New Advances in Coding Theory and Cryptography, 2nd Edition
A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Computational and Applied Mathematics".
Deadline for manuscript submissions: 31 August 2024 | Viewed by 1748
Special Issue Editors
Interests: Internet of Things (IoT) security; applied cryptography; network security; computer security
Special Issues, Collections and Topics in MDPI journals
Interests: security; privacy; applied cryptography; blockchain
Special Issues, Collections and Topics in MDPI journals
Interests: authentication; identification; privacy
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
With the rapid development of information technology and advanced communications, new threats and malicious attackers have rapidly emerged, bringing serious challenges in the cybersecurity domain. Consequently, coding theory and cryptography have become common and indispensable to tackle security problems in both the academic and industrial communities.
Recent years have witnessed a proliferation of powerful coding and cryptographic algorithms, protocols, and systems which combine with promising technologies, including artificial intelligence, blockchain, cloud computing, digital twins, edge computing, etc. It is conducive for academic researchers and industry practitioners to exchange new ideas and discuss increasing technology convergence.
This Special Issue welcomes contributions from theory to practice and aims to publish high-quality and original research papers on various technologies for secure computing and communication. Topics include, but are not limited to, the following:
- Homomorphic encryption and attribute-based encryption;
- Zero knowledge proofs and secure multiparty computation;
- Authentication and key exchange;
- Lattice theory and its applications;
- Blockchain-based secure communication systems;
- Cloud security and privacy;
- Trustworthy digital twins in industrial IoT systems;
- Federated learning in edge computing;
- Vulnerabilities, attacks, and defenses;
- Privacy-preserving machine learning.
Prof. Dr. Liehuang Zhu
Dr. Meng Li
Dr. Zijian Zhang
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- encryption
- verifiable computing
- cryptographic protocols
- coding theory
- blockchain
- cloud security
- digital twins
- edge computing
- threat and attack
- machine learning