allconferencecfpalerts
   

Event       Publishers
  • Home
  • Login
  • Categories
  • Archive
  • Post Cfp
  • Academic Resources
  • Contact Us

 

6th International Conference on Cryptography and Blockchain

google+
Views: 785                 

When :  2026-05-23

Where :  Vancouver, Canada

Submission Deadline :  2026-04-25

Categories :   Digital Signal & Image Processing ,  Computer Science & Information Technology ,  Information Technology Management ,  Artificial Intelligence

https://crbl2026.org/

6th International Conference on Cryptography and Blockchain (CRBL 2026)

May 23 ~ 24, 2026, Vancouver, Canada

Scope & Topics

6th International Conference on Cryptography and Blockchain (CRBL 2026) serves as a premier global forum for presenting and exchanging the latest innovations, research findings, and practical advancements in cryptography, blockchain technologies, and their rapidly expanding application domains. As digital ecosystems continue to evolve at unprecedented speed, the need for secure, trustworthy, and scalable systems has never been more critical. CRBL 2026 brings together leading researchers, industry experts, and practitioners to explore breakthroughs that are shaping the future of secure computation, distributed systems, and decentralized technologies.

The conference aims to foster collaboration between academia and industry by providing a vibrant platform for discussing emerging challenges, sharing innovative methodologies, and displaying transformative applications. Participants will have the opportunity to engage with pioneering work spanning foundational theory, applied research, system design, and realworld deployments.

Authors are invited to submit original contributions including research papers, case studies, survey articles, and industrial experiences that highlight significant advances in the field. Submissions may address, but are not limited to, the following topics:

Topics of interest include, but are not limited to, the following

    Cryptography

  • Foundations of Cryptography
  • PublicKey Cryptography
  • SymmetricKey Cryptography
  • PostQuantum Cryptography
  • QuantumSafe Cryptographic Protocols
  • Cryptographic Protocols and Secure MultiParty Computation
  • ZeroKnowledge Proofs and Succinct Proof Systems (SNARKs, STARKs, Bulletproofs)
  • Homomorphic Encryption and Secure Computation
  • Functional Encryption and AttributeBased Encryption
  • Cryptanalysis and Security Proofs
  • Key Management and Key Exchange Protocols
  • Cryptography for PrivacyPreserving Machine Learning

    Blockchain and Distributed Ledger Technologies

  • Blockchain Consensus Mechanisms
  • Blockchain Scalability (Layer2, Rollups, Sharding, State Channels)
  • Blockchain Security and Attack Analysis
  • Formal Verification of Smart Contracts
  • Smart Contract Languages, Compilers, and Vulnerability Detection
  • Tokenomics, Incentive Mechanisms, and GameTheoretic Security
  • Blockchain Interoperability and CrossChain Protocols
  • PrivacyEnhancing Technologies for Blockchain (Mixnets, ZKRollups, Confidential Transactions)
  • Decentralized Identity and Authentication
  • Blockchain for Digital Forensics and Auditability
  • Blockchain Applications in IoT, Supply Chain, Finance, and Governance
  • Decentralized Autonomous Organizations (DAOs): Security and Governance
  • Blockchainbased Secure Data Sharing and Storage
  • NextGeneration Blockchain Architectures and Novel DLT Designs

    Systems, Network and Cybersecurity

  • Access Control and Intrusion Detection
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • Insider Threat Detection and Mitigation
  • Security in Distributed Systems
  • Secure Cloud Computing and Confidential Computing (TEE, SGX, SEV)
  • Security for Mobile, IoT, and Edge Computing
  • Sensor and Mobile AdHoc Network Security
  • Security Engineering and Secure System Design
  • Security Requirements, Threat Modeling, and Risk Analysis
  • Software and Application Security
  • Web and API Security
  • Security Information Systems Architecture and Security Patterns

    Privacy and Trust

  • Privacy Preserving Technologies (Differential Privacy, Federated Learning Security)
  • Trust Management and Trust Metrics
  • Models for Authentication, Trust, and Authorization
  • Untraceability and Anonymity Systems
  • Information Hiding and Steganography
  • Regulation, Compliance, and Trust Mechanisms (GDPR, eIDAS, etc.)

    AI, Machine Learning and Security

  • Machine Learning for Security (Malware Detection, Intrusion Detection, Threat Intelligence)
  • Adversarial Machine Learning and Robustness
  • AI Driven Cryptanalysis
  • Reinforcement Learning for Security Automation
  • Autonomous and Intelligent Security Agents
  • Computational Intelligence in Security

    Emerging and Interdisciplinary

  • Quantum Cryptography and Quantum Networks
  • BioInspired and Evolutionary Security Algorithms
  • Autonomous and SelfOrganizing Security Systems
  • Secure ECommerce and Digital Payment Systems
  • Security in CyberPhysical Systems
  • Secure Service and Systems Design with QoS Considerations
  • Digital Asset Security (NFTs, Tokenized Assets, CBDCs)
  • Secure Governance Models for Decentralized Systems

Paper Submission

Authors are invited to submit papers through the conference Submission System by April 25, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.The proceedings of the conference will be published by The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Selected papers from CRBL 2026, after further revisions, w ill be published in the special issue of the following journals.

  • International Journal of Wireless & Mobile Networks (IJWMN) - ERA Indexed
  • International Journal of Computer Networks & Communications (IJCNC) - Scopus, ERA Indexed
  • International Journal on Cryptography and Information Security ( IJCIS)
  • International Journal of Security, Privacy and Trust Management ( IJSPTM )
  • International Journal of Network Security & Its Applications (IJNSA)- ERA Indexed
  • International Journal of Multimedia & Its Applications (IJMA)
  • Information Technology in Industry (ITII)

Important Dates

Submission Deadline: April 25, 2026
Authors Notification: May 09, 2026
Final Manuscript Due: May 16, 2026

Co - Located Events


  • 15th International Conference on Artificial Intelligence and Soft Computing (AISO 2026)
  • 15th International Conference on Signal & Image Processing (SIP 2026)
  • 13th International Conference on Wireless and Mobile Network (WiMNeT 2026)
  • 6th International Conference on NLP & Data Mining (NLDM 2026)
  • 6th International Conference on Big Data, IoT and Machine Learning (BIOM 2026)
  • 5th International Conference on Software Engineering Advances and Formal Methods (SOFTFM 2026)
  • 5th International Conference on Education, Pedagogy and Technology (EDUPT 2026)
  • 10th International Conference on Computer Science and Information Technology (COMIT 2026)

***** The invited talk proposals can be submitted to crbl@crbl2026.org

User Name : Marina
Posted 08-08-2025 on 22:08:41 AEDT


Related CFPs

IPPR 2026   12th International Conference on Image Processing and Pattern Recognition (IPPR 2026)
AIDMK 2026   14th International Conference on Artificial Intelligence, Data Mining & Knowledge Management (AIDMK 2026)
ICAITA 2026   15th International Conference on Advanced Information Technologies and Applications (ICAITA 2026)
ICASIS 2026   The 4th International Conference on Advanced Sensing and Intelligent Systems

All Rights Reserved @ Call for Papers - Conference & Journals