Advances in Provable and Practical Security—ProvSec 2025

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: closed (31 January 2026) | Viewed by 1395

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
Interests: cryptography; data security; privacy protection technologies

E-Mail Website
Guest Editor
School of Computing Technologies, RMIT University, Melbourne, VIC, Australia
Interests: privacy-preserving data mining; machine learning

Special Issue Information

Dear Colleagues,

This Special Issue will mainly be composed of extended versions of papers presented at the 19th International Conference on Provable and Practical Security (ProvSec 2025, in Yokohama, Japan, on 10–12 October 2025; https://sulab-sever.u-aizu.ac.jp/provsec2025/index.html). This Special Issue also seeks original papers that present novel research results that cover all aspects of provable and practical security.

Submitted manuscripts should not have been previously published, nor should they be under consideration for publication elsewhere. Extended versions of ProvSec 2025 papers should cite the original paper and contain at least 50% new content (e.g., in the form of technical extensions, more in-depth evaluations, or additional use cases). Further, these extended papers should not directly quote or use more than 30% of the original conference paper.

This Special Issue also welcomes original papers (not presented at ProvSec 2025) that discuss theories, techniques, implementations, applications, and practical experiences on a variety of topics. Topics of interest include, but are not limited to, the following areas:

  • Provable security for asymmetric cryptography;
  • Provable security for symmetric cryptography;
  • Provable security for physical attacks;
  • Privacy and anonymity technologies;
  • Secure cryptographic protocols and applications;
  • Security notions, approaches, and paradigms;
  • Leakage-resilient cryptography;
  • Post-quantum cryptography;
  • Blockchain and cryptocurrency;
  • IoT security;
  • Cloud security;
  • AI security;
  • Access control;
  • Privacy-enhancing technologies;
  • Database security;
  • Big data security and privacy;
  • Biometric security;
  • Network security;
  • Formal methods for security;
  • Embedded systems security;
  • Lightweight security;
  • Cyber–physical security.

Dr. Shi-Feng Sun
Dr. Xiaoning Liu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • IoT security
  • network security
  • privacy and security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

33 pages, 5180 KB  
Article
Secure and Efficient Block Cipher Mode Design for Parallel Processing and Reliable Security
by Valli Kumari Vatsavayi and Dinesh Reddy Bommireddy
Cryptography 2026, 10(1), 13; https://doi.org/10.3390/cryptography10010013 - 13 Feb 2026
Viewed by 610
Abstract
Communication is defined as the process of transferring data and exchanging information between interconnected systems. Due to the increasing reliance on digital infrastructures by the military, financial, and healthcare sectors, it is important to ensure the confidential, authentication, and tamper-proof nature of communications. [...] Read more.
Communication is defined as the process of transferring data and exchanging information between interconnected systems. Due to the increasing reliance on digital infrastructures by the military, financial, and healthcare sectors, it is important to ensure the confidential, authentication, and tamper-proof nature of communications. In addition, the increasing need for secure communications in the fields of network security and cryptography have led to the development of numerous systems. The basic requirement of these systems is that under the same key, identical plaintexts do not result in identical ciphertexts. The most significant contribution to this requirement has came from block cipher modes. There are many traditional modes of operation such as the Electronic Code Book (ECB) compromises between simplicity and security. Probabilistic Modes such as the Cipher Block Chaining Mode (CBC) provide a method to randomize data so that the potential for pattern analysis is eliminated, while Deterministic Modes such as ECB enable potential access to the patterns within the plaintexts. Conversely, since the randomization is in the Probabilistic Mode, there is no access to the patterns; however, the sequentiality of the blocks creates dependence and increases the computing overhead. To address these issues, a novel block cipher mode that provides the highest level of security and the most effective method for performing encryption and decryption will be proposed in this paper. It is anticipated that the improved security features and efficient encryption and decryption procedures will significantly improve confidentiality. The methods proposed will utilize compact key structures, parallel processing, a header generation based on multiple random values, and a Key-derived S Box. The experimental results show that SEBCM is more effective than CBC with respect to speed in both encryption and decryption. Full article
(This article belongs to the Special Issue Advances in Provable and Practical Security—ProvSec 2025)
Show Figures

Figure 1

Back to TopTop