The International Research Conference Aims and Objectives
The International Research Conference is a federated organization dedicated to bringing together a significant number of diverse scholarly events for presentation
within the conference program. Events will run over a span of time during the conference depending on the number and length of the presentations.
With its high quality, it provides an exceptional value for students, academics and industry researchers.
International Conference on Quantum Cryptography and Quantum Cryptanalysis
aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of
Quantum Cryptography and Quantum Cryptanalysis.
It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations,
trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Quantum Cryptography and Quantum Cryptanalysis.
Call for Contributions
Prospective authors are kindly encouraged to contribute to and help shape the conference through submissions of their research abstracts, papers and e-posters.
Also, high quality research contributions describing original and unpublished results of conceptual, constructive, empirical, experimental, or
theoretical work in all areas of Quantum Cryptography and Quantum Cryptanalysis are cordially invited for presentation at the conference.
The conference solicits contributions of abstracts, papers and e-posters that address themes and topics of the conference, including figures, tables and references of
novel research materials.
Guidelines for Authors
Please ensure your submission meets the conference's strict guidelines for accepting scholarly papers.
Downloadable versions of the check list for
Full-Text Papers and
Abstract Papers.
Please refer to the
Paper Submission Guideline,
Abstract Submission Guideline and
Author Information
before submitting your paper.
Conference Proceedings
All submitted conference papers will be blind peer reviewed by three competent reviewers.
The peer-reviewed conference proceedings are indexed in the Open Science Index,
Google Scholar,
Semantic Scholar,
Zenedo,
BASE,
WorldCAT,
Sherpa/RoMEO,
and other index databases. Impact Factor Indicators.
Special Journal Issues
19. International Conference on Quantum Cryptography and Quantum Cryptanalysis has teamed up with the Special Journal Issue on
Quantum Cryptography and Quantum Cryptanalysis.
A number of selected high-impact full text papers will also be considered for the special journal issues.
All submitted papers will have the opportunity to be considered for this Special Journal Issue.
The paper selection will be carried out during the peer review process as well as at the conference presentation stage.
Submitted papers must not be under consideration by any other journal or publication.
The final decision for paper selection will be made based on peer review reports by the Guest Editors and the Editor-in-Chief jointly.
Selected full-text papers will be published online free of charge.
Conference Sponsor and Exhibitor Opportunities
The Conference offers the opportunity to become a conference sponsor or exhibitor.
To participate as a sponsor or exhibitor, please download and complete the
Conference Sponsorship Request Form.
Selected Papers
-
Optimization of Shale Gas Production by Advanced Hydraulic Fracturing
Fazl Ullah, Rahmat Ullah
-
Towards the Design of a GIS-Linked Agent-Based Model for the Lake Chad Basin Region: Challenges and Opportunities
Stephen Akuma, Isaac Terngu Adom, Evelyn Doofan Akuma
-
Study of the Effect of Rotation on the Deformation of a Flexible Blade Rotor
Aref Maalej, Marwa Fakhfakh, Wael Ben Amira
-
Improving Urban Mobility: Analyzing Impacts of Connected and Automated Vehicles on Traffic and Emissions
Saad Roustom, Hajo Ribberink
-
Dynamic Simulation of a Hybrid Wind Farm with Wind Turbines and Distributed Compressed Air Energy Storage System
Eronini Umez-Eronini
-
Generating 3D Anisotropic Centroidal Voronoi Tessellations
Alexandre Marin, Alexandra Bac, Laurent Astart
-
Medical Imaging Fusion: A Teaching-Learning Simulation Environment
Cristina M. R. Caridade, Ana Rita F. Morais
-
Optimal Design of Motorcycle Crash Bar Using CAD and Finite Element Analysis
Sharon S. Wu, Yong S. Park
-
Research on a Forest Fire Spread Simulation Driven by the Wind Field in Complex Terrain
Ying Shang, Chencheng Wang
-
Coding Structures for Seated Row Simulation of an Active Controlled Vibration Isolation and Stabilization System for Astronaut’s Exercise Platform
Ziraguen O. Williams, Shield B. Lin, Fouad N. Matari, Leslie J. Quiocho
-
The Use of Fractional Brownian Motion in the Generation of Bed Topography for Bodies of Water Coupled with the Lattice Boltzmann Method
Elysia Barker, Jian Guo Zhou, Ling Qian, Steve Decent
-
Numerical Simulations of Frost Heave Using COMSOL Multiphysics Software in Unsaturated Freezing Soils
Sara Soltanpour, Adolfo Foriero
-
Decision Support System for Hospital Selection in Emergency Medical Services: A Discrete Event Simulation Approach
D. Tedesco, G. Feletti, P. Trucco
-
An Ecological Model for Three Species with Crowley–Martin Functional Response
Randhir Singh Baghel, Govind Shay Sharma
-
Thermal Analysis of a Transport Refrigeration Power Pack Unit Using a Coupled 1D/3D Simulation Approach
A. Kospach, A. Mladek, M. Waltenberger, F. Schilling
Digital Program consists of the e-proceedings book which is available online-only
and includes the conference communications (proceedings abstracts and papers).
Registered participants can access the digitally available conference
proceedings ( and certificates ) by visiting their profile pages.
Quantum cryptography
Quantum cryptography in theory
Limitations of modern cryptosystems
Implementing quantum cryptography
Quantum key distribution
Quantum commitment
Security analysis
Simulation
Quantum cryptanalysis
Bounded- and noisy-quantum-storage model
Position-based quantum cryptography
Device-independent quantum cryptography
Post-quantum cryptography
Desirable QKD attributes
Confidentiality of keys
Authentication
Sufficiently rapid key delivery
Robustness
Distances and location independence
Resistance to traffic analysis
The DARPA quantum network
QKD protocols implementation
MagiQ technologies
Authentication
Privacy amplification
Abstracts/Full-Text Paper Submission Deadline |
|
November 28, 2024 |
Notification of Acceptance/Rejection |
|
December 12, 2024 |
Final Paper (Camera Ready) Submission & Early Bird Registration Deadline |
|
February 10, 2025 |
Conference Dates |
|
March 03-04, 2025 |