Special Issues

Cryptography publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic and all Special Issue submissions follow MDPI's standard editorial process. The journal’s Editor-in-Chief and/or designated Editorial Board Member will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. Further information on MDPI's Special Issue policies and Guest Editor responsibilities can be found here. For any inquiries related to a Special Issue, please contact the Editorial Office.

Section
Search by Title/Keyword
 
Order results
Display
Results per page
AI Meets Encryption—Enhancing Cyber Security and Privacy in the AI Age
edited by Shancang Li and
submission deadline 31 Oct 2025 | 1 articles | Viewed by 2267 | Submission Open
Keywords: encryption techniques; privacy-preserving AI; post-quantum cryptography; AI-powered cryptography
Advanced Techniques in Watermarking, Encryption and Steganography for Secure Communication
edited by and
submission deadline 20 Nov 2025 | 1 articles | Viewed by 946 | Submission Open
Keywords: watermarking; encryption; steganography; security and privacy
Information Security and Privacy—ACISP 2025
edited by Yudi Zhang, , Fuchun Guo and
submission deadline 20 Nov 2025 | Viewed by 717 | Submission Open
Keywords: access control; AI security; authentication; blockchain technology; cryptology
Emerging Topics in Hardware Security
edited by
submission deadline 10 Dec 2025 | 10 articles | Viewed by 20289 | Submission Open
Keywords: hardware security and trust; physical unclonable functions; side channel attacks and countermeasures; microprocessor security
(This special issue belongs to the Section Hardware Security)
Cryptography and Network Security—CANS 2024
edited by Markulf Kohlweiss and Roberto Di Pietro
submission deadline 10 Dec 2025 | 2 articles | Viewed by 2472 | Submission Open
Keywords: access control; applied cryptography; artificial intelligence; biometrics; hash functions; IoT security; key management; network security; trust management
Interdisciplinary Cryptography
edited by and Khodakhast Bibak
submission deadline 31 Dec 2025 | 1 articles | Viewed by 1608 | Submission Open
Keywords: cryptography; interdisciplinary cryptography; cryptographic functions; cryptographic hardware; perfectly secure cryptography; lattice-based cryptography
Recent Advances in Image/Signal Encryption and Decryption Techniques
edited by
submission deadline 31 Dec 2025 | Viewed by 561 | Submission Open
Keywords: optical information security; image encryption; remote sensing image; multi-source data fusion/encryption
Advances in Privacy, Security, and Trust: Cryptographic Perspectives from PST2025
edited by and Ali Ghorbani
submission deadline 31 Dec 2025 | Viewed by 411 | Submission Open
Keywords: cryptography; privacy-preserving technologies; cybersecurity; trust management
Information and Communications Security—ICICS 2025
edited by Wanpeng Li, Rang Zhou and
submission deadline 10 Jan 2026 | Viewed by 199 | Submission Open
Keywords: access control; applied cryptography; authentication and authorization; hardware security; network security; privacy enhancing technologies; secure communication protocols
Advances in Provable and Practical Security—ProvSec 2025
edited by Shi-Feng Sun and Xiaoning Liu
submission deadline 31 Jan 2026 | Viewed by 286 | Submission Open
Keywords: cryptography; IoT security; network security; privacy and security
Advanced Information Security Solutions for Future and Efficient IoT, Wireless, and Localization Systems
edited by , Pavel Mašek and
submission deadline 8 Mar 2026 | Viewed by 39 | Submission Open
Keywords: lightweight cryptography; secure localization; IoT security; wireless communication security; signal processing for security; authentication protocols; privacy-preserving techniques; quantum-resistant cryptography; AI-driven cryptographic systems; secure indoor positioning; cryptographic protocols; secure navigation systems; cyber-physical systems security; secure wireless sensor networks; edge computing security; fog computing security; blockchain for IoT; distributed ledger technologies; secure data aggregation; cross-layer security; secure control systems; machine learning security; cryptographic architectures; secure network protocols; cryptography for mobile devices; cryptography in smart environments; secure autonomous systems; cryptographic signal processing; secure data fusion; cryptography for localization; secure IoT architectures; resilient communication systems; cryptography for smart cities; secure positioning algorithms; secure real-time systems; cryptographic hardware optimization; secure multi-modal sensing; secure communication protocols; cryptography for 6G and beyond
Back to TopTop