Submission Deadline: 31 December 2025 View: 117 Submit to Special Issue
Dr. Muhammad Shahbaz Khan
Email: muhammadshahbaz.khan@napier.ac.uk
Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, UK
Research Interests: poost-quantum cryptography, applied cryptography, image encryption, and privacy & trust
Dr. Baraq Ghaleb
Email: b.ghaleb@napier.ac.uk
Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, UK
Research Interests: cyber security, internet of things (IoT), blockchain, machine learning, routing protocols
The progress in quantum computing is an imminent threat to traditional cryptographic systems, making them vulnerable to novel quantum-enabled attacks. In response, researchers and practitioners are actively developing cryptographic methods and security solutions designed to withstand these emerging threats. In addition, innovative approaches combining chaos theory and intelligent threat detection are transforming how we detect and respond to cyber threats. These advancements are rapidly reshaping the modern cybersecurity landscape requiring immediate attention.
This Special Issue aims to gather cutting-edge research in post-quantum cryptography, chaotic encryption, and advanced intrusion detection methodologies. Submissions that propose novel algorithms, theoretical advancements, and robust practical implementations within these security domains are invited. Research exploring emerging security applications, comprehensive performance evaluations, and interdisciplinary perspectives that enhance real-world applicability and effectiveness of security solutions for future computing are especially encouraged.
Suggested themes:
- Design and analysis of Post-Quantum Cryptographic Algorithms and Security Frameworks
- Advanced Chaotic Encryption Methods, design of chaotic maps, and secure key generation.
- Hybrid cryptographic schemes combining classical and post-quantum approaches
- Lattice-Based, Code-Based, and Hash-Based Security Mechanisms
- Intelligent intrusion detection systems to strengthen the security and resilience of computing systems in modern applications
- Decentralized trust models, and privacy-preserving techniques in the post-quantum era
- Machine learning models for predictive threat analysis
- Quantum-resilient key management and exchange mechanisms
- Hardware/software acceleration, side-channel attack mitigation, and integration in existing infrastructures
- Benchmarking of cryptographic primitives; evaluating overheads in large-scale systems and proposing optimization strategies