Data base for:

  • Conferences
  • Research funding opportunities
  • Competitions / Awards

Register for free and add any data by yourself!

See How to

Filter conferences

 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
 
      
      
 
      
 
      
      
      
      
      
      
      
      
      
      

6th International Conference on Cryptography and Blockchain (CRBL 2026)

CRBL 2026

Categories

Date of beginning

Saturday, 23 May 2026

Duration

2 days

Deadline for abstracts

Saturday, 25 April 2026

City

Vancouver, Canada

Country

Canada

Contact

CRBL

E-Mail

This email address is being protected from spambots. You need JavaScript enabled to view it.

Expected participants

50

Memo

6th International Conference on Cryptography and Blockchain (CRBL 2026) May 23 ~ 24, 2026, Vancouver, Canada https://crbl2026.org/ Scope  6th International Conference on Cryptography and Blockchain (CRBL 2026) serves as a premier global forum for presenting and exchanging the latest innovations, research findings, and practical advancements in cryptography, blockchain technologies, and their rapidly expanding application domains. As digital ecosystems continue to evolve at unprecedented speed, the need for secure, trustworthy, and scalable systems has never been more critical. CRBL 2026 brings together leading researchers, industry experts, and practitioners to explore breakthroughs that are shaping the future of secure computation, distributed systems, and decentralized technologies. The conference aims to foster collaboration between academia and industry by providing a vibrant platform for discussing emerging challenges, sharing innovative methodologies, and displaying transformative applications. Participants will have the opportunity to engage with pioneering work spanning foundational theory, applied research, system design, and realworld deployments. Authors are invited to submit original contributions including research papers, case studies, survey articles, and industrial experiences that highlight significant advances in the field. Submissions may address, but are not limited to, the following topics: Topics of Interest Cryptography   Foundations of Cryptography PublicKey Cryptography SymmetricKey Cryptography PostQuantum Cryptography QuantumSafe Cryptographic Protocols Cryptographic Protocols and Secure MultiParty Computation ZeroKnowledge Proofs and Succinct Proof Systems (SNARKs, STARKs, Bulletproofs) Homomorphic Encryption and Secure Computation Functional Encryption and AttributeBased Encryption Cryptanalysis and Security Proofs Key Management and Key Exchange Protocols Cryptography for PrivacyPreserving Machine Learning Blockchain and Distributed Ledger Technologies Blockchain Consensus Mechanisms Blockchain Scalability (Layer2, Rollups, Sharding, State Channels) Blockchain Security and Attack Analysis Formal Verification of Smart Contracts Smart Contract Languages, Compilers, and Vulnerability Detection Tokenomics, Incentive Mechanisms, and GameTheoretic Security Blockchain Interoperability and CrossChain Protocols PrivacyEnhancing Technologies for Blockchain (Mixnets, ZKRollups, Confidential Transactions) Decentralized Identity and Authentication Blockchain for Digital Forensics and Auditability Blockchain Applications in IoT, Supply Chain, Finance, and Governance Decentralized Autonomous Organizations (DAOs): Security and Governance Blockchainbased Secure Data Sharing and Storage NextGeneration Blockchain Architectures and Novel DLT Designs Systems, Network and Cybersecurity   Access Control and Intrusion Detection Intrusion Detection and Prevention Systems (IDS/IPS) Insider Threat Detection and Mitigation Security in Distributed Systems Secure Cloud Computing and Confidential Computing (TEE, SGX, SEV) Security for Mobile, IoT, and Edge Computing Sensor and Mobile AdHoc Network Security Security Engineering and Secure System Design Security Requirements, Threat Modeling, and Risk Analysis Software and Application Security Web and API Security Security Information Systems Architecture and Security Patterns Privacy and Trust Privacy Preserving Technologies (Differential Privacy, Federated Learning Security) Trust Management and Trust Metrics Models for Authentication, Trust, and Authorization Untraceability and Anonymity Systems Information Hiding and Steganography Regulation, Compliance, and Trust Mechanisms (GDPR, eIDAS, etc.) AI, Machine Learning and Security Machine Learning for Security (Malware Detection, Intrusion Detection, Threat Intelligence) Adversarial Machine Learning and Robustness AI Driven Cryptanalysis Reinforcement Learning for Security Automation Autonomous and Intelligent Security Agents Computational Intelligence in Security   Emerging and Interdisciplinary Quantum Cryptography and Quantum Networks BioInspired and Evolutionary Security Algorithms Autonomous and SelfOrganizing Security Systems Secure ECommerce and Digital Payment Systems Security in CyberPhysical Systems Secure Service and Systems Design with QoS Considerations Digital Asset Security (NFTs, Tokenized Assets, CBDCs) Secure Governance Models for Decentralized Systems Paper Submission Authors are invited to submit papers through the Submission System by May 02,  2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series(Confirmed). Selected papers from CRBL 2026, after further revisions, will be published in the special issue of the following journals International Journal of Wireless & Mobile Networks (IJWMN) – ERA Indexed International Journal of Computer Networks & Communications (IJCNC) – Scopus, ERA Indexed International Journal on Cryptography and Information Security ( IJCIS) International Journal of Security, Privacy and Trust Management ( IJSPTM ) International Journal of Network Security & Its Applications (IJNSA) International Journal of Multimedia & Its Applications (IJMA) Information Technology in Industry (ITII)   Important Dates (2nd Batch : Submissions after March 15, 2026) Submission Deadline: May 02, 2026 Authors Notification: May 16, 2026 Registration & Camera-Ready Paper Due: May 19, 2026 Contact Us Here’s where you can reach us : This email address is being protected from spambots. You need JavaScript enabled to view it. or This email address is being protected from spambots. You need JavaScript enabled to view it.