Scope

6th International Conference on Cryptography and Blockchain (CRBL 2026)

Topics

Cryptography, Cybersecurity, Blockchain, Privacy and Trust

Submission System

Authors are invited to submit papers through the Conference Submission System.

Proceedings

Hard copy of the proceedings will be distributed during the Conference.

Welcome to CRBL 2026!

Scope 

6th International Conference on Cryptography and Blockchain (CRBL 2026) serves as a premier global forum for presenting and exchanging the latest innovations, research findings, and practical advancements in cryptography, blockchain technologies, and their rapidly expanding application domains. As digital ecosystems continue to evolve at unprecedented speed, the need for secure, trustworthy, and scalable systems has never been more critical. CRBL 2026 brings together leading researchers, industry experts, and practitioners to explore breakthroughs that are shaping the future of secure computation, distributed systems, and decentralized technologies.

The conference aims to foster collaboration between academia and industry by providing a vibrant platform for discussing emerging challenges, sharing innovative methodologies, and displaying transformative applications. Participants will have the opportunity to engage with pioneering work spanning foundational theory, applied research, system design, and realworld deployments.

Authors are invited to submit original contributions including research papers, case studies, survey articles, and industrial experiences that highlight significant advances in the field. Submissions may address, but are not limited to, the following topics:



Topics of Interest

    Cryptography

  • Foundations of Cryptography
  • PublicKey Cryptography
  • SymmetricKey Cryptography
  • PostQuantum Cryptography
  • QuantumSafe Cryptographic Protocols
  • Cryptographic Protocols and Secure MultiParty Computation
  • ZeroKnowledge Proofs and Succinct Proof Systems (SNARKs, STARKs, Bulletproofs)
  • Homomorphic Encryption and Secure Computation
  • Functional Encryption and AttributeBased Encryption
  • Cryptanalysis and Security Proofs
  • Key Management and Key Exchange Protocols
  • Cryptography for PrivacyPreserving Machine Learning

  • Blockchain and Distributed Ledger Technologies

  • Blockchain Consensus Mechanisms
  • Blockchain Scalability (Layer2, Rollups, Sharding, State Channels)
  • Blockchain Security and Attack Analysis
  • Formal Verification of Smart Contracts
  • Smart Contract Languages, Compilers, and Vulnerability Detection
  • Tokenomics, Incentive Mechanisms, and GameTheoretic Security
  • Blockchain Interoperability and CrossChain Protocols
  • PrivacyEnhancing Technologies for Blockchain (Mixnets, ZKRollups, Confidential Transactions)
  • Decentralized Identity and Authentication
  • Blockchain for Digital Forensics and Auditability
  • Blockchain Applications in IoT, Supply Chain, Finance, and Governance
  • Decentralized Autonomous Organizations (DAOs): Security and Governance
  • Blockchainbased Secure Data Sharing and Storage
  • NextGeneration Blockchain Architectures and Novel DLT Designs

  • Systems, Network and Cybersecurity

  • Access Control and Intrusion Detection
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • Insider Threat Detection and Mitigation
  • Security in Distributed Systems
  • Secure Cloud Computing and Confidential Computing (TEE, SGX, SEV)
  • Security for Mobile, IoT, and Edge Computing
  • Sensor and Mobile AdHoc Network Security
  • Security Engineering and Secure System Design
  • Security Requirements, Threat Modeling, and Risk Analysis
  • Software and Application Security
  • Web and API Security
  • Security Information Systems Architecture and Security Patterns

  • Privacy and Trust

  • Privacy Preserving Technologies (Differential Privacy, Federated Learning Security)
  • Trust Management and Trust Metrics
  • Models for Authentication, Trust, and Authorization
  • Untraceability and Anonymity Systems
  • Information Hiding and Steganography
  • Regulation, Compliance, and Trust Mechanisms (GDPR, eIDAS, etc.)

  • AI, Machine Learning and Security

  • Machine Learning for Security (Malware Detection, Intrusion Detection, Threat Intelligence)
  • Adversarial Machine Learning and Robustness
  • AI Driven Cryptanalysis
  • Reinforcement Learning for Security Automation
  • Autonomous and Intelligent Security Agents
  • Computational Intelligence in Security

  • Emerging and Interdisciplinary

  • Quantum Cryptography and Quantum Networks
  • BioInspired and Evolutionary Security Algorithms
  • Autonomous and SelfOrganizing Security Systems
  • Secure ECommerce and Digital Payment Systems
  • Security in CyberPhysical Systems
  • Secure Service and Systems Design with QoS Considerations
  • Digital Asset Security (NFTs, Tokenized Assets, CBDCs)
  • Secure Governance Models for Decentralized Systems

Proceedings

The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series(Confirmed). Hard copy of the proceedings will be distributed during the Conference.

Important Dates

Submission Deadline

February 21, 2026

Authors Notification

March 28, 2026

Registration & Camera-Ready Paper Due

April 04, 2026