discussion. Poster presenters will benefit from a multi-hour session to discuss their work, get exposure, and receive feedback from attendees. Note that the poster session will only take place if there is a physical event. Poster submissions should be a 1-page abstract (in the same LNCS format) describing the poster. Please keep in mind that the poster deadline is later than the main paper notification deadline. Poster proposals must not be anonymous and should be sent to the posters chair at

Workshop Proposals

Proposals for workshops to be held at FC21 are also solicited. A workshop can be a full day or half day in length. Workshop proposals should include: (i) a title; (ii) a call for papers; (iii) a brief summary and justification, including how it would fit into the greater FC scope; (iv) a (tentative) Program Committee and its Chair(s); (v) one-paragraph biographies for key organizers; and (vi) the expected (or previous, if the workshop has been held in previous years) number of submissions, participants and acceptance rates. Workshop proposals must not be anonymous and should be sent to Proposals received after the submission deadline will be considered on a rolling basis for any remaining slots.

The Rump Session

FC21 will also include the popular "rump session" held on one of the evenings in an informal, social atmosphere. The rump session is a program of short (5 minutes), informal presentations on works in progress, off-the-cuff ideas, and any other matters pertinent to the conference. Any conference attendee is welcome to submit a presentation to the Rump Session Chair (to be announced at the conference). This submission should consist of a talk title, the name of the presenter, and, if desired, a very brief abstract. Submissions may be sent via e-mail or submitted in person in the morning on the day of the session.

Student Stipends

IFCA is seeking funding to continue its program of financial support specifically for students attending FC, and students are encouraged to submit work in anticipation that funding will be found. Previous grants prioritized students presenting at the conference or associated workshops and students fresh to the field, but all students are encouraged to apply. If you are interested in applying for stipend support, please email the FC21 general chairs at with subject line "student stipend" and a letter of support from your thesis supervisor or home institution confirming your student status and stating that a stipend would help make it possible for you to attend the conference.

COVID-19 Information

Due to the ongoing global pandemic, depending on the developing circumstances, it is possible that a physical meeting for FC21 will not take place. Even if it does, we expect that some authors may have difficulty traveling to the conference and we will make accommodations for remote presentations.

