| |||||||||||
JMC SIP 2023 : Journal of Mathematical Cryptology - Call for Special Issue proposals | |||||||||||
Link: https://www.degruyter.com/journal/key/jmc/html | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
CALL FOR SPECIAL ISSUE PROPOSALS
We invite groups of researchers, conference organizers, and individual scholars to submit their proposals for Special Issues to the 𝙅𝙊𝙐𝙍𝙉𝘼𝙇 𝙊𝙁 𝙈𝘼𝙏𝙃𝙀𝙈𝘼𝙏𝙄𝘾𝘼𝙇 𝘾𝙍𝙔𝙋𝙏𝙊𝙇𝙊𝙂𝙔. To submit your proposal, please, complete the 𝙎𝙥𝙚𝙘𝙞𝙖𝙡 𝙄𝙨𝙨𝙪𝙚 𝙥𝙧𝙤𝙥𝙤𝙨𝙖𝙡 𝙛𝙤𝙧𝙢 available on our website 𝗵𝘁𝘁𝗽𝘀://𝘄𝘄𝘄.𝗱𝗲𝗴𝗿𝘂𝘆𝘁𝗲𝗿.𝗰𝗼𝗺/𝗷𝗼𝘂𝗿𝗻𝗮𝗹/𝗸𝗲𝘆/𝗷𝗺𝗰/𝗵𝘁𝗺𝗹 and send it to the 𝗘𝗱𝗶𝘁𝗼𝗿𝗶𝗮𝗹 𝗢𝗳𝗳𝗶𝗰𝗲 - 𝗷𝗺𝗰_𝗲𝗱𝗶𝘁𝗼𝗿𝗶𝗮𝗹@𝗱𝗲𝗴𝗿𝘂𝘆𝘁𝗲𝗿.𝗰𝗼𝗺. ==== 𝗔𝗕𝗢𝗨𝗧 𝗧𝗛𝗜𝗦 𝗝𝗢𝗨𝗥𝗡𝗔𝗟 ==== 𝗝𝗼𝘂𝗿𝗻𝗮𝗹 𝗼𝗳 𝗠𝗮𝘁𝗵𝗲𝗺𝗮𝘁𝗶𝗰𝗮𝗹 𝗖𝗿𝘆𝗽𝘁𝗼𝗹𝗼𝗴𝘆 is a forum for original research articles in the area of mathematical cryptology. JMC is a fully peer-reviewed, open-access, electronic-only journal publishing works of wide significance, originality, and relevance. Works in the theory of cryptology and articles linking mathematics with cryptology (including quantum cryptology) are welcome. Submissions from all areas of mathematics significant for cryptology are invited, including but not limited to, algebra, algebraic geometry, coding theory, combinatorics, number theory, probability, and stochastic processes The scope includes mathematical results of algorithmic or computational nature that are of interest to cryptology. While JMC does not cover information security as a whole, the submission of manuscripts on information security with a strong mathematical emphasis is explicitly encouraged. Topics Boolean functions Elliptic curve cryptography Mathematical cryptology Information security Quantum cryptology Algebra Algebraic geometry Coding theory Combinatorics and graph theory Number theory Probability and stochastic processes Work linking math to cryptology Work in the mathematical foundations of crypto Theoretical Aspects of cryptology Mathematical foundations of Cryptology ==== 𝗘𝗗𝗜𝗧𝗢𝗥𝗜𝗔𝗟 ==== Editor-in-Chief Massimiliano Sala, Department of Mathematics, University of Trento, Italy Honorary Editor-in-Chief Nicolas Courtois, University College London, UK Editorial Advisory Board Timothy J. Hodges, University of Cincinnati, USA Wasim Alhamdani, School of Computer and Information Sciences, University of the Cumberlands, KY, USA Lejla Batina, Institute for Computing and Information Sciences, Radboud University, The Netherlands Joseph J. Boutros, Texas A&M University at Qatar, Doha, Qatar Ray CC Cheung, City University of Hong Kong, Hong Kong Bernardo David, IT-Universitetet i København, Copenhagen, Denmark Roberto De Prisco, Università di Salerno, Salerno, Italy Vipul Goyal, Carnegie Mellon University, Pittsburgh, USA Shay Gueron, University of Haifa and Intel Corporation, Israel Chunlei Li, Department of Informatics, University of Bergen, Norway Carlos Aguilar Melchor, ISAE-SUPAERO, Toulouse University, France Dominique Schröder, Department of Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany Gil Segev, School of Computer Science and Engineering, Hebrew University of Jerusalem Susanne Wetzel, Stevens Institute of Technology, Department of Computer Science, Castle Point on Hudson, USA Øyvind Ytrehus, Simula UiB AS, Norway Chao Zhang, School of Mathematics, Harbin Institute of Technology, China Editorial Board Boolean functions, symmetric cryptography and combinatorics Robert Coulter, University of Delaware, USA Daniel Panario, Carleton University, Canada Cloud encryption Ilaria Chillotti, Zama, France Miran Kim, Hanyang University, South Korea Romain Gay, IBM Research, Switzerland Cryptographic protocols Paolo D'Arco, University of Salerno, Italy Pascal Lafourcade, University of Clermont Auvergne, France Barbara Masucci, University of Salerno, Italy Number theory and cryptography Andrej Dujella, University of Zagreb, Croatia Federico Pintore, University of Bari, Italy Post-quantum cryptography Delaram Kahrobaei, City University of New York, USA Dmytro Savchuk, University of South Florida, USA Vladimir Shpilrain, University of New York, USA Quantum cryptography Aysajan Abidin, KU Leuven, Belgium, Other cryptographic functions and primitives Wai Ho Mow, Hong Kong University of Science and Technology, Hong Kong David Naccache, École Normale Supérieure, France Jacques Patarin, University of Versailles, France Jean-Jacques Quisquater, Université Catholique de Louvain (UCL), Belgium Tamir Tassa, The Open University of Israel, Israel Huaxiong Wang, Nanyang Technological University, Singapore Editorial Contact Kumaran Rengaswamy Assistant Managing Editor, Compuscript journal.editor@degruyter.com |
|