Call for Papers

This conference seeks submissions from the academia and industry presenting research on theoretical and practical aspects of cryptology. We also encourage submissions from other communities such as public agencies, defense and business sectors that represent these communities's perspectives on issues related to security.
 
   
 
The top 30% - 35% of the papers accepted will be offered to be published in the Malaysian Journal of Mathematical Sciences (ISSN 1823-8343). It is indexed by SCOPUS.
CRYPTOLOGY 2012
CRYPTOLOGY 2014
CRYPTOLOGY 2016
CRYPTOLOGY 2018
CRYPTOLOGY 2020
  The top 35% - 60% of the papers accepted will be offered to be published in the International Journal of Cryptology Research (ISSN 1985-5753).   Authors of accepted papers can choose to publish in the conference proceedings indexed by SCOPUS.
CRYPTOLOGY 2014
CRYPTOLOGY 2016
CRYPTOLOGY 2018
CRYPTOLOGY 2020.

Previous proceedings since 2014 can be accessed at
https://mscr.org.my/proceedings
 
Note: Participants are encouraged to prepare their manuscripts by using LaTeX.
 
Topics:
1. Cryptography And Security   25. Information Security Education
2. Key Management Protocols   26. Information Security Management
3. Block/Stream Ciphers   27. Information Technology Mis-Use and the Law
4. Watermarking and Fingerprinting   28. Information hiding and watermarking
5. Quantum Cryptography   29. Malware threat and detection
6. Hash Functions   30. Mobile and wireless security
7. Number Theory   31. Access control and authentication
8. Electronic Commerce and Payment   32. Cloud and big data security
9. Elliptic Curve Cryptography   33. Critical Infrastructure Protection
10.Secret Key Cryptography   34. Data and Applications Security
11. Public Key Cryptography   35. Digital Forensics
12. Anonymity   36. Human Aspects of Information Security and Assurance
13. Digital Signature Schemes   37. Identity Management
14. Message Authentication Codes   38. Managing information security functions
15. Public-Key Cryptanalysis   39. Multilateral Security
16. Symmetric-key Cryptanalysis   40. Network & Distributed Systems Security
17. Group Communication   41. Pervasive Systems Security
18. Information Theory and Security   42. Privacy protection
19. Secret Sharing   43. Trust Management
20. Cryptanalysis   44. Audit and risk analysis
21. Threshold Cryptography        
22. Design and Implementation        
23. Broadcast Encryption        
24. Applications of Cryptography        
 
 
Proceedings:
CRYPTOLOGY2022 proceedings will be published by Conference Publishing Services. It is mandatory at least an author registers for every paper that is included in the conference proceedings. Proceedings will be made available during the conference.
 
Announcement: Due to new MJMS ruling, articles to be published via MJMS will incur an Article Processing Charge (APC) totaling USD300. For CRYPTOLOGY2022 participants deciding to publish via MJMS, the conference will absorb USD50 from the fees. The discounted APC is USD250. All participants deciding to publish via MJMS will be provided a separate invoice from MJMS. The MJMS APC is not included in the conference fee. Furthermore, accepted articles for CRYPTOLOGY2022 will only be allowed one publication avenue; either CRYPTOLOGY2022 Scopus indexed conference proceedings or MJMS. There will be no APC for the conference proceedings.