ISSN: 1862-2976
Journal Home
Journal Guideline
Journal of Mathematical Cryptology Q3 Unclaimed
Journal of Mathematical Cryptology is a journal indexed in SJR in Applied Mathematics and Computer Science Applications with an H index of 19. It has an SJR impact factor of 0,274 and it has a best quartile of Q3. It has an SJR impact factor of 0,274.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -


- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
0,274
SJR Impact factor19
H Index7
Total Docs (Last Year)81
Total Docs (3 years)185
Total Refs102
Total Cites (3 years)78
Citable Docs (3 years)1.08
Cites/Doc (2 years)26.43
Ref/DocOther journals with similar parameters
Discrete Optimization Q3
Journal of Dynamics and Games Q3
Journal of Discrete Mathematical Sciences and Cryptography Q3
East Asian Journal on Applied Mathematics Q3
Functional Analysis and its Applications Q3
Compare this journals
Aims and Scope
Best articles by citations
Cryptanalysis of an RSA variant with moduli N=prql
View moreCryptanalysis of three matrix-based key establishment protocols
View moreAn efficient identification protocol secure against concurrent-reset attacks
View moreTime-memory trade-offs for index calculus in genus 3
View moreA coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
View moreOn the concrete hardness of Learning with Errors
View moreGenerating pairing-friendly elliptic curve parameters using sparse families
View moreOn the density of some special primes
View moreRethinking low genus hyperelliptic Jacobian arithmetic over binary fields: interplay of field arithmetic and explicit formul?¶
View moreSubset sum pseudorandom numbers: fast generation and distribution
View moreEnhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices
View moreA subexponential construction of graph coloring for multiparty computation
View morePublic key cryptosystem MST3: cryptanalysis and realization
View moreEfficient computation of pairings on Jacobi quartic elliptic curves
View moreAnalysis of a key exchange protocol based on tropical matrix algebra
View moreOn hashing into elliptic curves
View moreRSA: A number of formulas to improve the search for p + q p+q
View moreMinimal weight expansions in Pisot bases
View moreRigorous upper bounds on data complexities of block cipher cryptanalysis
View moreWhen are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
View moreAn exploration of affine group laws for elliptic curves
View moreAnother look at HMAC
View moreAnother look at non-standard discrete log and Diffie-Hellman problems
View moreCompact McEliece keys based on quasi-dyadic Srivastava codes
View more
Comments