Journal of Cryptographic Engineering
Scope & Guideline
Pioneering the future of information security and cryptographic techniques.
Introduction
Aims and Scopes
- Cryptographic Algorithms and Protocols:
The journal covers the design, analysis, and implementation of cryptographic algorithms and protocols, including symmetric and asymmetric encryption schemes, digital signatures, and authentication protocols. - Security Analysis and Attack Methods:
Research on various forms of security analysis, including side-channel attacks, fault attacks, and their countermeasures is a prominent focus, addressing the vulnerabilities of cryptographic systems. - Hardware and Software Implementations:
The journal emphasizes the engineering aspects of cryptographic implementations, including hardware accelerators, FPGA designs, and software optimizations for cryptographic operations. - Post-Quantum Cryptography:
With the advent of quantum computing, the journal has increasingly focused on post-quantum cryptographic schemes, exploring their security, efficiency, and implementation challenges. - Machine Learning in Cryptography:
The integration of machine learning techniques in cryptographic analysis and security is an emerging area of interest, particularly for side-channel attacks and vulnerability detection.
Trending and Emerging
- Side-Channel Attack Mitigation:
There is a growing emphasis on advanced techniques to mitigate side-channel attacks, with innovative methodologies being developed to enhance the security of cryptographic implementations against such vulnerabilities. - Post-Quantum Cryptography Research:
Research surrounding post-quantum cryptographic schemes is increasingly prominent, addressing the imminent challenges posed by quantum computing and the need for secure algorithms. - Hardware Security and Fault Injection:
The journal has seen a rise in studies focused on hardware security, particularly fault injection attacks and hardware Trojan detection, emphasizing the need for robust hardware designs. - Machine Learning Applications in Cryptography:
The application of machine learning in cryptographic contexts, particularly for analyzing vulnerabilities and enhancing security measures, is an emerging theme that is gaining significant attention. - Efficiency in Cryptographic Implementations:
Research aimed at improving the efficiency of cryptographic algorithms and their implementations, including energy-efficient designs and hardware acceleration techniques, is increasingly relevant in the context of IoT and mobile devices.
Declining or Waning
- Traditional Cryptographic Techniques:
The focus on classical cryptographic techniques, such as older block ciphers and hashing algorithms, is waning as newer, more secure methods and post-quantum approaches gain traction. - Static Analysis of Cryptographic Protocols:
Research dedicated to static analysis methods for cryptographic protocols appears to be decreasing, possibly due to the growing complexity of dynamic and adaptive attack scenarios. - Basic Theoretical Foundations:
While foundational studies are important, there has been a noticeable reduction in publications centered solely on theoretical aspects without practical implications, as the field moves towards more application-oriented research.
Similar Journals
Journal of Computer Virology and Hacking Techniques
Advancing Knowledge in Computer Virality and Hacking TechniquesWelcome to the Journal of Computer Virology and Hacking Techniques, a prestigious academic publication dedicated to the evolving fields of cybersecurity and digital threats. Published by Springer France, this open-access journal has been at the forefront of disseminating high-quality research since its inception in 2014. With an increasing impact in areas such as computational theory, hardware architecture, and software security, the journal holds a significant position, classified in the Q2 and Q3 quartiles across several categories in 2023. The journal aims to provide a platform for researchers, professionals, and students to explore the latest advances in combatting cyber vulnerabilities and understanding hacking techniques. In alignment with its open-access policy, the journal ensures that knowledge is readily available to a global audience, reinforcing its mission to enhance the scholarly discourse surrounding computer virality while adhering to rigorous academic standards.
