Journal of Cryptology Q2 Unclaimed
The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes. The Journal of Cryptology is the official journal of the International Association for Cryptologic Research. Provides a forum for original results in all areas of cryptologyCovers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectivesAlso discusses implementation, application, and standards issuesThe official journal of the International Association for Cryptologic Research It has an SJR impact factor of 0,799.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy: Open Choice
Type of publications:
Publication frecuency: -
2190 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
0,799
SJR Impact factor85
H Index39
Total Docs (Last Year)113
Total Docs (3 years)1918
Total Refs435
Total Cites (3 years)111
Citable Docs (3 years)2.5
Cites/Doc (2 years)49.18
Ref/DocOther journals with similar parameters
Journal of Intelligent Information Systems Q2
Knowledge and Information Systems Q2
IACR Transactions on Symmetric Cryptology Q2
Computer Speech and Language Q2
Transactions on Embedded Computing Systems Q2
Compare this journals
Aims and Scope
Best articles by citations
Cryptanalysis of ISO/IEC 9796-1
View moreA cubic RSA code equivalent to factorization
View moreCryptanalysis of MD2
View moreConstant-Round Oblivious Transfer in the Bounded Storage Model
View moreCryptanalysis of the Shpilrain-Ushakov Protocol for Thompson's Group
View moreCryptanalysis of the Tillich-Zemor Hash Function
View moreFormal Proofs for the Security of Signcryption
View moreNew Binding-Concealing Trade-Offs for Quantum String Commitment
View moreOn the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
View moreEditor's note
View moreEndomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
View moreThe Security of the IAPM and IACBC Modes
View moreLinear ciphers and spreads
View moreChernoff-Type Direct Product Theorems
View moreElliptic curve implementation of zero-knowledge blobs
View moreSome improved bounds on the information rate of perfect secret sharing schemes
View moreThreshold Password-Authenticated Key Exchange
View moreElliptic Curves with Low Embedding Degree
View moreSecurity Analysis of Randomize-Hash-then-Sign Digital Signatures
View moreIdeal Multipartite Secret Sharing Schemes
View moreA generalization of Hellman's extension to Shannon's approach to cryptography
View moreOn-line Ciphers and the Hash-CBC Constructions
View moreEfficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems
View moreSimpler Session-Key Generation from Short Random Passwords
View more
Comments