Journal of Cryptology Q1 Unclaimed
The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes. The Journal of Cryptology is the official journal of the International Association for Cryptologic Research. Provides a forum for original results in all areas of cryptologyCovers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectivesAlso discusses implementation, application, and standards issuesThe official journal of the International Association for Cryptologic Research It has an SJR impact factor of 1,433.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy: Open Choice
Type of publications:
Publication frecuency: -
2190 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
1,433
SJR Impact factor84
H Index41
Total Docs (Last Year)118
Total Docs (3 years)2130
Total Refs490
Total Cites (3 years)117
Citable Docs (3 years)3.13
Cites/Doc (2 years)51.95
Ref/DocOther journals with similar parameters
International Journal of Computer Vision Q1
IEEE Transactions on Pattern Analysis and Machine Intelligence Q1
Information Fusion Q1
IEEE Transactions on Cybernetics Q1
IEEE Transactions on Evolutionary Computation Q1
Compare this journals
Aims and Scope
Best articles by citations
Cryptanalysis of ISO/IEC 9796-1
View moreA cubic RSA code equivalent to factorization
View moreCryptanalysis of MD2
View moreConstant-Round Oblivious Transfer in the Bounded Storage Model
View moreCryptanalysis of the Shpilrain-Ushakov Protocol for Thompson's Group
View moreCryptanalysis of the Tillich-Zemor Hash Function
View moreFormal Proofs for the Security of Signcryption
View moreNew Binding-Concealing Trade-Offs for Quantum String Commitment
View moreOn the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
View moreEditor's note
View moreEndomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves
View moreThe Security of the IAPM and IACBC Modes
View moreLinear ciphers and spreads
View moreChernoff-Type Direct Product Theorems
View moreElliptic curve implementation of zero-knowledge blobs
View moreSome improved bounds on the information rate of perfect secret sharing schemes
View moreThreshold Password-Authenticated Key Exchange
View moreElliptic Curves with Low Embedding Degree
View moreSecurity Analysis of Randomize-Hash-then-Sign Digital Signatures
View moreIdeal Multipartite Secret Sharing Schemes
View moreA generalization of Hellman's extension to Shannon's approach to cryptography
View moreOn-line Ciphers and the Hash-CBC Constructions
View moreEfficient Signature Schemes with Tight Reductions to the Diffie-Hellman Problems
View moreSimpler Session-Key Generation from Short Random Passwords
View more
Comments