6th International Conference on Cryptography and Blockchain (CRBL 2026) May 23 ~ 24, 2026, Vancouver, Canada Scope & Topics 6th International Conference on Cryptography and Blockchain (CRBL 2026) serves as a premier global forum for presenting and exchanging the latest innovations, research findings, and practical advancements in cryptography, blockchain technologies, and their rapidly expanding application domains. As digital ecosystems continue to evolve at unprecedented speed, the need for secure, trustworthy, and scalable systems has never been more critical. CRBL 2026 brings together leading researchers, industry experts, and practitioners to explore breakthroughs that are shaping the future of secure computation, distributed systems, and decentralized technologies. The conference aims to foster collaboration between academia and industry by providing a vibrant platform for discussing emerging challenges, sharing innovative methodologies, and displaying transformative applications. Participants will have the opportunity to engage with pioneering work spanning foundational theory, applied research, system design, and realworld deployments. Authors are invited to submit original contributions including research papers, case studies, survey articles, and industrial experiences that highlight significant advances in the field. Submissions may address, but are not limited to, the following topics:
Topics of interest include, but are not limited to, the following Cryptography
- Foundations of Cryptography
- PublicKey Cryptography
- SymmetricKey Cryptography
- PostQuantum Cryptography
- QuantumSafe Cryptographic Protocols
- Cryptographic Protocols and Secure MultiParty Computation
- ZeroKnowledge Proofs and Succinct Proof Systems (SNARKs, STARKs, Bulletproofs)
- Homomorphic Encryption and Secure Computation
- Functional Encryption and AttributeBased Encryption
- Cryptanalysis and Security Proofs
- Key Management and Key Exchange Protocols
- Cryptography for PrivacyPreserving Machine Learning
Blockchain and Distributed Ledger Technologies
- Blockchain Consensus Mechanisms
- Blockchain Scalability (Layer2, Rollups, Sharding, State Channels)
- Blockchain Security and Attack Analysis
- Formal Verification of Smart Contracts
- Smart Contract Languages, Compilers, and Vulnerability Detection
- Tokenomics, Incentive Mechanisms, and GameTheoretic Security
- Blockchain Interoperability and CrossChain Protocols
- PrivacyEnhancing Technologies for Blockchain (Mixnets, ZKRollups, Confidential Transactions)
- Decentralized Identity and Authentication
- Blockchain for Digital Forensics and Auditability
- Blockchain Applications in IoT, Supply Chain, Finance, and Governance
- Decentralized Autonomous Organizations (DAOs): Security and Governance
- Blockchainbased Secure Data Sharing and Storage
- NextGeneration Blockchain Architectures and Novel DLT Designs
Systems, Network and Cybersecurity
- Access Control and Intrusion Detection
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Insider Threat Detection and Mitigation
- Security in Distributed Systems
- Secure Cloud Computing and Confidential Computing (TEE, SGX, SEV)
- Security for Mobile, IoT, and Edge Computing
- Sensor and Mobile AdHoc Network Security
- Security Engineering and Secure System Design
- Security Requirements, Threat Modeling, and Risk Analysis
- Software and Application Security
- Web and API Security
- Security Information Systems Architecture and Security Patterns
Privacy and Trust
- Privacy Preserving Technologies (Differential Privacy, Federated Learning Security)
- Trust Management and Trust Metrics
- Models for Authentication, Trust, and Authorization
- Untraceability and Anonymity Systems
- Information Hiding and Steganography
- Regulation, Compliance, and Trust Mechanisms (GDPR, eIDAS, etc.)
AI, Machine Learning and Security
- Machine Learning for Security (Malware Detection, Intrusion Detection, Threat Intelligence)
- Adversarial Machine Learning and Robustness
- AI Driven Cryptanalysis
- Reinforcement Learning for Security Automation
- Autonomous and Intelligent Security Agents
- Computational Intelligence in Security
Emerging and Interdisciplinary
- Quantum Cryptography and Quantum Networks
- BioInspired and Evolutionary Security Algorithms
- Autonomous and SelfOrganizing Security Systems
- Secure ECommerce and Digital Payment Systems
- Security in CyberPhysical Systems
- Secure Service and Systems Design with QoS Considerations
- Digital Asset Security (NFTs, Tokenized Assets, CBDCs)
- Secure Governance Models for Decentralized Systems
Paper Submission Authors are invited to submit papers through the conference Submission System by February 21, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference.The proceedings of the conference will be published by The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed). Selected papers from CRBL 2026, after further revisions, w ill be published in the special issue of the following journals. Important Dates | Submission Deadline | : | February 21, 2026 | | Authors Notification | : | March 28, 2026 | | Final Manuscript Due | : | April 04, 2026 |
Co - Located Events ***** The invited talk proposals can be submitted to crbl@crbl2026.org
|