ISSN: 1753-0563
Journal Home
Journal Guideline
International Journal of Applied Cryptography Q4 Unclaimed
International Journal of Applied Cryptography is a journal indexed in SJR in Applied Mathematics and Computational Theory and Mathematics with an H index of 18. It has a price of 2500 €. It has an SJR impact factor of 0,124 and it has a best quartile of Q4. It has an SJR impact factor of 0,124.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -

2500 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
0,124
SJR Impact factor18
H Index0
Total Docs (Last Year)8
Total Docs (3 years)0
Total Refs7
Total Cites (3 years)8
Citable Docs (3 years)0
Cites/Doc (2 years)0.0
Ref/DocOther journals with similar parameters
Monte Carlo Methods and Applications Q4
Applications of Mathematics Q4
Measurement Techniques Q4
IfCoLoG Journal of Logics and their Applications Q4
Journal of Contemporary Mathematical Analysis Q4
Compare this journals
Aims and Scope
Best articles by citations
A framework for universally composable non-committing blind signatures
View moreDelegation-based conversion from CPA to CCA-secure predicate encryption
View more"Remarks on ""Analysis of one popular group signature scheme"" in Asiacrypt 2006"
View moreA critical analysis and improvement of advanced access content system drive-host authentication
View moreA correction to 'efficient and secure comparison for on-line auctions'
View moreSponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)
View moreEfficient robust private set intersection
View moreOne-round key exchange in the standard model
View moreA ciphertext-policy attribute-based encryption scheme with constant ciphertext length
View moreEfficient coding for secure computing with additively-homomorphic encrypted data
View moreSession-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
View moreSome results on cryptanalysis of SMS4 block cipher
View moreCCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
View moreTheoretical and practical aspects of mutual information-based side channel analysis
View moreOn the relation among various security models for certificateless cryptography
View moreA new authenticated encryption technique for handling long ciphertexts in memory constrained devices
View moreEfficient lattice-based signature scheme
View moreMultiuser private queries over encrypted databases
View moreRandomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol
View morePublic key encryption schemes supporting equality test with authorisation of different granularity
View moreA multidimensional linear distinguishing attack on the Shannon cipher
View moreA five-round algebraic property of AES and its application to the ALPHA-MAC
View moreA privacy-enhanced access log management mechanism in SSO systems from nominative signatures
View moreThe layered games framework for specifications and analysis of security protocols
View more
Comments