International Conference on Cryptography and Mathematical Security

International Conference on Cryptography and Mathematical Security

International Conference on Cryptography and Mathematical Security

72 72 people viewed this event.
<h5 data-start="259" data-end="291">1] Conference Introduction</h5> <p data-start="292" data-end="1105">In a world driven by digital communication, networked systems, cloud infrastructures and quantum advances, cryptography and mathematical security form the bedrock of trusted computing, data protection and resilient systems. The <strong data-start="520" data-end="590">International Conference on Cryptography and Mathematical Security</strong>, scheduled for 19 September 2026 in hybrid format (both in-person and online), organised by Mastering Up, provides a global forum for mathematicians, cryptographers, security engineers, theoreticians and practitioners to share the latest breakthroughs, methodologies and real-world deployments. From advanced algebraic cryptanalysis to post-quantum schemes, from secure protocol design to formal security proofs, this conference invites you to contribute, collaborate and chart the future of mathematical security.</p> <hr data-start="1107" data-end="1110" /> <h5 data-start="1112" data-end="1141">2] Conference Objective</h5> <p data-start="1142" data-end="1185">The key objectives of the conference are:</p> <ul data-start="1186" data-end="2339"> <li data-start="1186" data-end="1410"> <p data-start="1188" data-end="1410">To bring together leading researchers, mathematicians, cryptographers, security engineers and practitioners from academia, industry and government to exchange ideas and research in cryptography and mathematical security.</p> </li> <li data-start="1411" data-end="1618"> <p data-start="1413" data-end="1618">To encourage rigorous theoretical work in cryptographic primitives, protocols and security proofs, as well as their application in modern computing contexts (IoT, cloud, quantum era, distributed ledger).</p> </li> <li data-start="1619" data-end="1902"> <p data-start="1621" data-end="1902">To promote cross‐disciplinary collaboration between mathematics (algebra, number theory, complexity theory), computer science (algorithms, protocols), engineering (systems, implementation security) and emerging technologies (post-quantum, homomorphic encryption, zero-knowledge).</p> </li> <li data-start="1903" data-end="2107"> <p data-start="1905" data-end="2107">To provide a platform for early-career researchers, PhD scholars and students to present their work, receive feedback, build networks and gain visibility in the global cryptography/security community.</p> </li> <li data-start="2108" data-end="2339"> <p data-start="2110" data-end="2339">To foster discussions on future-oriented challenges (e.g., quantum-resistant cryptography, provable security, cryptanalysis of emerging systems) and help translate theoretical advances into robust, implementable security designs.</p> </li> </ul> <hr data-start="2341" data-end="2344" /> <h5 data-start="2346" data-end="2373">3] Conference Outcome</h5> <p data-start="2374" data-end="2443">Participants can expect the following outcomes from the conference:</p> <ul data-start="2444" data-end="3728"> <li data-start="2444" data-end="2600"> <p data-start="2446" data-end="2600">Presentation of peer-reviewed papers, poster sessions and fast-track workshops covering state-of-the-art work in cryptography and mathematical security.</p> </li> <li data-start="2601" data-end="2814"> <p data-start="2603" data-end="2814">Publication opportunities: Selected papers from the conference will be invited for consideration in reputable Scopus and Web of Science / SCI indexed journals (see section 8) for enhanced academic recognition.</p> </li> <li data-start="2815" data-end="3047"> <p data-start="2817" data-end="3047">Opportunities for networking and collaboration with academic peers, industry practitioners, system engineers and policy-makers—potentially leading to joint research projects, implementation efforts and professional partnerships.</p> </li> <li data-start="3048" data-end="3370"> <p data-start="3050" data-end="3370">A deeper understanding of the fundamental mathematical foundations of cryptography (e.g., algebraic structures, complexity assumptions, proof frameworks), current applied challenges (side-channel, implementation security, protocol design) and future paradigms (post-quantum, quantum cryptography, homomorphic systems).