Submission Deadline: 30 June 2026 View: 671 Submit to Special Issue
Dr. Mujeeb Ur Rehman
Email: mujeeb.rehman@dmu.ac.uk
Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom
Research Interests: artificial intelligence, cyber security, quantum cryptography, IoMT, etc.
Dr. Muhammad Kazim
Email: muhammad.kazim@dmu.ac.uk
Affiliation: School of Computer Science and Informatics, De Montfort University, Leicester, LE1 9BH, United Kingdom
Research Interests: quantum cryptography, edge computing and AI, internet of things security, software engineering, etc.
Dr. Sohail Khalid
Email: s.khalid@riphah.edu.pk
Affiliation: Electrical and Computer Engineering Department, Islamabad, I-14, Pakistan
Research Interests: machine learning, deep learning, artificial intelligence, etc.
By 2025, cybercrime costs are projected to exceed $10 trillion annually, while most current cryptographic standards face disruption from quantum computing. At the same time, AI is reshaping cybersecurity powering both advanced attacks and intelligent defences while chaos-based encryption is emerging as a lightweight, scalable option for real-time applications such as IoT, UAVs, telehealth, and smart cities. This Special Issue explores the convergence of post-quantum cryptography (PQC), AI-driven security, and chaos-based techniques, with a focus on resilient, scalable, and trustworthy solutions. We invite contributions that advance both theory and practice, including hybrid PQC-AI models, federated learning frameworks, and chaos-inspired cryptographic systems for multimedia and critical infrastructure.
Topics of interest include:
· Post-Quantum Cryptography (algorithms, frameworks, optimisations)
· Chaos-based encryption and multimedia security
· Hybrid AI-PQC-Chaos architectures
· Lattice-, code-, multivariate-, and hash-based cryptography
· AI-driven intrusion and anomaly detection
· Explainable and interpretable AI
· Federated and edge learning for decentralised defence
· Quantum-AI hybrid protocols
· Privacy-preserving, energy-efficient cryptographic schemes
· PQC and chaos-based multimedia protection
· Adversarial AI and data poisoning countermeasures
· Benchmarking and performance evaluation


Submit a Paper
Propose a Special lssue