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
Exploring the Frontiers of Mathematical SciencesThe Journal of Discrete Mathematical Sciences & Cryptography, published by Taru Publications, serves as a pivotal platform for researchers, professionals, and students in the fields of discrete mathematics and cryptography. Since its inception in 1998, the journal has consistently provided high-quality research articles, reviews, and case studies that span essential areas such as Algebra, Number Theory, and Applied Mathematics, achieving a Q3 category ranking in these disciplines as of 2023. With impressive Scopus rankings, including Rank #7 in Algebra and Number Theory and a notable 94th percentile status, this journal underscores its significance within the academic community. Although not an open access journal, it remains a crucial reference point for advancements in mathematical sciences, fostering scholarly dialogue and collaboration. As the field evolves, it continues to bridge theoretical frameworks and practical implementations, contributing substantially to the educational and professional landscape.
Science China-Information Sciences
Shaping the Future of Computer Science Research.Science China-Information Sciences is a prestigious academic journal published by SCIENCE PRESS, dedicated to advancing knowledge in the field of information sciences and computer science. Established in China, the journal has gained a remarkable reputation, with a 2023 category quartile ranking of Q1 in Computer Science (miscellaneous) and an impressive Scopus rank of #16 out of 232 in General Computer Science, positioning it within the 93rd percentile. The journal embraces a broad spectrum of topics, from theoretical frameworks to practical applications, providing a platform for researchers, professionals, and students to disseminate their findings and engage with the latest advancements in the field. With open access options available, Science China-Information Sciences ensures that innovative research is accessible to a global audience, fostering collaboration and interdisciplinary dialogue. The journal not only reflects the evolving landscape of information sciences but also plays a pivotal role in shaping future research directions.
Cryptography
Leading the Charge in Information Security AdvancesCryptography, an esteemed journal published by MDPI, focuses on the rapidly evolving fields of cryptography and information security, providing a platform for researchers and practitioners to share their findings and advancements. Since its inception in 2017, it has embraced an Open Access model, allowing unrestricted access to high-quality research articles, thereby fostering collaboration and innovation among academics globally. Based in Switzerland, this journal aims to cover a broad spectrum, from theoretical foundations to practical applications, contributing significantly to fields such as Applied Mathematics and Computer Science. Its impressive rankings in reputable databases like Scopus reflect its relevance and quality, holding a Q2 category in multiple disciplines, including Computational Theory and Mathematics and Computer Networks and Communications. With the continuous rise in importance of cybersecurity and data protection, Cryptography serves as a vital resource for professionals, students, and researchers dedicated to advancing knowledge in these critical areas.
Journal of Information Security and Applications
Advancing the Frontiers of Information SecurityJournal of Information Security and Applications, published by ELSEVIER, is a premier outlet for cutting-edge research in the field of information security and applications. With a dedicated ISSN of 2214-2126 and an E-ISSN of 2214-2134, this journal ranks impressively in the top quartile (Q1) across multiple categories as of 2023, including Computer Networks and Communications, Safety, Risk, Reliability and Quality, and Software. The journal’s notable Scopus rankings further reflect its impact, holding positions within the top 15% in several engineering and computer science areas. Spanning a converged period from 2013 to 2024, the journal aims to disseminate high-quality research findings, facilitating a vibrant platform for scholars, practitioners, and students to engage with contemporary challenges in information security. Although not an open-access journal, the knowledge shared within its pages is indispensable for those dedicated to advancing the technological and theoretical underpinnings of security measures in various applications.
Theoretical Computer Science
Elevating Research in Theoretical Frameworks and BeyondTheoretical Computer Science, published by Elsevier, serves as a pivotal platform in the field of computational theory, exploring the foundational aspects of computer science and mathematical logic since its inception in 1975. With both a print ISSN of 0304-3975 and an E-ISSN of 1879-2294, this journal is esteemed for its rigorous peer-review process and commitment to advancing knowledge in theoretical frameworks and algorithms. Positioned in the Q2 quartile for both Computer Science (miscellaneous) and Theoretical Computer Science categories, it ranks #124 out of 232 in general computer science and #73 out of 130 in theoretical computer science according to Scopus metrics, reflecting its significant influence and reach within the academic community. Researchers and professionals can access this journal through institutional subscriptions, providing a plethora of high-quality articles that contribute to ongoing debates and developments in the discipline. The journal's scope encompasses a wide array of topics, ensuring relevance across various subfields, thus making it an essential resource for anyone dedicated to furthering their understanding of theoretical computer science.
