Welcome to CRYPIS 2025

14th International Conference on Cryptography and Information Security (CRYPIS 2025)

September 20 ~ 21, 2025, Copenhagen, Denmark

Hybrid--Registered authors can present their work online or face to face New

Program Committee

More Details...



Accepted Papers

More Details...



Copenhagen, Denmark

More Details...



Scope

14th International Conference on Cryptography and Information Security (CRYPIS 2025) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of Cryptography, Coding and Information security.


Call for Papers


14th International Conference on Cryptography and Information Security (CRYPIS 2025) focuses on cutting-edge results in Applied Cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of Cryptography, Coding and Information security.

Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to:

Topics of interest include, but are not limited to, the following


  • Access Control and Intrusion Detection
  • Artificial Immune Systems
  • Authentication
  • Authentication and Non-repudiation
  • Autonomy-Oriented Computing
  • Biological & Evolutionary Computation
  • Biometric Security
  • Coevolutionary Algorithms
  • Computational Intelligence in Security
  • Cryptographic Protocols
  • Cryptography and Coding
  • Data Integrity
  • Fuzzy Systems
  • Identification and Authentication
  • Insider Threats and Countermeasures
  • Intelligent Agents and Systems
  • Intrusion Detection & Prevention
  • Intrusion Detection and Vulnerability Assessment
  • Key Management
  • Models for Authentication, Trust and Authorization
  • Privacy and Authentication
  • Quantum Cryptography
  • Regulation and Trust Mechanisms
  • Reinforcement & Unsupervised Learning
  • Secure Cloud Computing
  • Security and Privacy in Mobile Systems
  • Security and Privacy in Pervasive/Ubiquitous Computing
  • Security and Privacy in Web Services
  • Security and Privacy Policies
  • Security Area Control
  • Security Deployment
  • Security Engineering
  • Security for Grid Computing
  • Security in Distributed Systems
  • Security Information Systems Architecture and Design and Security Patterns
  • Security Management
  • Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.)
  • Sensor and Mobile Ad Hoc Network Security
  • Service and Systems Design and QoS Network Security
  • Software Security
  • Trust Management
  • Trust Models and Metrics
  • Untraceability

Paper Submission

Authors are invited to submit papers through the conference Submission System by April 26, 2025. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS & IT) series (Confirmed).

Important Dates

Submission Deadline

April 26, 2025

Authors Notification

July 05, 2025

Registration & camera - Ready Paper Due

July 12, 2025

Proceedings

Hard copy of the proceedings will be distributed during the Conference. The softcopy will be available on AIRCC Digital Library

Sponsors