12th International Conference on Cryptography and Information Security (CRIS 2026)
May 16 ~ 17, 2026, Zurich, Switzerland Scope & Topics 12th International Conference on Cryptography and Information Security (CRIS 2026) serves as a premier platform for presenting cutting edge research and advances in cryptography, coding theory, and information security. As digital systems continue to expand in scale, complexity, and societal impact, the need for robust security foundations and innovative protection mechanisms has never been greater. CRIS 2026 provides a peer reviewed forum for researchers, practitioners, and industry experts to share breakthroughs, exchange ideas, and explore emerging challenges across the full spectrum of security and cryptographic technologies.
The conference aims to bring together scientists, researchers, engineers, and students from academia, industry, and government to discuss novel theories, methodologies, applications, and practical implementations. Authors are invited to submit original research articles, case studies, survey papers, and industrial experiences that demonstrate significant progress, innovative approaches, or insightful perspectives in the conference’s areas of interest.
Topics of interest include, but are not limited to, the following - Applied and theoretical cryptography
- Cryptographic protocols, secure multiparty computation, and zero knowledge proofs
- Post quantum cryptography and quantum resistant algorithms
- Quantum cryptography and quantum safe key exchange
- Blockchain security, consensus mechanisms, and cryptographic primitives for distributed ledgers
- Privacy enhancing technologies (PETs), including differential privacy and homomorphic encryption
- Secure key management, key exchange, and secret sharing
- Authentication, authorization, and access control
- Identity management, digital credentials, and decentralized identity
- Biometric security and privacy preserving biometrics
- Information hiding, steganography, and digital watermarking
- Data integrity, system integrity, and tamper resistant architectures
- Software security, secure coding, and vulnerability discovery
- Hardware and embedded system security (TPMs, TEEs, side channel attacks, fault injection)
- Trusted execution environments and confidential computing
- Network security, wireless security, and mobile system security
- IoT and cyber physical systems security
- Sensor network and ad hoc network security
- Cloud, edge, and distributed system security
- Web and browser security
- Security engineering, secure system design, and formal verification
- Security requirements, threat modeling, and risk assessment
- Intrusion detection, intrusion prevention, and anomaly detection
- Malware analysis, reverse engineering, and threat intelligence
- Vulnerability assessment, exploit mitigation, and attack surface reduction
- Insider threats, behavioral analytics, and organizational security
- Security management, governance, and policy
- Trust management, trust models, and reputation systems
- Privacy and data protection in distributed and pervasive environments
- Security and privacy in AI/ML systems
- Adversarial machine learning and robust model design
- Machine learning for security (intrusion detection, malware classification, fraud detection)
- Reinforcement learning and unsupervised learning for security analytics
- Secure federated learning and privacy preserving AI
- Blockchain based security applications and smart contract security
- Digital forensics, incident response, and cybercrime investigation
- Untraceability, anonymity systems, and anonymous communication networks
- Regulation, compliance, and trust mechanisms in digital ecosystems
- E commerce security, payment systems, and financial cryptography
- Security in pervasive, ubiquitous, and mobile computing
- Security in distributed ledger systems and decentralized applications
- Service oriented architectures, QoS, and secure systems design
- Emerging threats, novel attack vectors, and future security challenges
Paper Submission Authors are invited to submit papers through the conference Submission System by February 07, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from CRIS 2026, after further revisions, will be published in the special issue of the following journals. Important Dates | Submission Deadline | : | February 07, 2026 | | Authors Notification | : | March 28, 2026 | | Final Manuscript Due | : | April 04, 2026 |
Co - Located Event ***** The invited talk proposals can be submitted to cris@cosit2026.org
|