ISSN: 1862-2976
Journal Home
Journal Guideline
Journal of Mathematical Cryptology Q3 Unclaimed
Journal of Mathematical Cryptology is a journal indexed in SJR in Applied Mathematics and Computer Science Applications with an H index of 21. It has an SJR impact factor of 0,338 and it has a best quartile of Q3. It has an SJR impact factor of 0,338.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -
- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,338
SJR Impact factor21
H Index19
Total Docs (Last Year)57
Total Docs (3 years)481
Total Refs70
Total Cites (3 years)56
Citable Docs (3 years)1.08
Cites/Doc (2 years)25.32
Ref/DocOther journals with similar parameters
Communications in Mathematics and Statistics Q3
Mathematical Modelling of Natural Phenomena Q3
Analele Stiintifice ale Universitatii Ovidius Constanta, Seria Matematica Q3
Mathematical and Computer Modelling of Dynamical Systems Q3
Annals of Mathematics and Artificial Intelligence Q3
Compare this journals
Aims and Scope
Best articles by citations
Cryptanalysis of an RSA variant with moduli N=prql
View moreCryptanalysis of three matrix-based key establishment protocols
View moreAn efficient identification protocol secure against concurrent-reset attacks
View moreTime-memory trade-offs for index calculus in genus 3
View moreA coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
View moreOn the concrete hardness of Learning with Errors
View moreGenerating pairing-friendly elliptic curve parameters using sparse families
View moreOn the density of some special primes
View moreRethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formul?¶
View moreSubset sum pseudorandom numbers: fast generation and distribution
View moreEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
View moreA subexponential construction of graph coloring for multiparty computation
View morePublic key cryptosystem MST3: cryptanalysis and realization
View moreEfficient computation of pairings on Jacobi quartic elliptic curves
View moreAnalysis of a key exchange protocol based on tropical matrix algebra
View moreOn hashing into elliptic curves
View moreRSA: A number of formulas to improve the search for p + q p+q
View moreMinimal weight expansions in Pisot bases
View moreRigorous upper bounds on data complexities of block cipher cryptanalysis
View moreWhen are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
View moreAn exploration of affine group laws for elliptic curves
View moreAnother look at HMAC
View moreAnother look at non-standard discrete log and Diffie-Hellman problems
View moreCompact McEliece keys based on quasi-dyadic Srivastava codes
View more
Comments