12th International Conference on Cryptography and Information Security

CRIS 2026


Computer Security & Cryptography Security & Trust & Testing



12th International Conference on Cryptography and Information Security (CRIS 2026)



May 16 ~ 17, 2026, Zurich, Switzerland



https://cosit2026.org/cris/index



 



Scope & Topics



 



12th International Conference on Cryptography and Information Security (CRIS 2026) serves as a premier platform for presenting cutting edge research and advances in cryptography, coding theory, and information security. As digital systems continue to expand in scale, complexity, and societal impact, the need for robust security foundations and innovative protection mechanisms has never been greater. CRIS 2026 provides a peer reviewed forum for researchers, practitioners, and industry experts to share breakthroughs, exchange ideas, and explore emerging challenges across the full spectrum of security and cryptographic technologies.



 



The conference aims to bring together scientists, researchers, engineers, and students from academia, industry, and government to discuss novel theories, methodologies, applications, and practical implementations. Authors are invited to submit original research articles, case studies, survey papers, and industrial experiences that demonstrate significant progress, innovative approaches, or insightful perspectives in the conference’s areas of interest.



 



The conference welcomes contributions in all relevant domains, including but not limited to the following:



 




  1. Applied and theoretical cryptography

  2. Cryptographic protocols, secure multiparty computation, and zero knowledge proofs

  3. Post quantum cryptography and quantum resistant algorithms

  4. Quantum cryptography and quantum safe key exchange

  5. Blockchain security, consensus mechanisms, and cryptographic primitives for distributed ledgers

  6. Privacy enhancing technologies (PETs), including differential privacy and homomorphic encryption

  7. Secure key management, key exchange, and secret sharing

  8. Authentication, authorization, and access control

  9. Identity management, digital credentials, and decentralized identity

  10. Biometric security and privacy preserving biometrics

  11. Information hiding, steganography, and digital watermarking

  12. Data integrity, system integrity, and tamper resistant architectures

  13. Software security, secure coding, and vulnerability discovery

  14. Hardware and embedded system security (TPMs, TEEs, side channel attacks, fault injection)

  15. Trusted execution environments and confidential computing

  16. Network security, wireless security, and mobile system security

  17. IoT and cyber physical systems security

  18. Sensor network and ad hoc network security

  19. Cloud, edge, and distributed system security

  20. Web and browser security

  21. Security engineering, secure system design, and formal verification

  22. Security requirements, threat modeling, and risk assessment

  23. Intrusion detection, intrusion prevention, and anomaly detection

  24. Malware analysis, reverse engineering, and threat intelligence

  25. Vulnerability assessment, exploit mitigation, and attack surface reduction

  26. Insider threats, behavioral analytics, and organizational security

  27. Security management, governance, and policy

  28. Trust management, trust models, and reputation systems

  29. Privacy and data protection in distributed and pervasive environments

  30. Security and privacy in AI/ML systems

  31. Adversarial machine learning and robust model design

  32. Machine learning for security (intrusion detection, malware classification, fraud detection)

  33. Reinforcement learning and unsupervised learning for security analytics

  34. Secure federated learning and privacy preserving AI

  35. Blockchain based security applications and smart contract security

  36. Digital forensics, incident response, and cybercrime investigation

  37. Untraceability, anonymity systems, and anonymous communication networks

  38. Regulation, compliance, and trust mechanisms in digital ecosystems

  39. E commerce security, payment systems, and financial cryptography

  40. Security in pervasive, ubiquitous, and mobile computing

  41. Security in distributed ledger systems and decentralized applications

  42. Service oriented architectures, QoS, and secure systems design

  43. Emerging threats, novel attack vectors, and future security challenges



 



Paper Submission



 



Authors are invited to submit papers through the conference Submission System by February 07, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).



 



Selected papers from CRIS 2026, after further revisions, will be published in the special issues of the following journals



 




  1. International Journal on Cryptography and Information Security (IJCIS)

  2. The International Journal of Network Security & Its Applications (IJNSA) - ERA Indexed

  3. The International Journal of Wireless & Mobile Networks (IJWMN) - ERA Indexed

  4. International Journal of Security, Privacy and Trust Management (IJSPTM)

  5. Information Technology in Industry (ITII)



 



Important Dates



 




  1. Submission Deadline : February 07, 2026

  2. Authors Notification : March 28, 2026

  3. Registration & Camera-Ready Paper Due : April 04, 2026



 



Contact Us



 



Here's where you can reach us: cris@cosit2026.org or confecris26@gmail.com