In order to provide a suitable opportunity to present the latest research achievements and scientific findings and exchange opinions of professors, researchers and researchers in the field of graph theory, combinatorics, discrete mathematics, code and computer science 9th International Conference on Combinatorics, Cryptography, Computer Science and Computation Dated December 25-26, 2024 Semnan University is held. From all professors, students and researchers Article presentation And participation in this conference is invited. Selected articles will be published in the following journals.

  1. Global Analysis and Discrete Mathematics (GADM)
  2. International Journal of Nonlinear Analysis and Applications
Keynote Speakers Announcement

The organizing committee of the 9th International Conference on Combinatorics, Cryptography, Computer Science and Computation is pleased to announce that the keynote speakers for the conference have been confirmed and are now listed on this link. We encourage all attendees to review the speaker profiles and begin planning their participation in the conference program.

The schedule of presentations have been announced here. We look forward to a successful and engaging conference.

Class Link
Keynote Speech Open
A Open
B Open
C Open
D Open

Extended Deadline for Paper Submissions

We are pleased to announce that due to the overwhelming response and numerous requests, the deadline for paper submission has been extended for an additional ten days, till December 10th.

 

Core topics include (but are not limited to):

  • Parallel and distributed computing
  • Graph theory, grid models and optimization
  • Computational algebra, computational geometry and number theory
  • Complexity of algorithms and data structure
  • Game theory
  • Approximate and online algorithms
  • Data mining
  • Theoretical foundations of cryptography
  • Design and analysis of flow and symmetric format encryption algorithms
  • Design and analysis of asymmetric code algorithms and numerical signature schemes
  • New methods in encryption (such as post-quantum, functional encryption, hybrid encryption)
  • Software and hardware implementation of encryption algorithms
  • Side channel attacks and ways to deal with it
  • Hidden encryption systems
  • Hardware manipulation and methods to deal with it
  • Hardware accelerators for security protocols
  • More