Journal of Cryptology

ISSN: 0933-2790

Journal Home

Journal Guideline

Journal of Cryptology Q1 Unclaimed

Springer New York United States
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes. The Journal of Cryptology is the official journal of the International Association for Cryptologic Research. Provides a forum for original results in all areas of cryptologyCovers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectivesAlso discusses implementation, application, and standards issuesThe official journal of the International Association for Cryptologic Research It has an SJR impact factor of 1,433.

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy: Open Choice

Type of publications:

Publication frecuency: -

Price

2190 €

Inmediate OA

NPD

Embargoed OA

0 €

Non OA

Metrics

Journal of Cryptology

1,433

SJR Impact factor

84

H Index

41

Total Docs (Last Year)

118

Total Docs (3 years)

2130

Total Refs

490

Total Cites (3 years)

117

Citable Docs (3 years)

3.13

Cites/Doc (2 years)

51.95

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Cryptanalysis of ISO/IEC 9796-1

View more

A cubic RSA code equivalent to factorization

View more

Cryptanalysis of MD2

View more

Constant-Round Oblivious Transfer in the Bounded Storage Model

View more

Cryptanalysis of the Shpilrain-Ushakov Protocol for Thompson's Group

View more

Cryptanalysis of the Tillich-Zemor Hash Function

View more

Formal Proofs for the Security of Signcryption

View more

New Binding-Concealing Trade-Offs for Quantum String Commitment

View more

On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order

View more

Editor's note

View more

Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves

View more

The Security of the IAPM and IACBC Modes

View more
SHOW MORE ARTICLES

Linear ciphers and spreads

View more

Chernoff-Type Direct Product Theorems

View more

Elliptic curve implementation of zero-knowledge blobs

View more

Some improved bounds on the information rate of perfect secret sharing schemes

View more

Threshold Password-Authenticated Key Exchange

View more

Elliptic Curves with Low Embedding Degree

View more

Security Analysis of Randomize-Hash-then-Sign Digital Signatures

View more

Ideal Multipartite Secret Sharing Schemes

View more

A generalization of Hellman's extension to Shannon's approach to cryptography

View more

On-line Ciphers and the Hash-CBC Constructions

View more

Efficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems

View more

Simpler Session-Key Generation from Short Random Passwords

View more

FAQS