CRYPTOLOGIA
Unlocking the Secrets of Secure CommunicationCRYPTOLOGIA, published by Taylor & Francis Inc, is a pivotal journal dedicated to the field of cryptography and its applications. With an ISSN of 0161-1194 and an E-ISSN of 1558-1586, this journal has been a significant platform since its inception in 1977, promoting rigorous peer-reviewed research for scholars and practitioners alike. Although the journal's coverage was discontinued in Scopus after 2018, its legacy continues through a devoted readership, and it remains influential in the domains of Computer Science and Applied Mathematics, as indicating by its Scopus rankings. CRYPTOLOGIA presents a crucial repository of knowledge for those engaged in the evolving challenges of secure communication and information integrity. Researchers, professionals, and students interested in cryptographic protocols and theory can find invaluable insights and advancements within its pages, all while benefiting from the quality assurance of a reputable publisher.
PROGRAMMING AND COMPUTER SOFTWARE
Connecting Researchers and Practitioners in Software DevelopmentPROGRAMMING AND COMPUTER SOFTWARE is a distinguished journal committed to advancing the field of software development and programming methodologies. Published by PLEIADES PUBLISHING INC, this journal has been a valuable resource since its inception in 1978, reaching out to researchers, professionals, and students alike. With an emphasis on rigorous peer-reviewed articles, the journal holds a Q3 ranking in the realm of Software according to the latest 2023 Category Quartiles. Though it does not offer open access, the journal ensures that high-quality research is disseminated to its audience, providing insights into evolving programming techniques, software engineering challenges, and innovative solutions. With its convergence of years extending to 2024, PROGRAMMING AND COMPUTER SOFTWARE remains a pivotal publication, fostering a deeper understanding of the complexities in computer programming while supporting the broader software community.
EURASIP Journal on Information Security
Delivering open access to groundbreaking security findings.EURASIP Journal on Information Security, published by Springer International Publishing AG, is a premier open access journal dedicated to the rapid dissemination of research findings in the field of information security. With an ISSN of 2510-523X and a strong reputation reflected in its 2023 quartile rankings—Q1 in Computer Science Applications and Q2 in Signal Processing—this journal serves as a critical platform for researchers, professionals, and students alike to explore cutting-edge advancements in security technologies and methodologies. Established in 2007 as an open access journal, it promotes accessibility and encourages collaboration among the global scientific community. The journal's objectives include fostering innovative research that addresses the complex challenges of information security in today's digital landscape. With its base in the United Kingdom, EURASIP Journal on Information Security is committed to contributing to the evolution of security practices, ensuring that its audience stays at the forefront of the discipline.
International Journal of Information Security
Transforming Insights into Actionable Security Strategies.The International Journal of Information Security, published by Springer, stands as a premier platform for research in the rapidly evolving field of information security. Operating under ISSN 1615-5262 and E-ISSN 1615-5270, this journal has established a significant academic presence since its inception in 2005. With a commendable 2023 impact factor ranking, it holds a distinguished position in various categories, including Q1 in Information Systems and Safety, Risk, Reliability and Quality, and Q2 in Computer Networks and Communications and Software. This reflects the journal's commitment to publishing high-quality, peer-reviewed articles that advance both theoretical and practical aspects of information security. Researchers and professionals alike will find invaluable insights regarding the latest developments, methodologies, and trends in the field, making it an essential resource for staying current with contemporary challenges and solutions. By fostering a cross-disciplinary dialogue among security specialists, system engineers, and risk managers from around the globe, the journal not only enhances the academic discourse but also contributes to the practical application of findings in the industry.