Logo - springer
Slogan - springer

Computer Science - Theoretical Computer Science | Journal of Cryptology-incl. option to publish open access

Journal of Cryptology

Journal of Cryptology

Co-Editor-in-Chief: M. Franklin; I.B. Damgård

ISSN: 0933-2790 (print version)
ISSN: 1432-1378 (electronic version)

Journal no. 145

Springer Open Access PB_Banner_Publish-now_575x60
  • Provides a forum for original results in all areas of modern information security
  • Covers both cryptography and cryptanalysis, including information theoretic and complexity theoretic perspectives
  • Also discusses implementation, application, and standards issues
  • The official journal of the International Association for Cryptologic Research

The Journal of Cryptology is a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Coverage includes such topics as public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, the journal publishes short notes.

The Journal of Cryptology is the official journal of the International Association for Cryptologic Research.

Related subjects » Computational Science & Engineering - Probability Theory and Stochastic Processes - Signals & Communication - Theoretical Computer Science

Impact Factor: 0.771 (2013) * 

Journal Citation Reports®, Thomson Reuters

Abstracted/Indexed in 

Science Citation Index, Science Citation Index Expanded (SciSearch), Journal Citation Reports/Science Edition, SCOPUS, INSPEC, Zentralblatt Math, Google Scholar, EBSCO, Academic OneFile, ACM Digital Library, Computer Abstracts International Database, Computer and Communication Security Abstracts, Computer Science Index, CSA Environmental Sciences, Current Contents/Engineering, Computing and Technology, DBLP, EI-Compendex, Gale, Mathematical Reviews, OCLC, PASCAL, SCImago, STMA-Z, Summon by ProQuest

Popular Content within this publication 

 

Articles

For authors and editors


  • Journal Citation Reports®, Thomson Reuters
    2013 Impact Factor
  • 0.771
  • Aims and Scope

    Aims and Scope

    Close

    Journal of Cryptology provides a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Illustrative topics include public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, short notes are acceptable. 

  • Submit Online
  • Open Choice - Your Way to Open Access
  • Instructions for Authors

    Instructions for Authors

    Close

  • Copyright Transfer Statement (pdf, 53 kB...
  • Author Academy: Training for Authors
  • Copyright information

    Copyright information

    Close

     

    Copyright

    Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstract or as part of a published lecture, review or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all coauthors, if any, as well as, tacitly or explicitly, by the responsible authorities at the institution where the work was carried out. Transfer of copyright to International Association for Cryptologic Research becomes effective if and when the article is accepted for publication. The copyright covers the exclusive right (for U.S. government employees: to the extent transferable) to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or other reproductions of similar nature.

    All articles published in this journal are protected by copyright, which covers the exclusive rights to reproduce and distribute the article (e.g., as reprints), as well as all translation rights. No material published in this journal may be reproduced photographically or stored on microfilm, in electronic data bases, video disks, etc., without first obtaining written permission from International Association for Cryptologic Research. The use of general descriptive names, trade names, trademarks, etc., in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

    An author may make his/her article published by Springer-Verlag available on his/her personal home page, provided the source of the published article is cited and International Association for Cryptologic Research is mentioned as the copyright holder. Authors are requested to create a link to the published article in Springer's internet service. The link must be accompanied by the following text: "The original publication is available at http://www.springerlink.com/". Please use the appropriate URL and/or DOI for the article. Articles disseminated via SpringerLink are indexed, abstracted and referenced by many abstracting and information services, bibliographic networks, subscription agencies, library networks, and consortia.

    While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Springer-Verlag publishes advertisements in this journal in reliance upon the responsibility of the advertiser to comply with all legal requirements relating to the marketing and sale of products or services advertised. Springer-Verlag and the editors are not responsible for claims made in the advertisements published in the journal. The appearance of advertisements in Springer-Verlag publications does not constitute endorsement, implied or intended, of the product advertised or the claims made for it by the advertiser.

    Special regulations for photocopies in the USA. Photocopies may be made for personal or in-house use beyond the limitations stipulated under Section 107 or 108 of U.S. Copyright Law, provided a fee is paid. All fees should be paid to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA (web: http://www.copyright.com; fax: 978-646-8600; phone: 978-750-8400), stating the ISSN 0933-2790, the volume, and the first and last page numbers of each article copied. The copyright owner's consent does not include copying for general distribution, promotion, new works, or resale. In these cases, specific written permission must first be obtained from the publisher.

    The Canada Institute for Scientific and Technical Information (CISTI) provides a comprehensive, world-wide document delivery service for all Springer-Verlag journals. For more information, or to place an order for a copyright-cleared Springer-Verlag document, please contact Client Assistant, Document Delivery, CISTI, Ottawa K1A 0S2, Canada. Telephone: (613) 993-9251; Fax: (613) 952-8243; e-mail: cisti.docdel@nrc.ca. You may also contact INFOTRIEVE (web: http://www.infotrieve.com/; email: orders@infotrieve.com; fax: 310-208-5971; phone: 800-422-4633), UnCover: http://www.ingenta.com; UMI: http://www.umi.com/; ISI: http://www.isinet.com

Alerts for this journal

 

Get the table of contents of every new issue published in Journal of Cryptology.