Default: Journal of Mathematical Cryptology

ISSN: 1862-2976

Journal Home

Journal Guideline

Journal of Mathematical Cryptology Q3 Unclaimed

Walter de Gruyter GmbH Germany
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

Journal of Mathematical Cryptology is a journal indexed in SJR in Applied Mathematics and Computer Science Applications with an H index of 19. It has an SJR impact factor of 0,274 and it has a best quartile of Q3. It has an SJR impact factor of 0,274.

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

- €

Inmediate OA

NPD

Embargoed OA

- €

Non OA

Metrics

Journal of Mathematical Cryptology

0,274

SJR Impact factor

19

H Index

7

Total Docs (Last Year)

81

Total Docs (3 years)

185

Total Refs

102

Total Cites (3 years)

78

Citable Docs (3 years)

1.08

Cites/Doc (2 years)

26.43

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Cryptanalysis of an RSA variant with moduli N=prql

View more

Cryptanalysis of three matrix-based key establishment protocols

View more

An efficient identification protocol secure against concurrent-reset attacks

View more

Time-memory trade-offs for index calculus in genus 3

View more

A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

View more

On the concrete hardness of Learning with Errors

View more

Generating pairing-friendly elliptic curve parameters using sparse families

View more

On the density of some special primes

View more

Rethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formul?¶

View more

Subset sum pseudorandom numbers: fast generation and distribution

View more

Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices

View more

A subexponential construction of graph coloring for multiparty computation

View more
SHOW MORE ARTICLES

Public key cryptosystem MST3: cryptanalysis and realization

View more

Efficient computation of pairings on Jacobi quartic elliptic curves

View more

Analysis of a key exchange protocol based on tropical matrix algebra

View more

On hashing into elliptic curves

View more

RSA: A number of formulas to improve the search for p + q p+q

View more

Minimal weight expansions in Pisot bases

View more

Rigorous upper bounds on data complexities of block cipher cryptanalysis

View more

When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack

View more

An exploration of affine group laws for elliptic curves

View more

Another look at HMAC

View more

Another look at non-standard discrete log and Diffie-Hellman problems

View more

Compact McEliece keys based on quasi-dyadic Srivastava codes

View more

FAQS