Program Chairs

Nikita BorisovUniversity of Illinois at Urbana-Champaign
Claudia DiazKU Leuven

Program Committee

Ittai AbrahamVMware Research
Gunes AcarKU Leuven
Shashank AgrawalWestern Digital Research
Ross AndersonUniversity of Cambridge
Elli AndroulakiIBM Research – Europe
Diego F. AranhaAarhus University
Man Ho AuThe University of Hong Kong
Zeta AvarikiotiETH Zurich
Erman AydayCase Western Reserve University, Bilkent University
Foteini BaldimtsiGeorge Mason University
Shehar BanoFacebook
Iddo BentovCornell Tech
Bobby BhattacharjeeUniversity of Maryland
Alex BiryukovUniversity of Luxembourg
Dan BonehStanford University
Joseph BonneauNew York University
Karima BoudaoudUniversité Côte d'Azur
Ioana BoureanuUniversity of Surrey, Surrey Centre for Cyber Security (SCCS)
Xavier BoyenQueensland University of Technology
Jeffrey BurdgesWeb 3 Foundation
Rainer BöhmeUniversity of Innsbruck
Benedikt BünzStanford University
Christian CachinUniversity of Bern
L Jean CampIndiana University
Srdjan CapkunETH Zurich
Pern Hui ChiaGoogle
Tom ChothiaUniversity of Birmingham
Jeremy ClarkConcordia University
Shaanan CohneyPrinceton University / University of Melbourne
George DanezisUniversity College London / Novi
Sanchari DasUniversity of Denver
Vanesa DazaPompeu Fabra University
Jean Paul DegabrieleTU Darmstadt
Matteo Dell'Amico
Sven DietrichCity University of New York
Benjamin EdwardsCyentia Institute
Tariq ElahiUniversity of Edinburgh
Kaoutar ElkhiyaouiIBM Research
William EnckNorth Carolina State University
Zekeriya ErkinDelft University of Technology
Ittay EyalTechnion
Antonio FaonioEURECOM
Dario FioreIMDEA Software Institute
Ben FischStanford University
Simone Fischer-HübnerKarlstad University
Juan GarayTexas A&M University
Christina GarmanPurdue University
Arthur GervaisImperial College London
Esha GhoshMicrosoft Research
Thomas GrossUniversity of Newcastle
Jens GrossklagsTechnical University of Munich
Feng HaoUniversity of Warwick
Ethan HeilmanBoston University
Urs HengartnerUniversity of Waterloo
Ryan HenryUniversity of Calgary
Jordi Herrera-JoancomartíUniversitat Autònoma de Barcelona
Jaap-Henk HoepmanRadboud University / University of Groningen
Nicholas HopperUniversity of Minnesota
Kévin HugueninUniversity of Lausanne (UNIL)
Stephanie HurderPrysm Group
Alice HutchingsUniversity of Cambridge
Marc JuarezUniversity of Southern California
Sreeram KannanUniversity of Washington Seattle
Gabriel KaptchukBoston University
Ghassan KarameNEC Laboratories Europe
Aniket KatePurdue University
Stefan KatzenbeisserUniversity of Passau
Aggelos KiayiasUniversity of Edinburgh & IOHK
Katharina KohlsRuhr University Bochum
Markulf KohlweissUniversity of Edinburgh & IOHK
Johannes KruppCISPA Helmholtz Center for Information Security
Albert KwonBadge Biometrics
Aron LaszkaUniversity of Houston
Kirill LevchenkoUniversity of Illinois
Jiasun LiGeorge Mason University
Benjamin LivshitsBrave Software / Imperial College London
Wouter LueksEPFL
Xiapu LuoThe Hong Kong Polytechnic University
Loi LuuKyber Network
Travis MayberryUS Naval Academy
Patrick McCorryanydot
Catherine MeadowsUS Naval Research Laboratory
Sarah MeiklejohnUniversity College London
Andrew MillerUniversity of Illinois at Urbana-Champaign
Pedro Moreno-SanchezIMDEA Software Institute
Steven MurdochUniversity College London
Neha NarulaMIT Media Lab
Kartik NayakDuke University
Russell O'ConnorBlockstream
Satoshi ObanaHosei University
Simon OyaUniversity of Waterloo
Giorgos PanagiotakosUniversity of Athens
Olivier PereiraUCLouvain
Andrew PoelstraBlockstream
Bart PreneelCOSIC, KU Leuven
Cristina Pérez-SolàUniversitat Oberta de Catalunya (UOC)
Elizabeth QuagliaRoyal Holloway, University of London
Joel ReardonUniversity of Calgary
Ling RenUniversity of Illinois Urbana-Champaign
Alfredo RialUniversity of Luxembourg
Stefanie RoosTU Delft
Burton RosenbergUniversity of Miami
Ahmad-Reza SadeghiTU Darmstadt
Reihaneh Safavi-NainiUniversity of Calgary
Alessandra ScafuroNCSU
Nolen ScaifeUniversity of Colorado Boulder
Jean-Pierre SeifertTU Berlin
abhi shelatNortheastern University
Jared M. SmithOak Ridge National Laboratory
Yonatan SompolinskyThe Hebrew University of Jerusalem
Kyle SoskaCarnegie Mellon University
Douglas StebilaUniversity of Waterloo
Koutarou SuzukiToyohashi University of Technology
Vanessa TeagueUniversity of Melbourne
Alin TomescuVMware Research
Luke ValentaCloudflare Research
Aad van MoorselNewcastle University
Marie VasekUniversity College London
Pramod ViswanathUniversity of Illinois at Urbana-Champaign
Artemij VoskobojnikovUniversity of British Columbia
Marko VukolićIBM Research - Zurich
Riad S. WahbyStanford University
Nicholas WeaverInternational Computer Science Institute
Edgar WeipplUniversity of Vienna, SBA Research
Philipp WinterThe Tor Project
Jiangshan YuMonash University
Fan ZhangChainlink and Duke University
Ren ZhangNervos
Dionysis ZindrosUniversity of Athens
Aviv ZoharThe Hebrew University of Jerusalem




This conference is organized annually by the International Financial Cryptography Association.