</p> </li> <li data-start="3371" data-end="3522"> <p data-start="3373" data-end="3522">Certificates of participation and for presenting authors, certificates of presentation/eligibility for publication—enhancing professional profiles.</p> </li> <li data-start="3523" data-end="3728"> <p data-start="3525" data-end="3728">Practical insights for security practitioners on integrating mathematically-sound cryptographic systems into real-world infrastructures, and for theoreticians to appreciate deployment-driven constraints.</p> </li> </ul> <hr data-start="3730" data-end="3733" /> <h5 data-start="3735" data-end="3776">4] Call for Papers – List of Topics</h5> <p data-start="3777" data-end="3944">We invite authors to submit original research papers, review articles, case studies or system-implementation reports related (but not limited) to the following themes:</p> <ul data-start="3946" data-end="5130"> <li data-start="3946" data-end="4056"> <p data-start="3948" data-end="4056">Mathematical foundations of cryptography: number theory, algebraic geometry, lattice theory, finite fields</p> </li> <li data-start="4057" data-end="4175"> <p data-start="4059" data-end="4175">Cryptographic primitives and protocols: symmetric key, public key, key exchange, signatures, zero-knowledge proofs</p> </li> <li data-start="4176" data-end="4281"> <p data-start="4178" data-end="4281">Post-quantum cryptography: lattice-based, code-based, multivariate, hash-based, isogeny-based schemes</p> </li> <li data-start="4282" data-end="4344"> <p data-start="4284" data-end="4344">Quantum cryptography and quantum-resistant security models</p> </li> <li data-start="4345" data-end="4426"> <p data-start="4347" data-end="4426">Provable security, security reductions, cryptanalysis, complexity assumptions</p> </li> <li data-start="4427" data-end="4501"> <p data-start="4429" data-end="4501">Homomorphic encryption, multi-party computation, functional encryption</p> </li> <li data-start="4502" data-end="4597"> <p data-start="4504" data-end="4597">Implementation security: side‐channel analysis, fault attacks, hardware/software resilience</p> </li> <li data-start="4598" data-end="4701"> <p data-start="4600" data-end="4701">Cryptographic protocol design for cloud, IoT, blockchain/distributed ledgers, secure communications</p> </li> <li data-start="4702" data-end="4783"> <p data-start="4704" data-end="4783">Formal methods, verification of cryptographic systems, quantum‐safe protocols</p> </li> <li data-start="4784" data-end="4917"> <p data-start="4786" data-end="4917">Cryptography in emerging fields: secure federated learning, secure machine learning, cryptography for privacy and data protection</p> </li> <li data-start="4918" data-end="5017"> <p data-start="4920" data-end="5017">Mathematical modelling of adversarial behaviour, complexity analysis, secure multiparty systems</p> </li> <li data-start="5018" data-end="5130"> <p data-start="5020" data-end="5130">Secure architectures, algorithmic randomness, entropy, cryptographic resilience in hardware/embedded systems</p> </li> </ul> <p data-start="5132" data-end="5270">We welcome innovative contributions that bridge rigorous mathematics, practical security engineering and emerging cryptographic paradigms.</p> <hr data-start="5272" data-end="5275" /> <h5 data-start="5277" data-end="5323">5] About Mastering Up [EduTech Platform]</h5> <p data-start="5324" data-end="6026">Mastering Up is a forward-looking EduTech platform committed to empowering academic and professional learners through high-quality courses, international conferences and knowledge-sharing events. With a vision to bridge academia, research and industry, Mastering Up curates subject- and sector-wise international conferences, workshops and training programmes across Science, Technology, Engineering, Management, Mathematics and Security domains. In organising this cryptography conference, Mastering Up ensures a seamless hybrid experience, robust virtual infrastructure, peer-reviewed proceedings and global networking opportunities—enabling participants worldwide to engage, present and collaborate.