Journal of Cryptographic Engineering Q3 Unclaimed
The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools, implementations and applications in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, side-channel attacks and countermeasures, and embedded security. JCEN serves the academic and corporate R&D community interested in cryptographic hardware and embedded security.JCEN publishes essential research on broad and varied topics including:Public-key cryptography, secret-key cryptography and post-quantum cryptographyCryptographic implementations include cryptographic processors, physical unclonable functions, true and deterministic random number generators, efficient software and hardware architecturesAttacks on implementations and their countermeasures, such as side-channel attacks, fault attacks, hardware tampering and reverse engineering techniquesSecurity evaluation of real-world cryptographic systems, formal methods and verification tools for secure embedded design that offer provable security, and metrics for measuring securityApplications of state-of-the-art cryptography, such as IoTs, RFIDs, IP protection, cyber-physical systems composed of analog and digital components, automotive security and trusted computingThe only journal devoted to cryptographic implementations, from design to attacks and to countermeasures in order to create secure and robust systemsBenefits professionals in both academic and corporate settingsRecommended by our authors - 100% of authors surveyed in 2017 rated their publishing experience as ‘excellent’ or ‘good’ It has an SJR impact factor of 0,351.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy: Open Choice
Type of publications:
Publication frecuency: -
2190 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
0,351
SJR Impact factor37
H Index42
Total Docs (Last Year)85
Total Docs (3 years)1434
Total Refs171
Total Cites (3 years)83
Citable Docs (3 years)2.11
Cites/Doc (2 years)34.14
Ref/DocOther journals with similar parameters
SoftwareX Q3
Formal Aspects of Computing Q3
Journal of Ambient Intelligence and Smart Environments Q3
Journal of Computer Science and Technology Q3
Science of Computer Programming Q3
Compare this journals
Aims and Scope
Best articles by citations
Efficient regular modular exponentiation using multiplicative half-size splitting
View moreParallelizing message schedules to accelerate the computations of hash functions
View moreConstant-time higher-order Boolean-to-arithmetic masking
View moreFast unified elliptic curve point multiplication for NIST prime curves on FPGAs
View moreScalar multiplication on Weierstrabeta elliptic curves from Co-Z arithmetic
View moreA simple power analysis attack on a McEliece cryptoprocessor
View moreTowards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis
View moreAchieving side-channel high-order correlation immunity with leakage squeezing
View moreSynchronization method for SCA and fault attacks
View moreA model of the leakage in the frequency domain and its application to CPA and DPA
View moreHarder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs
View moreAnalysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications
View moreOnline template attacks
View moreDifferential fault analysis of AES: towards reaching its limits
View moreRegulating the pace of von Neumann correctors
View moreSecurity analysis of concurrent error detection against differential fault analysis
View moreUnivariate side channel attacks and leakage modeling
View moreA new method of black box power analysis and a fast algorithm for optimal key search
View moreWhen organized crime applies academic results: a forensic analysis of an in-card listening device
View moreAnother dimension in integrated circuit trust
View moreIntroduction to the CHES 2013 special issue
View moreIntroduction to the CHES 2016 special issue
View moreA toolbox for software optimization of QC-MDPC code-based cryptosystems
View moreIntroduction to the CHES 2017 special issue
View more
Comments