Special Issues
Table of Content

Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations

Submission Deadline: 30 June 2026 View: 1826 Submit to Special Issue

Guest Editors

Dr. Mujeeb Ur Rehman

Email: mujeeb.rehman@dmu.ac.uk

Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom

Homepage:

Research Interests: artificial intelligence, cyber security, quantum cryptography, IoMT, etc.


Dr. Muhammad Kazim

Email: muhammad.kazim@dmu.ac.uk

Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom

Homepage:

Research Interests: quantum cryptography, edge computing and AI, internet of things security, software engineering, etc.


Dr. Sohail Khalid

Email: s.khalid@riphah.edu.pk

Affiliation: Electrical and Computer Engineering Department, Islamabad, I-14, Pakistan

Homepage:

Research Interests: machine learning, deep learning, artificial intelligence, etc.


Summary

By 2025, cybercrime costs are projected to exceed $10 trillion annually, while most current cryptographic standards face disruption from quantum computing. At the same time, AI is reshaping cybersecurity powering both advanced attacks and intelligent defences while chaos-based encryption is emerging as a lightweight, scalable option for real-time applications such as IoT, UAVs, telehealth, and smart cities. This Special Issue explores the convergence of post-quantum cryptography (PQC), AI-driven security, and chaos-based techniques, with a focus on resilient, scalable, and trustworthy solutions. We invite contributions that advance both theory and practice, including hybrid PQC-AI models, federated learning frameworks, and chaos-inspired cryptographic systems for multimedia and critical infrastructure.

Topics of interest include:
· Post-Quantum Cryptography (algorithms, frameworks, optimisations)
· Chaos-based encryption and multimedia security
· Hybrid AI-PQC-Chaos architectures
· Lattice-, code-, multivariate-, and hash-based cryptography
· AI-driven intrusion and anomaly detection
· Explainable and interpretable AI
· Federated and edge learning for decentralised defence
· Quantum-AI hybrid protocols
· Privacy-preserving, energy-efficient cryptographic schemes
· PQC and chaos-based multimedia protection
· Adversarial AI and data poisoning countermeasures
· Benchmarking and performance evaluation


Keywords

Post-Quantum Cryptography (PQC); Artificial Intelligence (AI); Explainable AI (XAI); Chaotic Cryptography; Multimedia Security; Intrusion Detection; Federated Learning; IoT Security; UAV Security; Telehealth Security; Smart Cities; Critical Infrastructure Protection

Published Papers


  • Open Access

    ARTICLE

    An AI-Blockchain Hybrid Model to Enhance Security and Trust in Web 4.0

    Samer R. Sabbah, Mohammad Rasmi Al-Mousa, Ala’a Al-Shaikh, Ahmad Al Smadi, Suhaila Abuowaida, Amina Salhi, Arij Alfaidi
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2026.079241
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract Web 4.0 platforms introduce intelligent, decentralized agents and real-time interactions that increase both utility and attack surface. This paper presents a comprehensive, reproducible AI blockchain hybrid designed to (1) detect SQL injection attacks at scale using a textual TFIDF + machine-learning pipeline, (2) incorporate reputation signals from a real-world Bitcoin OTC trust dataset to compute a TrustAlert Score (TAS) that prioritizes alerts and guides logging policy, and (3) record privacy-preserving audit digests on blockchain, optionally attested via a zero-knowledge proof (ZKP) pipeline. We evaluate the system on a 148 k SQL corpus and Soc-SignBitcoinOTC reputation More >

  • Open Access

    REVIEW

    Quantum Secure Multiparty Computation: Bridging Privacy, Security, and Scalability in the Post-Quantum Era

    Sghaier Guizani, Tehseen Mazhar, Habib Hamam
    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073883
    (This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
    Abstract The advent of quantum computing poses a significant challenge to traditional cryptographic protocols, particularly those used in Secure Multiparty Computation (MPC), a fundamental cryptographic primitive for privacy-preserving computation. Classical MPC relies on cryptographic techniques such as homomorphic encryption, secret sharing, and oblivious transfer, which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries. This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI, IEEE Explore, Springer, and Elsevier, examining the applications, types, and security issues with the solution of… More >

Share Link