The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
ICMCA 2021: 15. International Conference on Mathematical Cryptology and Applications
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Mathematical Cryptology and Applications.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Mathematical Cryptology and Applications
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Mathematical Cryptology and Applications are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
OpenAIRE,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
ICMCA 2021 has teamed up with the Special Journal Issue on
Mathematical Cryptology and Applications.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Eight-State BB84: A C# Simulation
Liliana Zisu
-
Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Georgi Bebrov, Rozalina Dimova
-
Analysis of Network Performance Using Aspect of Quantum Cryptography
Nisarg A. Patel, Hiren B. Patel
-
An Authentication Protocol for Quantum Enabled Mobile Devices
Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
-
Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Adi A. Maaita, Hamza A. A. Al_Sewadi
-
Higher-Dimensional Quantum Cryptography
Bradley Christensen, Kevin T. McCusker, Daniel J. Gauthier, Daniel Kumor,Venkat Chandar, P. G. Kwiat
-
Hierarchies Based On the Number of Cooperating Systems of Finite Automata on Four-Dimensional Input Tapes
Makoto Sakamoto, Yasuo Uchida, Makoto Nagatomo, Takao Ito,Tsunehiro Yoshinaga,Satoshi Ikeda,Masahiro Yokomichi, Hiroshi Furutani
-
Efficient and Effective Gabor Feature Representation for Face Detection
Yasuomi D. Sato, Yasutaka Kuriya
-
Computational Aspects of Regression Analysis of Interval Data
Michal Cerny
-
A New Heuristic Approach for Large Size Zero-One Multi Knapsack Problem Using Intercept Matrix
K. Krishna Veni, S. Raja Balachandar
-
A Multi-Signature Scheme based on Coding Theory
Mohammed Meziani, Pierre-Louis Cayrel
-
Dual Construction of Stern-based Signature Scheme
Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui
-
A New Heuristic Approach for the Large-Scale Generalized Assignment Problem
S. Raja Balachandar, K.Kannan
-
Novel Method for Elliptic Curve Multi-Scalar Multiplication
Raveen R. Goundar, Ken-ichi Shiota, Masahiko Toyonaga
-
A Signal Driven Adaptive Resolution Short-Time Fourier Transform
Saeed Mian Qaisar, Laurent Fesquet, Marc Renaudin
Digital Program consists of the e-proceedings book which is available online-only
and includes the conference communications (proceedings abstracts and papers).
Registered participants can access the digitally available conference
proceedings ( and certificates ) by visiting their profile pages.
Mathematical cryptology
Advances in mathematical cryptology
Mathematical cryptology and applications
Some classical cryptosystems and cryptanalyses
Transferring secret information
Discrete logarithms and Diffie-hellman
Integer factorization and RSA
Probability theory and information theory
Elliptic curves and cryptography
Lattices and cryptography
Digital signatures
Primality and integer factorization
Secure encryption schemes based on group theory
Multivariate polynomial cryptosystems. Gröbner bases
Elliptic and hyperelliptic curve cryptosystems
Computational complexity
Lattice-based cryptosystems
Computational number theory in cryptology
Pseudorandom sequence generators for stream ciphers
Public key cryptosystem based on algebraic coding theory
Quantum cryptography
Information security with mathematical emphasis
Asymmetric provably secure cryptography
Cryptographic primitives
Lattice-based security reductions
Leakage-resilient cryptography
Pairing-based provably secure cryptography
Privacy and anonymity technologies
Provable secure block ciphers and hash functions
Secure cryptographic protocols and applications
Security notions, approaches, and paradigms
Steganography and steganalysis
Abstracts/Full-Text Paper Submission Deadline |
|
April 15, 2021 |
Notification of Acceptance/Rejection |
|
April 30, 2021 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
June 08, 2021 |
Conference Dates |
|
August 09-10, 2021 |
Liliana Zisu |
Technical Military Academy of Bucharest, RO |
Saroj Rani |
S.A. Jain College, Kurukshetra University, India, IN |
Adi Maaita |
Isra University, Jordan |
Ruma Ajeena |
University of Babylon, IQ |
Selvakumar Ramachandran |
VIT University, IN |
Aderemi Elisha Okeyinka |
Ondo State University of Science and Technology, NG |
Dimitrios Zissis |
University of the Aegean, GR |
SAPNA JAIN |
UNIVERSITY OF DELHI, IN |
Michal Cerny |
University of Economics, Prague / Czech Technical University, CZ |
Skander Aris |
Mentouri University, DZ |
Marco Antonio Cruz Chávez |
Autonomous University of Morelos State, MX |
Tunde Olabiyisi |
Ladoke Akintola University of Technology, NG |
Participation Type |
Early Registration Ticket Fees |
Registration Ticket Fees |
Non-Student Oral/Poster Presenter Registration |
€ 450 |
€ 500 |
Student Oral/Poster Presenter Registration |
€ 350 |
€ 400 |
Listener Registration |
€ 250 |
€ 300 |
Additional Paper Publication |
€ 100 |
All conference materials and services will be delivered digitally to the participant with the online conference management system.
Conference registration includes the following digital materials and services:
- e-certificates [for Authors: Certificate of Attendance and Presentation; for Listeners: Certificate of Attendance; for Chairs: Certificate of Attendance and Appreciation; for Presenters: Certificate of Best Presentation (if conferred based appraisal)]
- e-program
- e-book
- e-name badge
- e-receipt
- e-presentation
Presentation Types:
-
Physical presentation is an oral conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
-
Digital presentation is a digital conferencing presentation that is made using digital technology including embedded digital elements ( texts, tables, graphs, or videos ) for PowerPoint sharing.
Early Bird Registration
Early Bird registration is valid until 2021-06-08 23:59:59
Online Credit Card Processing
Online payment option available for author
and listener delegates.
Conference participants can make online credit card payments for conference registration fees.