Symmetry in Security and Theoretical Computer Science

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 March 2025 | Viewed by 62

Special Issue Editors


E-Mail Website
Guest Editor
Chair of Security and Theoretical Computer Science, University of Tartu, Tartu, Estonia
Interests: cryptography; cyber security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
CEiiA Centro de Engenharia e Desenvolvimento de Produto, Matosinhos, Porto, Portugal
Interests: computer networks; next-generation networks; computer network security

Special Issue Information

Dear Colleagues,

The purpose of this Special Issue is to present the new advances, explorations, challenges, and solutions in applications, services, formal analysis, mathematical modeling, cryptographic methods, cyber security research, and development for the pre- and post-quantum era. Topics of interest include discoveries of theoretical computer science for emerging cyber security and cryptographic issues. Moreover, new security countermeasures and design methodologies for cryptographic protocols are focused on considering symmetry and theoretical computer science. The editors are looking forward to recent advances in related research, not limited to the following topics, providing a platform for researchers from both academia and industry to exchange their innovative ideas, theories, and applications.

Topics of interest include, but are not limited to, the following:

  • Theoretical computer science for cryptography.
  • Computer algebra with applications in cryptography.
  • Formal verification and analysis of cryptographic protocols.
  • Post-quantum cryptography.
  • Efficient cryptographic computations.
  • Security and privacy.
  • Risk analysis, vulnerability analysis, and threat management.
  • Authentication and access control.
  • Blockchain solutions for cyber security.
  • Cyber security solutions for avionics.
  • Malicious software detection methods.
  • Malware analysis.
  • IoT security.
  • V2X security and privacy.
  • Information-centric networking security (CDNs, CCNs, and NDNs).
  • Cloud computing security and privacy.
  • Side-channel attacks and countermeasures.
  • Lightweighted micro-service security practices.
  • ML/DL/FL algorithms for cyber security.

Prof. Dr. Sedat Akleylek
Dr. Ertuğrul Doğruluk
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • post-quantum cryptography
  • theoretical computer science
  • cyber security
  • efficient implementations of cryptographic schemes
  • formal analysis
  • malware analysis

Published Papers

This special issue is now open for submission.
Back to TopTop