Journal of Cryptographic Engineering
Scope & Guideline
Connecting minds to enhance the landscape of cryptographic innovation.
Introduction
Aims and Scopes
- Cryptographic Algorithms and Protocols:
The journal covers the design, analysis, and implementation of cryptographic algorithms and protocols, including symmetric and asymmetric encryption schemes, digital signatures, and authentication protocols. - Security Analysis and Attack Methods:
Research on various forms of security analysis, including side-channel attacks, fault attacks, and their countermeasures is a prominent focus, addressing the vulnerabilities of cryptographic systems. - Hardware and Software Implementations:
The journal emphasizes the engineering aspects of cryptographic implementations, including hardware accelerators, FPGA designs, and software optimizations for cryptographic operations. - Post-Quantum Cryptography:
With the advent of quantum computing, the journal has increasingly focused on post-quantum cryptographic schemes, exploring their security, efficiency, and implementation challenges. - Machine Learning in Cryptography:
The integration of machine learning techniques in cryptographic analysis and security is an emerging area of interest, particularly for side-channel attacks and vulnerability detection.
Trending and Emerging
- Side-Channel Attack Mitigation:
There is a growing emphasis on advanced techniques to mitigate side-channel attacks, with innovative methodologies being developed to enhance the security of cryptographic implementations against such vulnerabilities. - Post-Quantum Cryptography Research:
Research surrounding post-quantum cryptographic schemes is increasingly prominent, addressing the imminent challenges posed by quantum computing and the need for secure algorithms. - Hardware Security and Fault Injection:
The journal has seen a rise in studies focused on hardware security, particularly fault injection attacks and hardware Trojan detection, emphasizing the need for robust hardware designs. - Machine Learning Applications in Cryptography:
The application of machine learning in cryptographic contexts, particularly for analyzing vulnerabilities and enhancing security measures, is an emerging theme that is gaining significant attention. - Efficiency in Cryptographic Implementations:
Research aimed at improving the efficiency of cryptographic algorithms and their implementations, including energy-efficient designs and hardware acceleration techniques, is increasingly relevant in the context of IoT and mobile devices.
Declining or Waning
- Traditional Cryptographic Techniques:
The focus on classical cryptographic techniques, such as older block ciphers and hashing algorithms, is waning as newer, more secure methods and post-quantum approaches gain traction. - Static Analysis of Cryptographic Protocols:
Research dedicated to static analysis methods for cryptographic protocols appears to be decreasing, possibly due to the growing complexity of dynamic and adaptive attack scenarios. - Basic Theoretical Foundations:
While foundational studies are important, there has been a noticeable reduction in publications centered solely on theoretical aspects without practical implications, as the field moves towards more application-oriented research.
Similar Journals
ACM Transactions on Architecture and Code Optimization
Transforming Ideas into High-Performance SolutionsACM Transactions on Architecture and Code Optimization, published by the Association for Computing Machinery (ACM), serves as a premier journal in the fields of architecture, hardware, and software optimization. With an ISSN of 1544-3566 and E-ISSN of 1544-3973, this journal provides a platform for innovative research and discussion from 2004 to 2024, reflecting its commitment to the evolving landscape of computer science. Holding a Q2 ranking in key categories such as Hardware and Architecture, Information Systems, and Software, it stands out in its field, catering to a broad audience of researchers, professionals, and students alike. While the journal does not currently offer open access, subscribers can benefit from an array of valuable insights into cutting-edge techniques for optimizing code and architectural designs. Its rigorous peer-review process ensures that only high-quality, impactful research is published, making it an essential resource for those seeking to advance their knowledge and practice in these vital areas of computing.