</p> <hr data-start="6028" data-end="6031" /> <h5 data-start="6033" data-end="6069">6] Important Dates (Estimated)</h5> <ul data-start="6070" data-end="6345"> <li data-start="6070" data-end="6125"> <p data-start="6072" data-end="6125"><strong data-start="6072" data-end="6109">Last date for Abstract Submission</strong>: 25 July 2026</p> </li> <li data-start="6126" data-end="6185"> <p data-start="6128" data-end="6185"><strong data-start="6128" data-end="6167">Notification of Abstract Acceptance</strong>: 10 August 2026</p> </li> <li data-start="6186" data-end="6244"> <p data-start="6188" data-end="6244"><strong data-start="6188" data-end="6226">Registration Date without Late Fee</strong>: 25 August 2026</p> </li> <li data-start="6245" data-end="6302"> <p data-start="6247" data-end="6302"><strong data-start="6247" data-end="6282">Registration Date with Late Fee</strong>: 8 September 2026</p> </li> <li data-start="6303" data-end="6345"> <p data-start="6305" data-end="6345"><strong data-start="6305" data-end="6324">Conference Date</strong>: 19 September 2026</p> </li> </ul> <p data-start="6347" data-end="6443"><em data-start="6347" data-end="6443">Note: These dates are estimates and subject to final confirmation by the Organising Committee.</em></p> <hr data-start="6445" data-end="6448" /> <h5 data-start="6450" data-end="6476">7] Registration Fees</h5> <p data-start="6477" data-end="6671">Participants are requested to register their names through the conference website. Registrations are accepted on a <em data-start="6592" data-end="6617">first-come, first-serve</em> basis.<br data-start="6624" data-end="6627" /><strong data-start="6627" data-end="6669">Registration fee for each participant:</strong></p> <ul data-start="6672" data-end="6874"> <li data-start="6672" data-end="6707"> <p data-start="6674" data-end="6707">Foreign Delegates: <strong data-start="6693" data-end="6705">US $ 100</strong></p> </li> <li data-start="6708" data-end="6874"> <p data-start="6710" data-end="6729">Indian Delegates:</p> <ul data-start="6732" data-end="6874"> <li data-start="6732" data-end="6780"> <p data-start="6734" data-end="6780">Students/Scholars: ₹1,000 (Late Fee: ₹1,500)</p> </li> <li data-start="6783" data-end="6821"> <p data-start="6785" data-end="6821">Faculty: ₹2,000 (Late Fee: ₹2,500)</p> </li> <li data-start="6824" data-end="6874"> <p data-start="6826" data-end="6874">Industry/Scientists: ₹3,000 (Late Fee: ₹3,500)</p> </li> </ul> </li> </ul> <p data-start="6876" data-end="7121">Participation and registration entitle you to access all conference sessions (virtual + in-person where applicable), conference materials, certificate of participation, and eligibility for paper submission/publication (for accepted full-papers).</p> <hr data-start="7123" data-end="7126" /> <h5 data-start="7128" data-end="7148">8] Publication</h5> <p data-start="7149" data-end="7380">Selected papers from the conference will be invited for publication in reputable <strong data-start="7230" data-end="7263">Scopus and Web of Science/SCI</strong> indexed journals (depending on the terms of each journal). Below are five suitable journals for authors to consider:</p> <div class="_tableContainer_1rjym_1"> <div class="group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse"> <table class="w-fit min-w-(--thread-content-width)" data-start="7382" data-end="8449"> <thead data-start="7382" data-end="7407"> <tr data-start="7382" data-end="7407"> <th data-start="7382" data-end="7392" data-col-size="lg">Journal</th> <th data-start="7392" data-end="7399" data-col-size="sm">ISSN</th> <th data-start="7399" data-end="7407" data-col-size="md">Link</th> </tr> </thead> <tbody data-start="7434" data-end="8449"> <tr data-start="7434" data-end="7600"> <td data-start="7434" data-end="7543" data-col-size="lg"><em data-start="7436" data-end="7450">Cryptography</em> (MDPI) — ISSN: 2410-387X. Indexed in Scopus and ESCI. <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://www.mdpi.com/journal/cryptography?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">MDPI</span><span class="-me-1 flex h-full items-center rounded-full px-1 text-[#8F8F8F]">+1</span></span></span></a></span></span></td> <td data-start="7543" data-end="7555" data-col-size="sm">2410-387X</td> <td data-start="7555" data-end="7600" data-col-size="md"><a class="decorated-link" href="https://www.mdpi.com/journal/cryptography?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="7557" data-end="7598">https://www.mdpi.com/journal/cryptography</a></td> </tr> <tr data-start="7601" data-end="7804"> <td data-start="7601" data-end="7718" data-col-size="lg"><em data-start="7603" data-end="7650">International Journal of Applied Cryptography</em> — (IJACT) Indexed in Scopus. <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://www.inderscience.com/jhome.php?jcode=ijact&utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">inderscience.com</span></span></span></a></span></span></td> <td data-start="7718" data-end="7750" data-col-size="sm">[ISSN not listed prominently]</td> <td data-start="7750" data-end="7804" data-col-size="md"><a class="decorated-link" href="https://www.inderscience.com/jhome.php?jcode=ijact&utm_source=chatgpt.com" target="_new" rel="noopener" data-start="7752" data-end="7802">https://www.inderscience.com/jhome.php?jcode=ijact</a></td> </tr> <tr data-start="7805" data-end="8001"> <td data-start="7805" data-end="7939" data-col-size="lg"><em data-start="7807" data-end="7843">Journal of Mathematical Cryptology</em> — ISSN: 1862-2984. Indexed in Scopus and Web of Science. <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://portal.issn.org/resource/ISSN/1862-2984?