Journal of Cryptographic Engineering

ISSN: 2190-8508

Journal Home

Journal Guideline

Journal of Cryptographic Engineering Q3 Unclaimed

Springer Science + Business Media United States
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools, implementations and applications in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, side-channel attacks and countermeasures, and embedded security. JCEN serves the academic and corporate R&D community interested in cryptographic hardware and embedded security.JCEN publishes essential research on broad and varied topics including:Public-key cryptography, secret-key cryptography and post-quantum cryptographyCryptographic implementations include cryptographic processors, physical unclonable functions, true and deterministic random number generators, efficient software and hardware architecturesAttacks on implementations and their countermeasures, such as side-channel attacks, fault attacks, hardware tampering and reverse engineering techniquesSecurity evaluation of real-world cryptographic systems, formal methods and verification tools for secure embedded design that offer provable security, and metrics for measuring securityApplications of state-of-the-art cryptography, such as IoTs, RFIDs, IP protection, cyber-physical systems composed of analog and digital components, automotive security and trusted computingThe only journal devoted to cryptographic implementations, from design to attacks and to countermeasures in order to create secure and robust systemsBenefits professionals in both academic and corporate settingsRecommended by our authors - 100% of authors surveyed in 2017 rated their publishing experience as ‘excellent’ or ‘good’ It has an SJR impact factor of 0,351.

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy: Open Choice

Type of publications:

Publication frecuency: -

Price

2190 €

Inmediate OA

NPD

Embargoed OA

0 €

Non OA

Metrics

Journal of Cryptographic Engineering

0,351

SJR Impact factor

37

H Index

42

Total Docs (Last Year)

85

Total Docs (3 years)

1434

Total Refs

171

Total Cites (3 years)

83

Citable Docs (3 years)

2.11

Cites/Doc (2 years)

34.14

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Efficient regular modular exponentiation using multiplicative half-size splitting

View more

Parallelizing message schedules to accelerate the computations of hash functions

View more

Constant-time higher-order Boolean-to-arithmetic masking

View more

Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs

View more

Scalar multiplication on Weierstrabeta elliptic curves from Co-Z arithmetic

View more

A simple power analysis attack on a McEliece cryptoprocessor

View more

Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis

View more

Achieving side-channel high-order correlation immunity with leakage squeezing

View more

Synchronization method for SCA and fault attacks

View more

A model of the leakage in the frequency domain and its application to CPA and DPA

View more

Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs

View more

Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications

View more
SHOW MORE ARTICLES

Online template attacks

View more

Differential fault analysis of AES: towards reaching its limits

View more

Regulating the pace of von Neumann correctors

View more

Security analysis of concurrent error detection against differential fault analysis

View more

Univariate side channel attacks and leakage modeling

View more

A new method of black box power analysis and a fast algorithm for optimal key search

View more

When organized crime applies academic results: a forensic analysis of an in-card listening device

View more

Another dimension in integrated circuit trust

View more

Introduction to the CHES 2013 special issue

View more

Introduction to the CHES 2016 special issue

View more

A toolbox for software optimization of QC-MDPC code-based cryptosystems

View more

Introduction to the CHES 2017 special issue

View more

FAQS