Quantum Information Processing
Exploring the future of quantum technologies.Quantum Information Processing, published by Springer, stands as a pivotal journal within the rapidly evolving field of quantum computing and information science. With an ISSN of 1570-0755 and an E-ISSN of 1573-1332, this journal has been a vital resource since its inception in 2004 and is set to continue contributing until 2024. Ranked in Q2 for Electrical and Electronic Engineering, Electronic, Optical and Magnetic Materials, and various other categories, its high visibility in academic circles is reinforced by its Scopus rankings, showcasing its integral role in advancing theoretical and practical aspects of quantum technologies. Although it operates under a subscription model, Quantum Information Processing prioritizes accessibility to groundbreaking research that covers a wide spectrum of topics, including quantum algorithms, quantum cryptography, and quantum error correction, making it essential reading for researchers, professionals, and students alike. As the field grows, the journal remains committed to fostering innovation and collaboration among scholars, ensuring its position as an influential platform for sharing pivotal advancements in quantum information theory and applications.
Cybersecurity
Pioneering Research for Tomorrow's Cyber ChallengesCybersecurity, published by SpringerNature, serves as a pivotal platform in the realms of Artificial Intelligence, Information Systems, Software, and Computer Networks and Communications. With an impressive Impact Factor and an Open Access model initiated in 2018, this journal facilitates widespread dissemination of innovative research findings to a global audience. Based in the United Kingdom, Cybersecurity aims to advance knowledge and application in security innovations, risk management, and system resilience against cyber threats. The journal's current standing is prominently reflected in its Q1 and Q2 ratings across various computer science categories, indicating its reputable contribution to the academic community. By continuously publishing cutting-edge research, Cybersecurity plays a crucial role in informing policy decisions, advancing technology, and enhancing the collective understanding of cyber resilience, making it an essential resource for researchers, professionals, and students alike.
DESIGNS CODES AND CRYPTOGRAPHY
Illuminating the Path of Discrete Mathematics and Coding TheoryDesigns, Codes and Cryptography is a renowned peer-reviewed journal published by Springer, dedicated to the interdisciplinary fields of applied mathematics, computer science, and discrete mathematics. With an exceptional impact factor, this journal is recognized for its high-quality research contributions and currently holds a prestigious Q1 ranking in multiple categories, including Applied Mathematics and Theoretical Computer Science, as of 2023. Featuring an extensive range of articles from 1991 to 2024, the journal serves as a pivotal platform for professionals, researchers, and students alike, focusing on innovative developments in coding theory, cryptography, and their practical applications in computing and secure communication. The journal's scope encompasses theoretical foundations, as well as algorithmic and applied aspects, making it an essential resource for advancing knowledge in the rapidly evolving fields of computer science and mathematics.
Theoretical Computer Science
Elevating Research in Theoretical Frameworks and BeyondTheoretical Computer Science, published by Elsevier, serves as a pivotal platform in the field of computational theory, exploring the foundational aspects of computer science and mathematical logic since its inception in 1975. With both a print ISSN of 0304-3975 and an E-ISSN of 1879-2294, this journal is esteemed for its rigorous peer-review process and commitment to advancing knowledge in theoretical frameworks and algorithms. Positioned in the Q2 quartile for both Computer Science (miscellaneous) and Theoretical Computer Science categories, it ranks #124 out of 232 in general computer science and #73 out of 130 in theoretical computer science according to Scopus metrics, reflecting its significant influence and reach within the academic community. Researchers and professionals can access this journal through institutional subscriptions, providing a plethora of high-quality articles that contribute to ongoing debates and developments in the discipline. The journal's scope encompasses a wide array of topics, ensuring relevance across various subfields, thus making it an essential resource for anyone dedicated to furthering their understanding of theoretical computer science.
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
Exploring New Frontiers in Computational Theory.JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, published by the Institute of Information Science in Taiwan, is a pivotal platform for the dissemination of innovative research in the multidisciplinary fields of information science and engineering. Established in 1993, the journal primarily focuses on areas such as library and information sciences, human-computer interaction, hardware and architecture, as well as computational theory and software development. Despite holding a current Q4 ranking in several categories, the journal demonstrates significant potential for growth, particularly in computation and software systems, as evidenced by its Scopus rankings and percentiles. Researchers, professionals, and students will find this journal to be an invaluable resource to stay abreast of evolving theories and technologies in information science. The journal is accessible through traditional subscription models, fostering a broad academic outreach. It serves to enhance knowledge-sharing and collaboration within this dynamic and ever-evolving field.
