Special Issues
Table of Content

Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations

Submission Deadline: 30 June 2026 View: 671 Submit to Special Issue

Guest Editors

Dr. Mujeeb Ur Rehman

Email: mujeeb.rehman@dmu.ac.uk

Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom

Homepage:

Research Interests: artificial intelligence, cyber security, quantum cryptography, IoMT, etc.


Dr. Muhammad Kazim

Email: muhammad.kazim@dmu.ac.uk

Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom

Homepage:

Research Interests: quantum cryptography, edge computing and AI, internet of things security, software engineering, etc.


Dr. Sohail Khalid

Email: s.khalid@riphah.edu.pk

Affiliation: Electrical and Computer Engineering Department, Islamabad, I-14, Pakistan

Homepage:

Research Interests: machine learning, deep learning, artificial intelligence, etc.


Summary

By 2025, cybercrime costs are projected to exceed $10 trillion annually, while most current cryptographic standards face disruption from quantum computing. At the same time, AI is reshaping cybersecurity powering both advanced attacks and intelligent defences while chaos-based encryption is emerging as a lightweight, scalable option for real-time applications such as IoT, UAVs, telehealth, and smart cities. This Special Issue explores the convergence of post-quantum cryptography (PQC), AI-driven security, and chaos-based techniques, with a focus on resilient, scalable, and trustworthy solutions. We invite contributions that advance both theory and practice, including hybrid PQC-AI models, federated learning frameworks, and chaos-inspired cryptographic systems for multimedia and critical infrastructure.

Topics of interest include:
· Post-Quantum Cryptography (algorithms, frameworks, optimisations)
· Chaos-based encryption and multimedia security
· Hybrid AI-PQC-Chaos architectures
· Lattice-, code-, multivariate-, and hash-based cryptography
· AI-driven intrusion and anomaly detection
· Explainable and interpretable AI
· Federated and edge learning for decentralised defence
· Quantum-AI hybrid protocols
· Privacy-preserving, energy-efficient cryptographic schemes
· PQC and chaos-based multimedia protection
· Adversarial AI and data poisoning countermeasures
· Benchmarking and performance evaluation


Keywords

Post-Quantum Cryptography (PQC); Artificial Intelligence (AI); Explainable AI (XAI); Chaotic Cryptography; Multimedia Security; Intrusion Detection; Federated Learning; IoT Security; UAV Security; Telehealth Security; Smart Cities; Critical Infrastructure Protection

Share Link