posted by system || 4936 views || tracked by 8 users: [display]

Cryp_book_C++ 2014 : Practical Cryptography: Algorithms & Implementations using C++


When N/A
Where USA
Abstract Registration Due Sep 15, 2013
Submission Deadline Dec 15, 2013
Notification Due Jan 15, 2014
Final Version Due Feb 28, 2014
Categories    cryptography   programming   C++   algorithms

Call For Papers


Tentative TITLE: Practical Cryptography: Algorithms & Implementations using C++
Editors: Saiful Azad and Al-Sakib Khan Pathan
To be Published by: CRC Press, Taylor & Francis Group, USA
Alternative URL:


Cryptography is the science which employs mathematical logic to keep the information secure. It enables someone to securely store sensitive information or transmit information securely through insecure networks from being hacked, masquerade, or alter. The history of cryptography starts from the ancient era when it was practiced by the secret societies or by the troops in the battle field. The necessity of such approach increases with time. In current Information era, there is indeed no time at which information security is not necessary and hence, cryptography. From military to civilian or from government to individual, information security is tremendously necessary. Consequently, several algorithms are proposed and they are implemented with various hardware. The basic idea of a cryptographic algorithm is to scramble information in such a way that illegitimate entities cannot unearth the concealed information. Cryptographic algorithms are also used to preserve the integrity of a message. Generally, a key or a set of keys is involved in encrypting a message. On the other hand, identical key or a set of identical keys is used by the legitimate party to decrypt the message. This book will detail all those state of art cryptographic algorithms and will also detail their implementations using C++ programming language.

Objectives of the Book

The main objective of this book is not only to describe the state of art cryptographic algorithms, but also to demonstrate how they can be implemented using a programming language, i.e., C++. Generally, the books which discuss cryptographic algorithms do not elaborate the implementation issues. Therefore, a gap between the understanding and the implementation remains unattained. The motivation of this book is to seal that leakage and to cater someone in such way that he/she will be capable of developing and implementing his/her own designed cryptographic algorithm.

Target Audiences

This book will be written for the graduate students of the universities. It can be utilized as a reference book to teach the courses like, cryptography, network security and other security related courses. It will also help professionals and researchers working in the field of computer and network security. Moreover, the book is expected to include some chapters written in tutorial style so that the general readers can be able to easily grasp some of the ideas in the relevant areas.

Tentative Chapters

The tentative chapters of the book is mentioned below, but not limited to:

Part A: Symmetric Key Algorithms
- Advanced Encryption Standard (AES) (description, algorithm & implementation)
. . . . . .

Part B: Asymmetric Key Algorithms
- Public Key Algorithms (general overview)
- ElGamal & Elliptic Curve Cryptography (descriptions, algorithms & implementations)
. . . . . .

Part C: Data Integrity Algorithms
- Authentication Functions & Hash Functions (general overview)
- Secured Hash Algorithm (description, algorithm & implementation)
- HMAC and CMAC (descriptions, algorithms & implementations)
- MD5 (description, algorithm & implementation)
. . . . . .

Part D: Authentication
- Authentication Protocols (general overview)
- Digital Signature Standard (description, algorithm & implementation)
. . . . . .

Submission Guidelines

Since the primary audience of this book is the graduate students of the universities, authors must take this into consideration when they prepare their chapters. All the algorithms in a chapter must include the related codes except the chapters for general overview. Each chapter must be written in a tutorial style. Manuscripts submitted for the book must be original.

Please follow A4 page format, single column with 11 point Times New Roman font with 1.5 line spacing while submitting your manuscript as MS-Office (i.e., doc or docx) document. If you have references in your chapter, please follow number style referencing as usually used for regular research papers, e.g., [1], [2], [3].

If you are planning to submit a chapter, please submit a proposal first before the relative deadline. The abstract/proposal could be within 500 words. The initial proposal must be submitted to the corresponding editor at (A CC to the co-editor at is welcome) with the subject “CRC_Crypt”. Deadline will be strictly followed in every case.

Submission Deadlines

Chapter Writing Proposal Submission Due: September 15, 2013
Full Manuscript Due: December 15, 2013
Notification of Acceptance/Revision/Rejection: January 15, 2013
Final/Revised Chapter Submission: February 28, 2014
Publication Time: 1st half of 2014 (tentative)


Saiful Azad, Ph.D. (Corresponding Editor)
Department of Computer Science
American International University – Bangladesh
House #55/B, Road # 21
Kemal Ataturk Avenue, Banani,
Dhaka - 1213, Bangladesh
Mobile: +8801719438821
Work phone: +8808814462, +8808816173-4


Al-Sakib Khan Pathan, Ph.D.
Department of Computer Science
Kulliyyah (Faculty) of Information and Communication Technology
International Islamic University Malaysia (IIUM)
Jalan Gombak, 53100, Kuala Lumpur, Malaysia
Tel: +603-61964000 Ext. 5653, Cell: +60163910754

Related Resources

MAAIDL 2020   Springer Book 'Malware Analysis using Artificial Intelligence and Deep Learning'
CAIJ 2020   Computer Applications: An International Journal
ACM-ACAI 2020-Ei/Scopus 2020   2020 3rd International Conference on Algorithms, Computing and Artificial Intelligence (ACAI 2020)
IJCIS 2020   International Journal on Cryptography and Information Security
20th ICTEL October, Dubai 2021   20th ICTEL 2021 – International Conference on Teaching, Education & Learning, 23-24 October, Dubai
IWCSP 2021   2021 International Workshop on Cryptography, Security and Privacy (IWCSP 2021)
17th ICTEL Rome 2021   17th ICTEL 2021 – International Conference on Teaching, Education & Learning, 06-07 September, Rome
SPPR 2020   9th International Conference on Signal, Image Processing and Pattern Recognition
IoT Edge Computing AI 2021   Edge Computing Optimization Using Artificial Intelligence Methods
ICBELLP - Eurasia Research 2021   2021 – XIXth International Conference on Business, Education, Law, Language & Psychology (ICBELLP), 29-30 October, Abu Dhabi