Sign for Notice Everyday    Sign Up| Sign In| Link| English|

Our Sponsors


    CRIS 2026 - 12th International Conference on Cryptography and Information Security (CRIS 2026)

    View: 67

    Website https://cosit2026.org/cris/index | Want to Edit it Edit Freely

    Category CRIS 2026

    Deadline: February 07, 2026 | Date: May 16, 2026-May 17, 2026

    Venue/Country: Zurich, Switzerland, Switzerland

    Updated: 2026-01-20 16:28:13 (GMT+9)

    Call For Papers - CFP

    12th International Conference on Cryptography and Information Security (CRIS 2026)

    May 16 ~ 17, 2026, Zurich, Switzerland

    https://cosit2026.org/cris/index

    Scope & Topics

    12th International Conference on Cryptography and Information Security (CRIS 2026) serves as a premier platform for presenting cutting edge research and advances in cryptography, coding theory, and information security. As digital systems continue to expand in scale, complexity, and societal impact, the need for robust security foundations and innovative protection mechanisms has never been greater. CRIS 2026 provides a peer reviewed forum for researchers, practitioners, and industry experts to share breakthroughs, exchange ideas, and explore emerging challenges across the full spectrum of security and cryptographic technologies.The conference aims to bring together scientists, researchers, engineers, and students from academia, industry, and government to discuss novel theories, methodologies, applications, and practical implementations. Authors are invited to submit original research articles, case studies, survey papers, and industrial experiences that demonstrate significant progress, innovative approaches, or insightful perspectives in the conference’s areas of interest.

    Topics of interest include, but are not limited to, the following:

    Applied and theoretical cryptography

    Cryptographic protocols, secure multiparty computation, and zero knowledge proofs

    Post quantum cryptography and quantum resistant algorithms

    Quantum cryptography and quantum safe key exchange

    Blockchain security, consensus mechanisms, and cryptographic primitives for distributed ledgers

    Privacy enhancing technologies (PETs), including differential privacy and homomorphic encryption

    Secure key management, key exchange, and secret sharing

    Authentication, authorization, and access control

    Identity management, digital credentials, and decentralized identity

    Biometric security and privacy preserving biometrics

    Information hiding, steganography, and digital watermarking

    Data integrity, system integrity, and tamper resistant architectures

    Software security, secure coding, and vulnerability discovery

    Hardware and embedded system security (TPMs, TEEs, side channel attacks, fault injection)

    Trusted execution environments and confidential computing

    Network security, wireless security, and mobile system security

    IoT and cyber physical systems security

    Sensor network and ad hoc network security

    Cloud, edge, and distributed system security

    Web and browser security

    Security engineering, secure system design, and formal verification

    Security requirements, threat modeling, and risk assessment

    Intrusion detection, intrusion prevention, and anomaly detection

    Malware analysis, reverse engineering, and threat intelligence

    Vulnerability assessment, exploit mitigation, and attack surface reduction

    Insider threats, behavioral analytics, and organizational security

    Security management, governance, and policy

    Trust management, trust models, and reputation systems

    Privacy and data protection in distributed and pervasive environments

    Security and privacy in AI/ML systems

    Adversarial machine learning and robust model design

    Machine learning for security (intrusion detection, malware classification, fraud detection)

    Reinforcement learning and unsupervised learning for security analytics

    Secure federated learning and privacy preserving AI

    Blockchain based security applications and smart contract security

    Digital forensics, incident response, and cybercrime investigation

    Untraceability, anonymity systems, and anonymous communication networks

    Regulation, compliance, and trust mechanisms in digital ecosystems

    E commerce security, payment systems, and financial cryptography

    Security in pervasive, ubiquitous, and mobile computing

    Security in distributed ledger systems and decentralized applications

    Service oriented architectures, QoS, and secure systems design

    Emerging threats, novel attack vectors, and future security challenges

    Paper Submission

    Authors are invited to submit papers through the conference Submission System by February 07, 2026 Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

    Selected papers from CRIS 2026, after further revisions, will be published in the special issues of the following journals

    International Journal on Cryptography and Information Security (IJCIS)

    The International Journal of Network Security & Its Applications (IJNSA) – ERA Indexed

    The International Journal of Wireless & Mobile Networks (IJWMN) – ERA Indexed

    International Journal of Security, Privacy and Trust Management (IJSPTM)

    Information Technology in Industry (ITII)

    Important Dates

    Submission Deadline : February 07, 2026

    Authors Notification : March 28, 2026

    Registration & Camera-Ready Paper Due : April 04, 2026

    Contact Us

    Here’s where you can reach us : crisatcosit2026.org or cris2025atmyyahoo.com


    Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
    Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.