Journal of Cryptographic Engineering

Scope & Guideline

Elevating the standards of research in cryptography and information security.

Introduction

Welcome to your portal for understanding Journal of Cryptographic Engineering, featuring guidelines for its aims and scope. Our guidelines cover trending and emerging topics, identifying the forefront of research. Additionally, we track declining topics, offering insights into areas experiencing reduced scholarly attention. Key highlights include highly cited topics and recently published papers, curated within these guidelines to assist you in navigating influential academic dialogues.
LanguageEnglish
ISSN2190-8508
PublisherSPRINGER HEIDELBERG
Support Open AccessNo
CountryUnited States
TypeJournal
Convergefrom 2011 to 2024
AbbreviationJ CRYPTOGR ENG / J. Cryptogr. Eng.
Frequency4 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressTIERGARTENSTRASSE 17, D-69121 HEIDELBERG, GERMANY

Aims and Scopes

The Journal of Cryptographic Engineering focuses on advancing the field of cryptographic engineering through the publication of high-quality research that addresses both theoretical and practical aspects of cryptography. Its core areas encompass a variety of topics related to security, efficiency, and innovative methodologies in cryptographic systems.
  1. Cryptographic Algorithms and Protocols:
    The journal covers the design, analysis, and implementation of cryptographic algorithms and protocols, including symmetric and asymmetric encryption schemes, digital signatures, and authentication protocols.
  2. Security Analysis and Attack Methods:
    Research on various forms of security analysis, including side-channel attacks, fault attacks, and their countermeasures is a prominent focus, addressing the vulnerabilities of cryptographic systems.
  3. Hardware and Software Implementations:
    The journal emphasizes the engineering aspects of cryptographic implementations, including hardware accelerators, FPGA designs, and software optimizations for cryptographic operations.
  4. Post-Quantum Cryptography:
    With the advent of quantum computing, the journal has increasingly focused on post-quantum cryptographic schemes, exploring their security, efficiency, and implementation challenges.
  5. Machine Learning in Cryptography:
    The integration of machine learning techniques in cryptographic analysis and security is an emerging area of interest, particularly for side-channel attacks and vulnerability detection.
The Journal of Cryptographic Engineering is witnessing a surge in interest in several innovative and relevant themes, reflecting the current trends and future directions in cryptography.
  1. Side-Channel Attack Mitigation:
    There is a growing emphasis on advanced techniques to mitigate side-channel attacks, with innovative methodologies being developed to enhance the security of cryptographic implementations against such vulnerabilities.
  2. Post-Quantum Cryptography Research:
    Research surrounding post-quantum cryptographic schemes is increasingly prominent, addressing the imminent challenges posed by quantum computing and the need for secure algorithms.
  3. Hardware Security and Fault Injection:
    The journal has seen a rise in studies focused on hardware security, particularly fault injection attacks and hardware Trojan detection, emphasizing the need for robust hardware designs.
  4. Machine Learning Applications in Cryptography:
    The application of machine learning in cryptographic contexts, particularly for analyzing vulnerabilities and enhancing security measures, is an emerging theme that is gaining significant attention.
  5. Efficiency in Cryptographic Implementations:
    Research aimed at improving the efficiency of cryptographic algorithms and their implementations, including energy-efficient designs and hardware acceleration techniques, is increasingly relevant in the context of IoT and mobile devices.

Declining or Waning

As the field of cryptographic engineering evolves, certain themes have shown a decline in frequency or relevance within the journal's recent publications. This reflects shifting interests and advancements in technology.
  1. Traditional Cryptographic Techniques:
    The focus on classical cryptographic techniques, such as older block ciphers and hashing algorithms, is waning as newer, more secure methods and post-quantum approaches gain traction.
  2. Static Analysis of Cryptographic Protocols:
    Research dedicated to static analysis methods for cryptographic protocols appears to be decreasing, possibly due to the growing complexity of dynamic and adaptive attack scenarios.
  3. Basic Theoretical Foundations:
    While foundational studies are important, there has been a noticeable reduction in publications centered solely on theoretical aspects without practical implications, as the field moves towards more application-oriented research.

