Top cyber security conferences. Papers can be download by https://sci-hub.tw

Conference Info Papers
1. IEEE S&P Since 1980, the IEEE Symposium on Security and Privacy (S&P)has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field. Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains. http://dblp.uni-trier.de/db/conf/sp/
2. Usenix Sec USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks. http://dblp.uni-trier.de/db/conf/uss/
3. ACM CCS The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions. From its inception, CCS has established itself as a high standard research conference in its area. http://dblp.uni-trier.de/db/conf/ccs/
4. NDSS The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies. http://dblp.uni-trier.de/db/conf/ndss/
5. Eurocrypt International Conference on the Theory and Applications of Cryptographic Techniques. The Eurocrypt conference is an international conference on all aspects of cryptology. The Eurocrypt conference has been held every year since 1987, and is held in a different location in Europe every year. http://dblp.uni-trier.de/db/conf/eurocrypt/
6. CHES Conference on Cryptographic Hardware and Embedded Systems http://dblp.uni-trier.de/db/conf/ches/
7. Crypto International Cryptology Conference. The Crypto conference is an international conference on all aspects of cryptology. The Crypto conference has been held every year since 1981 in Santa Barbara, California, USA. http://dblp.uni-trier.de/db/conf/crypto/
8. ACSAC The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. With peer reviewed technical papers, invited talks, panels, national interest discussions, workshops, and professional development and training courses, ACSAC continues its core mission of investigating practical solutions for computer and network security technology. http://dblp.uni-trier.de/db/conf/acsac/
9. PETS The annual Privacy Enhancing Technologies Symposium (PETS) brings together privacy experts from around the world to present and discuss recent advances and new perspectives on research in privacy technologies. PETS/PoPETs is the premier venue for novel applied and/or theoretical research into the design, analysis, experimentation, or fielding of privacy-enhancing technologies. http://dblp.uni-trier.de/db/conf/pet/
10. Asiacrypt International Conference on the Theory and Application of Cryptology and Information Security. The Asiacrypt conference is an international conference on all aspects of cryptology. The Asiacrypt conference has been sponsored by IACR since 2000, and it is now held annually in a different venue in the Asia-Pacific region http://dblp.uni-trier.de/db/conf/asiacrypt/
11. RAID The International Symposium on Research in Attacks, Intrusions and Defenses (RAID), formerly known as International Symposium on Recent Advances in Intrusion Detection (RAID), is an annual event dedicated to the sharing of information in the field of intrusion-detection. http://dblp.uni-trier.de/db/conf/raid/
12. FC The International Financial Cryptography Association (IFCA) was formed to advance the theory and practice of financial cryptography and related fields. IFCA’s primary activity is the organization of its annual Financial Cryptography and Data Security conference, which brings together experts from around the world to foster cooperation and the exchange of ideas. http://dblp.uni-trier.de/db/conf/fc/
13. ESORICS European Symposium on Research in Computer Security. Computer security is concerned with the protection of information in environments where there is a possibility of intrusion or malicious action. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. Progressively organised in a series of European countries, the symposium is confirmed as the European research event in computer security. http://dblp.uni-trier.de/db/conf/esorics/
14. ACM AsiaCCS ACM Asia Conference on Computer and Communications Security. http://dblp.uni-trier.de/db/conf/asiaccs/
15. PKC Public Key Cryptography (PKC). The International Conference on Practice and Theory in Public Key Cryptography (PKC) been sponsored by the IACR since 2003. PKC has been the main annual conference focusing on all aspects of public-key cryptography, attracting cutting-edge results from world-renowned scientists in the area. http://dblp.uni-trier.de/db/conf/pkc/
16. CT-RSA For almost 30 years, RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points of connection, as cybersecurity has become more relevant across all aspects of our daily lives. Our commitment is to connect you to the most knowledgeable people and cutting-edge content that will empower you to stay ahead of cyberthreats and advance your career. http://dblp.uni-trier.de/db/conf/ctrsa/
17. ACM WiSec WiSec: ACM Conference on Security and Privacy in Wireless and Mobile Networks http://dblp.uni-trier.de/db/conf/wisec/
18. FSE Fast Software Encryption (FSE). The Conference on Fast Software Encryption (FSE) has been sponsored by the IACR since 2004. FSE concentrates on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash functions, and MAC algorithms. http://dblp.uni-trier.de/db/conf/fse/
19. ACNS International Conference on Applied Cryptography and Network Security. ACNS is an annual conference focusing on current developments that advance the areas of applied cryptography and its application to systems and network security. The goal is to represent both academic research works as well as developments in industrial and technical frontiers. http://dblp.uni-trier.de/db/conf/acns/
20. IEEE CSF The Computer Security Foundations Symposium (CSF) is an annual symposium for researchers in computer security and privacy, to develop and examine theories of security and privacy, to build the formal models that provide a context for those theories, and to study techniques for verifying, analyzing, and implementing security and privacy. http://dblp.uni-trier.de/db/conf/csfw/
21. TCC Theory of Cryptography Conference http://dblp.uni-trier.de/db/conf/tcc/

Other regular cyber security conferences (132):ACM-CODASPY, ACM-CPSS, ACM-SACMAT, ACM-SAC/Sec, ACISP, Africacrypt, AISC, AReS, ATC, CANS, CBC, CECC, CIS , CISIS, COSADE, CRiSIS, CRITIS , CSS,DFRWS, DIMVA , DPM, EC2ND , ECC, ECCWS, EDCC , ESCAR, ESSoS, EuroSec, FDTC, FPS, GameSec , HAISA, IAS, ICDF2C , ICICS, ICIMP, ICISC, ICISS ,ICISSP, ICITS, ICITST , ICS-CSR, IEEE-CNS, IEEE-DASC, IEEE-DSC,IEEE-EuroS&P, IEEE-HASE, IEEE-HOST, IEEE-HST , IEEE-ISI, IEEE-Malware, IEEE-PAC, IEEE-PASSAT, IEEE-PRDC, IEEE-QRS, IEEE-SecDev , IEEE-SESOC, IEEE-TrustCom, IEEE/IFIP-DSN, IFIP-CIP, IFIP-CMS, IFIP-DBSec , IFIP-DF, IFIP-IDMAN, IFIP-NTMS, IFIP-Sec, IFIP-TM, IH, IMACC, Indocrypt, Inscrypt, ISA, ISARCS, ISC, ISCISC,ISCTurkey, ISPEC, ITC, IWDW, IWSEC , Latincrypt, LightSec, Malware, MIST, NordSec, NPSec,NSPW , NSS, Pairing, Passwords, POST, PQCrypto, PRISMS, ProvSec, PSD, PST, QCrypt , RFIDsec, RSSR, RWC , SAFECOMP, SAC, SAM, SCIS, SCN , SECITC, SECRYPT, SecTech, SecureComm, SecurIT, SecurWare, SIN , SNDS, SOUPS, SPACE, SPW, SRDS, SSR, SSS, STM, SVI, TRUST, TrustBus, VizSec, WCC, WDFIA, WEIS, WESS , WIFS, WISA , WISTP, YACC