Default: International Journal of Applied Cryptography

ISSN: 1753-0563

Journal Home

Journal Guideline

International Journal of Applied Cryptography Q4 Unclaimed

Inderscience Switzerland
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

International Journal of Applied Cryptography is a journal indexed in SJR in Applied Mathematics and Computational Theory and Mathematics with an H index of 18. It has a price of 2500 €. It has an SJR impact factor of 0,124 and it has a best quartile of Q4. It has an SJR impact factor of 0,124.

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Metrics

International Journal of Applied Cryptography

0,124

SJR Impact factor

18

H Index

0

Total Docs (Last Year)

8

Total Docs (3 years)

0

Total Refs

7

Total Cites (3 years)

8

Citable Docs (3 years)

0

Cites/Doc (2 years)

0.0

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

A framework for universally composable non-committing blind signatures

View more

Delegation-based conversion from CPA to CCA-secure predicate encryption

View more

"Remarks on ""Analysis of one popular group signature scheme"" in Asiacrypt 2006"

View more

A critical analysis and improvement of advanced access content system drive-host authentication

View more

A correction to 'efficient and secure comparison for on-line auctions'

View more

Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)

View more

Efficient robust private set intersection

View more

One-round key exchange in the standard model

View more

A ciphertext-policy attribute-based encryption scheme with constant ciphertext length

View more

Efficient coding for secure computing with additively-homomorphic encrypted data

View more

Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol

View more

Some results on cryptanalysis of SMS4 block cipher

View more
SHOW MORE ARTICLES

CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance

View more

Theoretical and practical aspects of mutual information-based side channel analysis

View more

On the relation among various security models for certificateless cryptography

View more

A new authenticated encryption technique for handling long ciphertexts in memory constrained devices

View more

Efficient lattice-based signature scheme

View more

Multiuser private queries over encrypted databases

View more

Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol

View more

Public key encryption schemes supporting equality test with authorisation of different granularity

View more

A multidimensional linear distinguishing attack on the Shannon cipher

View more

A five-round algebraic property of AES and its application to the ALPHA-MAC

View more

A privacy-enhanced access log management mechanism in SSO systems from nominative signatures

View more

The layered games framework for specifications and analysis of security protocols

View more

FAQS