6th International Conference on Cryptography and Blockchain (CRBL 2026)
May 23 ~ 24, 2026, Vancouver, Canada
https://crbl2026.org/
Scope
6th International Conference on Cryptography and Blockchain (CRBL 2026) serves as a premier global forum for presenting and exchanging the latest innovations, research findings, and practical advancements in cryptography, blockchain technologies, and their rapidly expanding application domains. As digital ecosystems continue to evolve at unprecedented speed, the need for secure, trustworthy, and scalable systems has never been more critical. CRBL 2026 brings together leading researchers, industry experts, and practitioners to explore breakthroughs that are shaping the future of secure computation, distributed systems, and decentralized technologies.
The conference aims to foster collaboration between academia and industry by providing a vibrant platform for discussing emerging challenges, sharing innovative methodologies, and displaying transformative applications. Participants will have the opportunity to engage with pioneering work spanning foundational theory, applied research, system design, and realworld deployments.
Authors are invited to submit original contributions including research papers, case studies, survey articles, and industrial experiences that highlight significant advances in the field. Submissions may address, but are not limited to, the following topics:
Topics of Interest
Cryptography
- Foundations of Cryptography
- PublicKey Cryptography
- SymmetricKey Cryptography
- PostQuantum Cryptography
- QuantumSafe Cryptographic Protocols
- Cryptographic Protocols and Secure MultiParty Computation
- ZeroKnowledge Proofs and Succinct Proof Systems (SNARKs, STARKs, Bulletproofs)
- Homomorphic Encryption and Secure Computation
- Functional Encryption and AttributeBased Encryption
- Cryptanalysis and Security Proofs
- Key Management and Key Exchange Protocols
- Cryptography for PrivacyPreserving Machine Learning
Blockchain and Distributed Ledger Technologies
- Blockchain Consensus Mechanisms
- Blockchain Scalability (Layer2, Rollups, Sharding, State Channels)
- Blockchain Security and Attack Analysis
- Formal Verification of Smart Contracts
- Smart Contract Languages, Compilers, and Vulnerability Detection
- Tokenomics, Incentive Mechanisms, and GameTheoretic Security
- Blockchain Interoperability and CrossChain Protocols
- PrivacyEnhancing Technologies for Blockchain (Mixnets, ZKRollups, Confidential Transactions)
- Decentralized Identity and Authentication
- Blockchain for Digital Forensics and Auditability
- Blockchain Applications in IoT, Supply Chain, Finance, and Governance
- Decentralized Autonomous Organizations (DAOs): Security and Governance
- Blockchainbased Secure Data Sharing and Storage
- NextGeneration Blockchain Architectures and Novel DLT Designs
Systems, Network and Cybersecurity
- Access Control and Intrusion Detection
- Intrusion Detection and Prevention Systems (IDS/IPS)
- Insider Threat Detection and Mitigation
- Security in Distributed Systems
- Secure Cloud Computing and Confidential Computing (TEE, SGX, SEV)
- Security for Mobile, IoT, and Edge Computing
- Sensor and Mobile AdHoc Network Security
- Security Engineering and Secure System Design
- Security Requirements, Threat Modeling, and Risk Analysis
- Software and Application Security
- Web and API Security
- Security Information Systems Architecture and Security Patterns
Privacy and Trust
- Privacy Preserving Technologies (Differential Privacy, Federated Learning Security)
- Trust Management and Trust Metrics
- Models for Authentication, Trust, and Authorization
- Untraceability and Anonymity Systems
- Information Hiding and Steganography
- Regulation, Compliance, and Trust Mechanisms (GDPR, eIDAS, etc.)
AI, Machine Learning and Security
- Machine Learning for Security (Malware Detection, Intrusion Detection, Threat Intelligence)
- Adversarial Machine Learning and Robustness
- AI Driven Cryptanalysis
- Reinforcement Learning for Security Automation
- Autonomous and Intelligent Security Agents
- Computational Intelligence in Security
Emerging and Interdisciplinary
- Quantum Cryptography and Quantum Networks
- BioInspired and Evolutionary Security Algorithms
- Autonomous and SelfOrganizing Security Systems
- Secure ECommerce and Digital Payment Systems
- Security in CyberPhysical Systems
- Secure Service and Systems Design with QoS Considerations
- Digital Asset Security (NFTs, Tokenized Assets, CBDCs)
- Secure Governance Models for Decentralized Systems
Paper Submission
Authors are invited to submit papers through the Submission System by February 28, 2026. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this conference. The proceedings of the conference will be published by Computer Science Conference Proceedings in Computer Science & Information Technology (CS&IT) series(Confirmed).
Selected papers from CRBL 2026, after further revisions, will be published in the special issue of the following journals
· International Journal of Wireless & Mobile Networks (IJWMN)
· International Journal of Computer Networks & Communications (IJCNC)
· International Journal on Cryptography and Information Security ( IJCIS)
· International Journal of Security, Privacy and Trust Management ( IJSPTM )
· International Journal of Network Security & Its Applications (IJNSA)
· International Journal of Multimedia & Its Applications (IJMA)
· Information Technology in Industry (ITII)
Important Dates
· Submission Deadline :February 28, 2026
· Authors Notification:March 14, 2026
· Registration & camera - Ready Paper Due:March 21, 2026
Contact Us
Here's where you can reach us : [email protected] [email protected]
Event Venue
Vancouver, Canada