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">portal.issn.org</span></span></span></a></span></span></td> <td data-start="7939" data-end="7951" data-col-size="sm">1862-2984</td> <td data-start="7951" data-end="8001" data-col-size="md"><a class="decorated-link cursor-pointer" target="_new" rel="noopener" data-start="7953" data-end="7999">https://www.degruyter.com/journal/key/JMC/html</a></td> </tr> <tr data-start="8002" data-end="8244"> <td data-start="8002" data-end="8176" data-col-size="lg"><em data-start="8004" data-end="8042">Journal of Cryptographic Engineering</em> — (Springer) Focuses on cryptographic engineering; suitable for applied/mathematical security. <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://link.springer.com/journal/13389?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">SpringerLink</span></span></span></a></span></span></td> <td data-col-size="sm" data-start="8176" data-end="8201">[ISSN not listed here]</td> <td data-col-size="md" data-start="8201" data-end="8244"><a class="decorated-link" href="https://link.springer.com/journal/13389?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="8203" data-end="8242">https://link.springer.com/journal/13389</a></td> </tr> <tr data-start="8245" data-end="8449"> <td data-start="8245" data-end="8405" data-col-size="lg"><em data-start="8247" data-end="8290">Journal of Groups, Complexity, Cryptology</em> — ISSN: 1869-6104. Indexed in Scopus / Web of Science (ESCI) in cryptology. <span class="" data-state="closed"><span class="ms-1 inline-flex max-w-full items-center relative top-[-0.094rem] animate-[show_150ms_ease-in]" data-testid="webpage-citation-pill"><a class="flex h-4.5 overflow-hidden rounded-xl px-2 text-[9px] font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-[#F4F4F4]! dark:bg-[#303030]!" href="https://gcc.episciences.org/?utm_source=chatgpt.com" target="_blank" rel="noopener"><span class="relative start-0 bottom-0 flex h-full w-full items-center"><span class="flex h-4 w-full items-center justify-between overflow-hidden"><span class="max-w-[15ch] grow truncate overflow-hidden text-center">gcc.episciences.org</span></span></span></a></span></span></td> <td data-start="8405" data-end="8417" data-col-size="sm">1869-6104</td> <td data-start="8417" data-end="8449" data-col-size="md"><a class="decorated-link" href="https://gcc.episciences.org/?utm_source=chatgpt.com" target="_new" rel="noopener" data-start="8419" data-end="8447">https://gcc.episciences.org/</a></td> </tr> </tbody> </table> </div> </div> <p data-start="8451" data-end="8699">Authors are encouraged to review each journal’s specific author guidelines, scope, publication charges (if any), indexing status and submission timeline. Final publication depends on acceptance by the chosen journal and compliance with their terms.</p> <hr data-start="8701" data-end="8704" /> <h5 data-start="8706" data-end="8737">9] Contact & Registration</h5> <ul data-start="8738" data-end="8870"> <li data-start="8738" data-end="8776"> <p data-start="8740" data-end="8776"><strong data-start="8740" data-end="8749">Email</strong>: <a class="decorated-link cursor-pointer" rel="noopener" data-start="8751" data-end="8774">contact@masteringup.com</a></p> </li> <li data-start="8777" data-end="8870"> <p data-start="8779" data-end="8870"><strong data-start="8779" data-end="8800">Registration Link</strong>: <a class="decorated-link" href="https://rzp.io/rzp/muconference" target="_new" rel="noopener" data-start="8802" data-end="8868">https://rzp.io/rzp/muconference</a></p> </li> </ul> <p data-start="8872" data-end="9015">We look forward to your participation and to your valuable contributions that will advance the field of cryptography and mathematical security.</p>

To register for this event please visit the following URL: https://rzp.io/rzp/muconference →

 

Date And Time

2026-09-19 @ 10:00 AM to
2026-09-19 @ 04:00 PM
 

Registration End Date

2026-09-18
 

Location

Online event
 

Event Types

 

Event Category

Share With Friends

Scroll to Top