IACR Transactions on Symmetric Cryptology
Pioneering Innovative Solutions in Secure CommunicationIACR Transactions on Symmetric Cryptology, published by the esteemed RUHR-UNIV BOCHUM at the Horst Gortz Institute for IT Security, stands as a beacon of innovation in the field of cryptology. With an E-ISSN of 2519-173X and a commitment to open access since 2016, this journal provides a platform for groundbreaking research that enhances our understanding and application of symmetric cryptographic methods. Reflecting its high academic standing, the journal boasts a Q1 ranking in categories such as Applied Mathematics, Computational Mathematics, and Computer Science Applications, positioning it among the top tiers of scholarly publications internationally. Researchers, professionals, and students are encouraged to contribute and access vital cutting-edge studies that inform both theoretical and practical advances in secure communication technologies. Situated in Bochum, Germany, the IACR Transactions on Symmetric Cryptology is an essential resource for anyone invested in the future of cryptographic research.
ACM Transactions on Embedded Computing Systems
Elevating knowledge in embedded systems for a digital future.ACM Transactions on Embedded Computing Systems (ISSN: 1539-9087, E-ISSN: 1558-3465), published by the Association for Computing Machinery, is a premier academic journal dedicated to advancing the study and application of embedded computing systems. With a focus on both hardware and software aspects, this journal holds a distinguished Q2 ranking in its field (2023) and has achieved notable recognition within Scopus rankings, particularly in Hardware and Architecture (Rank #97/177) and Software (Rank #231/407). Encompassing research from 2002 to 2024, it serves as a crucial platform for disseminating cutting-edge findings that drive innovation and foster scholarly dialogue among researchers, professionals, and students alike. Although it does not offer open access options, the journal remains essential for those seeking to deepen their understanding of the complexities of embedded systems, contributing significantly to the growth of knowledge across disciplines.
INTEGRATION-THE VLSI JOURNAL
Exploring the Future of Electrical and Electronic EngineeringIntegration - The VLSI Journal, published by Elsevier, stands as a significant contributor to the fields of Electrical and Electronic Engineering, Hardware and Architecture, and Software. With its ISSN 0167-9260 and E-ISSN 1872-7522, this journal caters to a global audience interested in cutting-edge research and advancements in Very Large Scale Integration (VLSI) technologies and methodologies. As of 2023, the journal is classified in the Q3 category in its respective fields, demonstrating its commitment to quality and relevance in engineering. Researchers, practitioners, and students can benefit from its rigorous peer-review process, which ensures the publication of high-impact studies and innovative findings within the engineering landscape. Boasting a converged history from 1983 to 2025, Integration - The VLSI Journal continues to foster scholarly exchange and collaboration, making it an essential resource for anyone aiming to stay at the forefront of VLSI research.
Journal of Information Security and Applications
Unveiling Insights in Information Security ExcellenceJournal of Information Security and Applications, published by ELSEVIER, is a premier outlet for cutting-edge research in the field of information security and applications. With a dedicated ISSN of 2214-2126 and an E-ISSN of 2214-2134, this journal ranks impressively in the top quartile (Q1) across multiple categories as of 2023, including Computer Networks and Communications, Safety, Risk, Reliability and Quality, and Software. The journal’s notable Scopus rankings further reflect its impact, holding positions within the top 15% in several engineering and computer science areas. Spanning a converged period from 2013 to 2024, the journal aims to disseminate high-quality research findings, facilitating a vibrant platform for scholars, practitioners, and students to engage with contemporary challenges in information security. Although not an open-access journal, the knowledge shared within its pages is indispensable for those dedicated to advancing the technological and theoretical underpinnings of security measures in various applications.