Security, Privacy, Confidentiality and Trust in Blockchain, 2nd Edition

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 September 2025 | Viewed by 357

Special Issue Editor


E-Mail Website
Guest Editor
Department of Software Engineering, University of the National Education Commission, 30-084 Krakow, Poland
Interests: computer networks and wireless communication; computer security and cryptography; computing systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Following the success of the First Edition of this Special Issue (https://www.mdpi.com/journal/electronics/special_issues/RDWZKL1466), in this Second Edition, we will continue to assist those interested in the topic to promote their vision and ideas.

The main goal of this Special Issue is to discover new scientific knowledge that is relevant, but not limited to, the following topics:

  • Cyber warfare;
  • Fifth-generation (5G) security and privacy;
  • IoT security and privacy;
  • Quantum cryptography and quantum communications;
  • Post-quantum cryptography;
  • ML/AI applications in cybersecurity systems;
  • Cybersecurity application and services;
  • Cybersecurity system experimentation;
  • Cybersecurity system certification;
  • Cybersecurity system architectures and design;
  • Security and network management;
  • Human and societal security;
  • Access control, authentication, privacy;
  • Threats, vulnerabilities, risks, and formal methods;
  • Secure cloud computing;
  • Advanced cybersecurity models;
  • Cryptographic primitives, models, and mechanisms;
  • Lightweight computing and cryptography.

Prof. Dr. Mikolaj Karpinski
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security
  • cryptography
  • privacy
  • confidentiality
  • AI and computational intelligence techniques in cybersecurity
  • blockchain technology and decentralized distributed ledger
  • security of computer networks and systems

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Related Special Issue

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 977 KiB  
Article
Development of High-Quality Cryptographic Constructions Based on Many-Valued Logic Affine Transformations
by Mikolaj Karpinski, Artem Sokolov, Aizhan Tokkuliyeva, Volodymyr Radush, Nadiia Kazakova, Aigul Shaikhanova, Nataliya Zagorodna and Anna Korchenko
Electronics 2025, 14(10), 2094; https://doi.org/10.3390/electronics14102094 - 21 May 2025
Viewed by 203
Abstract
The S-box is a key component of modern ciphers, determining the quality and performance of the cryptographic algorithms in which it is applied. Many constructions for synthesizing high-quality S-boxes have been established, and those based on Galois fields theory—for example, the Nyberg construction [...] Read more.
The S-box is a key component of modern ciphers, determining the quality and performance of the cryptographic algorithms in which it is applied. Many constructions for synthesizing high-quality S-boxes have been established, and those based on Galois fields theory—for example, the Nyberg construction applied in the AES cryptographic algorithm—are particularly important. An integral component of the Nyberg construction is the affine transformation, which is used to improve the avalanche and correlation properties of the S-box. In this paper, a new approach is adopted for synthesizing affine transformations for S-boxes based on the quaternary matrices over the Galois field GF(4). We describe four basic structures that serve as the foundation for synthesizing a complete class of 648 affine transformation matrices of order n = 3 and a class of 7776 matrices of order n = 4 and introduce a recurrent structure to facilitate the synthesis of matrices for higher orders. Using these matrices in combination with the Nyberg construction, it is possible to construct bijective S-boxes that outperform the original Nyberg construction and many other known S-boxes in terms of strict avalanche criterion (SAC) and bit independence criterion strict avalanche criterion (BIC SAC) values, while maintaining a maximal level of nonlinearity and good cryptographic properties. We also propose modified GF(4) affine transformations that can be applied to specialized S-boxes which already satisfy the SAC for both component Boolean and 4-functions, as well as the criterion of minimal correlation between input and output, allowing us to enhance their nonlinearity to the value of Nf = 96. We integrate the synthesized S-boxes into the AES algorithm and evaluate their practical performance. The encryption outputs successfully pass the NIST statistical test suite in 96 out of 100 cases, outperforming both the original AES S-box and other reference constructions, confirming the practical strength of the proposed method. Full article
Show Figures

Figure 1

Back to TopTop