Our primary mission is to create a specialized platform fostering exploration and collaboration among researchers, cryptographers, and cybersecurity experts, bridging the gap between cryptography and information security. We are dedicated to publishing top-notch research papers and reviews, spotlighting cryptographic techniques and their practical application across diverse domains, bolstering information security. Our journal aims to encourage vibrant knowledge exchange and collaboration between professionals in cryptography and information security fields. Moreover, we strive to promote the development of secure systems and protocols by seamlessly integrating cryptography into various aspects of information security. Our commitment to open access ensures accessibility and drives progress in safeguarding our digital future.
Our primary mission is to create a specialized platform fostering exploration and collaboration among researchers, cryptographers, and cybersecurity experts, bridging the gap between cryptography and information security. We are dedicated to publishing top-notch research papers and reviews, spotlighting cryptographic techniques and their practical application across diverse domains, bolstering information security. Our journal aims to encourage vibrant knowledge exchange and collaboration between professionals in cryptography and information security fields. Moreover, we strive to promote the development of secure systems and protocols by seamlessly integrating cryptography into various aspects of information security. Our commitment to open access ensures accessibility and drives progress in safeguarding our digital future.
CiphIR invites authors to contribute original research and review articles that emphasize the integration of cryptography and information security, with a specific focus on the following topics:
- Cryptographic Primitives and Protocols for Information Security
- Cryptanalysis and Security Evaluation of Cryptosystems
- Post-Quantum Cryptography and Quantum-Resistant Protocols
- Homomorphic Encryption and Secure Multi-Party Computation
- Cryptography for Privacy-Preserving Technologies
- Cryptographic Key Management and Distribution
- Secure Authentication and Authorization Mechanisms
- Cryptography in Blockchain and Distributed Ledger Systems
- Cryptography for Cloud Security and Data Protection
- Hardware Security and Trustworthy Computing
- Cryptography for Internet of Things (IoT) Security
- Cryptographic Solutions for Mobile and Wireless Security
- Cryptography in Secure Communication and VPNs
- Cryptography Policy, Legal Aspects, and Standardization
- Secure Cryptographic Implementations and Side-Channel Attacks