Similar Journals

DESIGNS CODES AND CRYPTOGRAPHY

Transforming Ideas into Secure Solutions
Publisher: SPRINGERISSN: 0925-1022Frequency: 12 issues/year

Designs, Codes and Cryptography is a renowned peer-reviewed journal published by Springer, dedicated to the interdisciplinary fields of applied mathematics, computer science, and discrete mathematics. With an exceptional impact factor, this journal is recognized for its high-quality research contributions and currently holds a prestigious Q1 ranking in multiple categories, including Applied Mathematics and Theoretical Computer Science, as of 2023. Featuring an extensive range of articles from 1991 to 2024, the journal serves as a pivotal platform for professionals, researchers, and students alike, focusing on innovative developments in coding theory, cryptography, and their practical applications in computing and secure communication. The journal's scope encompasses theoretical foundations, as well as algorithmic and applied aspects, making it an essential resource for advancing knowledge in the rapidly evolving fields of computer science and mathematics.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY

Pioneering Research in Cryptography and Algebra
Publisher: TARU PUBLICATIONSISSN: 0972-0529Frequency: 8 issues/year

The Journal of Discrete Mathematical Sciences & Cryptography, published by Taru Publications, serves as a pivotal platform for researchers, professionals, and students in the fields of discrete mathematics and cryptography. Since its inception in 1998, the journal has consistently provided high-quality research articles, reviews, and case studies that span essential areas such as Algebra, Number Theory, and Applied Mathematics, achieving a Q3 category ranking in these disciplines as of 2023. With impressive Scopus rankings, including Rank #7 in Algebra and Number Theory and a notable 94th percentile status, this journal underscores its significance within the academic community. Although not an open access journal, it remains a crucial reference point for advancements in mathematical sciences, fostering scholarly dialogue and collaboration. As the field evolves, it continues to bridge theoretical frameworks and practical implementations, contributing substantially to the educational and professional landscape.

Journal of Information Security and Applications

Navigating Challenges in the Realm of Security
Publisher: ELSEVIERISSN: 2214-2126Frequency: 6 issues/year

Journal of Information Security and Applications, published by ELSEVIER, is a premier outlet for cutting-edge research in the field of information security and applications. With a dedicated ISSN of 2214-2126 and an E-ISSN of 2214-2134, this journal ranks impressively in the top quartile (Q1) across multiple categories as of 2023, including Computer Networks and Communications, Safety, Risk, Reliability and Quality, and Software. The journal’s notable Scopus rankings further reflect its impact, holding positions within the top 15% in several engineering and computer science areas. Spanning a converged period from 2013 to 2024, the journal aims to disseminate high-quality research findings, facilitating a vibrant platform for scholars, practitioners, and students to engage with contemporary challenges in information security. Although not an open-access journal, the knowledge shared within its pages is indispensable for those dedicated to advancing the technological and theoretical underpinnings of security measures in various applications.

ACM Transactions on Architecture and Code Optimization

Shaping the Evolution of Architecture and Code
Publisher: ASSOC COMPUTING MACHINERYISSN: 1544-3566Frequency: 4 issues/year

ACM Transactions on Architecture and Code Optimization, published by the Association for Computing Machinery (ACM), serves as a premier journal in the fields of architecture, hardware, and software optimization. With an ISSN of 1544-3566 and E-ISSN of 1544-3973, this journal provides a platform for innovative research and discussion from 2004 to 2024, reflecting its commitment to the evolving landscape of computer science. Holding a Q2 ranking in key categories such as Hardware and Architecture, Information Systems, and Software, it stands out in its field, catering to a broad audience of researchers, professionals, and students alike. While the journal does not currently offer open access, subscribers can benefit from an array of valuable insights into cutting-edge techniques for optimizing code and architectural designs. Its rigorous peer-review process ensures that only high-quality, impactful research is published, making it an essential resource for those seeking to advance their knowledge and practice in these vital areas of computing.

Quantum Information Processing

Unlocking the secrets of quantum information.
Publisher: SPRINGERISSN: 1570-0755Frequency: 1 issue/year

Quantum Information Processing, published by Springer, stands as a pivotal journal within the rapidly evolving field of quantum computing and information science. With an ISSN of 1570-0755 and an E-ISSN of 1573-1332, this journal has been a vital resource since its inception in 2004 and is set to continue contributing until 2024. Ranked in Q2 for Electrical and Electronic Engineering, Electronic, Optical and Magnetic Materials, and various other categories, its high visibility in academic circles is reinforced by its Scopus rankings, showcasing its integral role in advancing theoretical and practical aspects of quantum technologies. Although it operates under a subscription model, Quantum Information Processing prioritizes accessibility to groundbreaking research that covers a wide spectrum of topics, including quantum algorithms, quantum cryptography, and quantum error correction, making it essential reading for researchers, professionals, and students alike. As the field grows, the journal remains committed to fostering innovation and collaboration among scholars, ensuring its position as an influential platform for sharing pivotal advancements in quantum information theory and applications.

