Logo - springer
Slogan - springer

Computer Science - Theoretical Computer Science | Journal of Cryptology-incl. option to publish open access (Editorial Board)

Journal of Cryptology

Journal of Cryptology

Co-Editor-in-Chief: M. Franklin; I.B. Damgård

ISSN: 0933-2790 (print version)
ISSN: 1432-1378 (electronic version)

Journal no. 145

Editor-in-Chief

Ivan Bjerre Damgård
Aarhus Universitet
Institut for Datalogi
Åbogade 34
bygning 5335, lokale 277
8200 Aarhus N, Denmark
ivan@cs.au.dk


Editorial Board

Ran Canetti
IBM Research
30 Saw Mill River Road
Hawthorne, NY 10532, USA
canetti@watson.ibm.com

Ronald Cramer
CWI
Kruislaan 413
P.O. Box 94079
1098 SJ Amsterdam
The Netherlands
cramer@cwi.nl

Yevgeniy Dodis
Department of Computer Science
New York University
251 Mercer Street
New York, NY  10012, USA
dodis@courant.nyu.edu

Matthew Franklin
Department of Computer Science
University of California, Davis
One Shields Avenue
Davis, CA 95616-8562, USA
franklin@cs.ucdavis.edu

Jonathan Katz
Department of Computer Science
University of Maryland
A.V. Williams Building
College Park, MD 20742, USA
jkatz@cs.umd.edu

Eike Kiltz
Fakultät für Mathematik,
NA 5/67Ruhr-Universität Bochum
Universitätsstraße 150D-44780 Bochum
Germany
eike.kiltz@rub.de

Hugo Krawczyk
IBM T.J. Watson Research Center
19 Skyline Drive
Hawthorne, NY 10532, USA 
hugo@ee.technion.ac.il

Mitsuru Matsui
Information Technology R&D Center
Mitsubishi Electric Corporation
5-1-1 Ofuna Kamakura JAPAN
Matsui.Mitsuru@ab.MitsubishiElectric.co.jp

Ueli Maurer
Department of Computer Science
ETH Zürich
CH-8092 Zürich, Switzerland
maurer@inf.ethz.ch

Phong Q. Nguyen
Département d'Informatique
Ecole Normale Supérieure
45 Rue d'Ulm   
F-75230 Paris Cedex 05, France 
pnguyen@di.ens.fr

Kaisa Nyberg
Aalto University
P.O. Box 15400
FI-00076 Aalto
Finland
kaisa.nyberg@tkk.fi

Tatsuaki Okamoto
NTT Laboratories
1-1 Hikarino-oka
Yokosuka 239-0847, Japan   
okamoto.tatsuaki@lab.ntt.co.jp 

Rafail Ostrovsky
Department of Computer Science
University of California
Box 951596, 3732D BH
Los Angeles, CA 90095-1596, USA 
rafail@cs.ucla.edu

Kenneth G. Paterson 
Information Security Group
Royal Holloway, University of London
Egham, Surrey, TW20 0EX, England
kenny.paterson@rhul.ac.uk

Tal Rabin
IBM Research
3S-D36
19 Skyline Drive
Hawthorne, New York, 10532
talr@us.ibm.com

Omer Reingold
Microsoft Research Silicon Valley
1065 La Avenida
Mountain View, CA 94043, USA
omer.reingold@microsoft.com

Vincent Rijmen
KU Leuven
Kasteelpark Arenberg 10
B-3001 Heverlee, Belgium
vincent.rijmen@esat.kuleuven.be

Phillip Rogaway
University of California, Davis Department of Computer Science
Kemper Hall, One Shields Ave.
Davis, CA 95616 USA
rogaway@cs.ucdavis.edu

Nigel P. Smart
Computer Science Department
Woodland Road
University of Bristol
Bristol BS8 IUB
England
nigel@cs.bris.ac.uk

