Special Issues

Cryptography publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic and all Special Issue submissions follow MDPI's standard editorial process. The journal’s Editor-in-Chief and/or designated Editorial Board Member will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. Further information on MDPI's Special Issue policies and Guest Editor responsibilities can be found here. For any inquiries related to a Special Issue, please contact the Editorial Office.

Section
Search by Title/Keyword
 
Order results
Display
Results per page
Advances in Authentication, Authorization and Privacy for Securing Smart Communications submission deadline 10 May 2025 | 9 articles | Viewed by 21274 | Submission Open
Keywords: information security; data privacy; cryptography; authentication; authorization; accounting; identification; post-quantum; digital signature; digital certificate; smart systems; internet of things; internet of everything
Interdisciplinary Cryptography
edited by and Khodakhast Bibak
submission deadline 30 Jun 2025 | 1 articles | Viewed by 513 | Submission Open
Keywords: cryptography; interdisciplinary cryptography; cryptographic functions; cryptographic hardware; perfectly secure cryptography; lattice-based cryptography
Advances in Symmetric Cryptography and Data Integrity submission deadline 30 Jul 2025 | 1 articles | Viewed by 2578 | Submission Open
Keywords: symmetric cryptography; cryptanalysis; steganalysis; authentication; code theory
Cryptography and Network Security—CANS 2024
edited by Markulf Kohlweiss and Roberto Di Pietro
submission deadline 30 Jul 2025 | Viewed by 248 | Submission Open
Keywords: access control; applied cryptography; artificial intelligence; biometrics; hash functions; IoT security; key management; network security; trust management
AI Meets Encryption—Enhancing Cyber Security and Privacy in the AI Age
edited by Shancang Li and
submission deadline 31 Oct 2025 | 1 articles | Viewed by 548 | Submission Open
Keywords: encryption techniques; privacy-preserving AI; post-quantum cryptography; AI-powered cryptography
Information Security and Privacy—ACISP 2025
edited by Yudi Zhang, , Fuchun Guo and
submission deadline 20 Nov 2025 | Viewed by 173 | Submission Open
Keywords: access control; AI security; authentication; blockchain technology; cryptology
Advanced Techniques in Watermarking, Encryption and Steganography for Secure Communication
edited by and
submission deadline 20 Nov 2025 | Viewed by 34 | Submission Open
Keywords: watermarking; encryption; steganography; security and privacy
Emerging Topics in Hardware Security
edited by
submission deadline 10 Dec 2025 | 8 articles | Viewed by 11824 | Submission Open
Keywords: hardware security and trust; physical unclonable functions; side channel attacks and countermeasures; microprocessor security
(This special issue belongs to the Section Hardware Security)
Recent Advances in Image/Signal Encryption and Decryption Techniques
edited by
submission deadline 31 Dec 2025 | Viewed by 485 | Submission Open
Keywords: optical information security; image encryption; remote sensing image; multi-source data fusion/encryption
Advances in Privacy, Security, and Trust: Cryptographic Perspectives from PST2025
edited by and Ali Ghorbani
submission deadline 31 Dec 2025 | Viewed by 87 | Submission Open
Keywords: cryptography; privacy-preserving technologies; cybersecurity; trust management
Information and Communications Security—ICICS 2025
edited by Wanpeng Li, Rang Zhou and
submission deadline 10 Jan 2026 | Viewed by 33 | Submission Open
Keywords: access control; applied cryptography; authentication and authorization; hardware security; network security; privacy enhancing technologies; secure communication protocols
Back to TopTop