Topics of Interest

The International ISC Conference on Information Security and Cryptology welcomes researchers, developers, and practitioners to submit their original papers and organize workshops on all aspects of cryptology and information security. Our topics of interest include, but are not limited to:

Foundations of cryptology
  • Symmetric cryptographic algorithms
  • Asymmetric and cryptographic algorithms and digital signatures
  • Hash functions
  • Information-theoretic security
  • New methods in cryptography (functional cryptography, homomorphic cryptography, ...)
Implementation of cryptographic algorithms and related attacks
  • Software and hardware implementation of cryptographic algorithms
  • Side channel attacks and countermeasures
  • Embedded cryptographic systems
  • Hardware tampering and countermeasures
  • Cryptographic hardware accelerators
  • Verification and fault detection of implementations
Network security
  • Wireless and mobile network security
  • Security of network infrastructures
  • Security of network protocols and layers
  • Intrusion detection and prevention systems
  • Security of critical infrastructures
Cryptography and security models and protocols
  • Authentication and identification protocols
  • Anonymity, privacy, and trust management
  • Cryptanalysis of security protocols
  • Trust and security models
  • Formal methods in information security
  • Secure Multiparty Computation
Security of computation
  • Security in computer architecture
  • Operating system security
  • Database security
  • Analysis of security and vulnerability of software and application programs
  • Malware Analysis
  • Security and privacy in mobile devices and applications
  • Access control
Security and privacy management
  • Social engineering in security
  • Information security management system (ISMS)
  • Risk Management
  • Information security training
  • E-business and e-service security
  • E-health security
  • E-banking security
  • E-learning security
  • Privacy-Enhancing Technologies
Information hiding
  • New algorithms in steganography and watermarking
  • Steganalysis
  • Applications of Information hiding
Digital forensics
  • Digital forensics methods and tools 
  • Database and network forensics
  • Mobile device forensics 
  • Fraud detection
Recent topics in cryptography and security
  • Quantum cryptography
  • Post-quantum cryptography
  • Artificial Intelligence (AI) Security
  • Blockchain technology and cryptocurrency
  • Internet of Things (IoT), big data and cloud security
  • Cyber-physical systems security
  • Soft security

View: 105 Time(s)   |   Print: 14 Time(s)   |   Email: 0 Time(s)   |   0 Comment(s)