EURASIP Journal on Information Security

Exploring the future of secure technologies.
Publisher: SPRINGER INT PUBL AGISSN: 2510-523XFrequency: 1 issue/year

EURASIP Journal on Information Security, published by Springer International Publishing AG, is a premier open access journal dedicated to the rapid dissemination of research findings in the field of information security. With an ISSN of 2510-523X and a strong reputation reflected in its 2023 quartile rankings—Q1 in Computer Science Applications and Q2 in Signal Processing—this journal serves as a critical platform for researchers, professionals, and students alike to explore cutting-edge advancements in security technologies and methodologies. Established in 2007 as an open access journal, it promotes accessibility and encourages collaboration among the global scientific community. The journal's objectives include fostering innovative research that addresses the complex challenges of information security in today's digital landscape. With its base in the United Kingdom, EURASIP Journal on Information Security is committed to contributing to the evolution of security practices, ensuring that its audience stays at the forefront of the discipline.

PROGRAMMING AND COMPUTER SOFTWARE

Exploring the Frontiers of Software Engineering Excellence
Publisher: PLEIADES PUBLISHING INCISSN: 0361-7688Frequency: 6 issues/year

PROGRAMMING AND COMPUTER SOFTWARE is a distinguished journal committed to advancing the field of software development and programming methodologies. Published by PLEIADES PUBLISHING INC, this journal has been a valuable resource since its inception in 1978, reaching out to researchers, professionals, and students alike. With an emphasis on rigorous peer-reviewed articles, the journal holds a Q3 ranking in the realm of Software according to the latest 2023 Category Quartiles. Though it does not offer open access, the journal ensures that high-quality research is disseminated to its audience, providing insights into evolving programming techniques, software engineering challenges, and innovative solutions. With its convergence of years extending to 2024, PROGRAMMING AND COMPUTER SOFTWARE remains a pivotal publication, fostering a deeper understanding of the complexities in computer programming while supporting the broader software community.

ISeCure-ISC International Journal of Information Security

Fostering Collaboration in Information Security Research
Publisher: IRANIAN SOC CRYPTOLOGYISSN: 2008-2045Frequency: 2 issues/year

ISeCure-ISC International Journal of Information Security, published by the Iranian Society of Cryptology, is a vital open-access platform dedicated to advancing the field of information security. Since its inception in 2009, the journal has strived to disseminate high-quality, peer-reviewed research that addresses contemporary challenges in information security, cryptography, and related computational disciplines. With an ISSN of 2008-2045 and an E-ISSN of 2008-3076, it has gained visibility in the academic community, evidenced by its Quartile 4 ranking across multiple categories such as Applied Mathematics, Computational Theory, and Information Systems. This journal aims to foster innovative solutions and theoretical advancements, targeting researchers, professionals, and students who seek to contribute to and learn from the latest developments in the field. By providing a venue for explorative and empirical research, ISeCure-ISC holds an important position in promoting knowledge and collaborative efforts within the global information security landscape.

ACM Transactions on Embedded Computing Systems

Driving scholarly dialogue in embedded computing research.
Publisher: ASSOC COMPUTING MACHINERYISSN: 1539-9087Frequency: 6 issues/year

ACM Transactions on Embedded Computing Systems (ISSN: 1539-9087, E-ISSN: 1558-3465), published by the Association for Computing Machinery, is a premier academic journal dedicated to advancing the study and application of embedded computing systems. With a focus on both hardware and software aspects, this journal holds a distinguished Q2 ranking in its field (2023) and has achieved notable recognition within Scopus rankings, particularly in Hardware and Architecture (Rank #97/177) and Software (Rank #231/407). Encompassing research from 2002 to 2024, it serves as a crucial platform for disseminating cutting-edge findings that drive innovation and foster scholarly dialogue among researchers, professionals, and students alike. Although it does not offer open access options, the journal remains essential for those seeking to deepen their understanding of the complexities of embedded systems, contributing significantly to the growth of knowledge across disciplines.

Journal of Mathematical Cryptology

Illuminating the Path to Secure Information through Mathematical Rigor
Publisher: DE GRUYTER POLAND SP Z O OISSN: 1862-2976Frequency: 1 issue/year

The Journal of Mathematical Cryptology, published by DE GRUYTER POLAND SP Z O O, is a pioneering open-access journal that has been a valuable resource for researchers and professionals in the field of mathematical cryptography since its inception in 2007. With an ISSN of 1862-2976 and an E-ISSN of 1862-2984, this journal provides a platform for cutting-edge research, aiming to address the complexities and challenges presented by the evolving landscape of cybersecurity. As of 2023, the journal holds a respectable Q3 ranking in Applied Mathematics, Computational Mathematics, and Computer Science Applications, reflecting its relevance and growing impact within these disciplines. Although it currently has an H-index of "-", the qualitative contributions of the journal are recognized through its Scopus rankings, including a placement in the 58th percentile for Applied Mathematics. The journal is committed to fostering collaboration and innovation in mathematical methodologies applied to cryptography, thus attracting a diverse audience of researchers, students, and industry professionals. By embracing an open-access model since 2020, the Journal of Mathematical Cryptology enhances the visibility and accessibility of essential research findings, making it a crucial resource in the academic community.