journal /Cryptography/ (https://www.mdpi.com/journal/Cryptography) will
comprise mainly extended versions of papers presented at the 30th
Australasian Conference on Information Security and Privacy (ACISP 2025,
in Wollongong, Australia, on 14–16 July 2025).
https://uow-ic2.github.io/acisp2025/cfp.html
The submission deadline of special issue is 20 November 2025 and papers
may be submitted immediately or at any point till the date, as papers
will be published on an ongoing basis. For more information, please see:
https://www.mdpi.com/journal/cryptography/special_issues/0HGCF8V0ZN
Specific topics of interest include, but are not limited to:
Access control;
Authentication;
Blockchain technology;
Cloud security;
Cryptology;
Cyber-physical systems security;
Database security;
Digital forensics;
Key management;
Lightweight security;
Network security;
Privacy-enhancing technologies;
Security implementation;
Security protocols;
Trustworthy AI
Guest editors:
Dr. Yudi Zhang
Dr. Zhen Zhao
Dr. Fuchun Guo
Prof. Dr. Josef Pieprzyk
Cryptography is a scientific peer-reviewed open access journal of
cryptography published quarterly online by MDPI. It is covered by Scopus
(Elsevier), Emerging Sources Citation Index (ESCI-Web of Science), etc.
It received an Impact Factor for 2023 of 1.8 (ranking in Q2 in "Computer
Science, Theory & Methods"), and a CiteScore of 3.8 (ranking in Q1 in
"Applied Mathematics").
Best regards,
Xue Cheng
Managing Editor
--
MDPI Branch Office, Wuhan
Cryptography Editorial Office
https://www.mdpi.com/journal/cryptography
MDPI, Grosspeteranlage 5, 4052 Basel, Switzerland
News: Cryptography Receives an Updated Impact Factor of 1.8
https://www.mdpi.com/journal/cryptography/announcements/8769
Recommended Papers:
Divisions and Square Roots with Tight Error Analysis from Newton-Raphson
Iteration in Secure Fixed-Point Arithmetic
https://www.mdpi.com/2410-387X/7/3/43
Matrix Encryption Walks for Lightweight Cryptography
https://www.mdpi.com/2410-387X/7/3/41
Twitter: @Cryptogr_MDPI https://twitter.com/Cryptogr_MDPI
LinkedIn: Cryptography-MDPI
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************