Francois-Xavier Standaert
UCL Crypto Group
Université Catholique de Louvain
Place de Levant, 3
B-1348 Louvain-la-Neuve
Belgium 
fstandae@uclouvain.be

Serge Vaudenay
EPFL IC LASEC
Station 14
INF Building
1015 Lausanne
Switzerland
serge.vaudenay@epfl.ch

Xiaoyun Wang
Institute of Advanced Study
Tsinghua University
Beijing 100084, China
xiaoyunwang@tsinghua.edu.cn

Stefan Wolf
Informatikdepartement
ETH Zürich
ETH Zentrum
CH-8092 Zürich, Switzerland
wolf@inf.ethz.ch

Last change: August 28, 2014
Email: springerlink-ny@springer.com
© Springer Science and Business Media LLC 

 

Articles

For authors and editors


  • Journal Citation Reports®, Thomson Reuters
    2013 Impact Factor
  • 0.771
  • Aims and Scope

    Aims and Scope

    Close

    Journal of Cryptology provides a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Illustrative topics include public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, key management and quantum cryptography. In addition to full-length technical, survey, and historical articles, short notes are acceptable. 

  • Submit Online
  • Open Choice - Your Way to Open Access
  • Instructions for Authors

    Instructions for Authors

    Close

  • Copyright Transfer Statement (pdf, 53 kB...
  • Author Academy: Training for Authors
  • Copyright information

    Copyright information

    Close

     

    Copyright

    Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstract or as part of a published lecture, review or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all coauthors, if any, as well as, tacitly or explicitly, by the responsible authorities at the institution where the work was carried out. Transfer of copyright to International Association for Cryptologic Research becomes effective if and when the article is accepted for publication. The copyright covers the exclusive right (for U.S. government employees: to the extent transferable) to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or other reproductions of similar nature.

    All articles published in this journal are protected by copyright, which covers the exclusive rights to reproduce and distribute the article (e.g., as reprints), as well as all translation rights. No material published in this journal may be reproduced photographically or stored on microfilm, in electronic data bases, video disks, etc., without first obtaining written permission from International Association for Cryptologic Research. The use of general descriptive names, trade names, trademarks, etc., in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

    An author may make his/her article published by Springer-Verlag available on his/her personal home page, provided the source of the published article is cited and International Association for Cryptologic Research is mentioned as the copyright holder. Authors are requested to create a link to the published article in Springer's internet service. The link must be accompanied by the following text: "The original publication is available at http://www.springerlink.com/". Please use the appropriate URL and/or DOI for the article. Articles disseminated via SpringerLink are indexed, abstracted and referenced by many abstracting and information services, bibliographic networks, subscription agencies, library networks, and consortia.

    While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Springer-Verlag publishes advertisements in this journal in reliance upon the responsibility of the advertiser to comply with all legal requirements relating to the marketing and sale of products or services advertised. Springer-Verlag and the editors are not responsible for claims made in the advertisements published in the journal. The appearance of advertisements in Springer-Verlag publications does not constitute endorsement, implied or intended, of the product advertised or the claims made for it by the advertiser.

    Special regulations for photocopies in the USA. Photocopies may be made for personal or in-house use beyond the limitations stipulated under Section 107 or 108 of U.S. Copyright Law, provided a fee is paid. All fees should be paid to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, USA (web: http://www.copyright.com; fax: 978-646-8600; phone: 978-750-8400), stating the ISSN 0933-2790, the volume, and the first and last page numbers of each article copied. The copyright owner's consent does not include copying for general distribution, promotion, new works, or resale. In these cases, specific written permission must first be obtained from the publisher.

    The Canada Institute for Scientific and Technical Information (CISTI) provides a comprehensive, world-wide document delivery service for all Springer-Verlag journals. For more information, or to place an order for a copyright-cleared Springer-Verlag document, please contact Client Assistant, Document Delivery, CISTI, Ottawa K1A 0S2, Canada. Telephone: (613) 993-9251; Fax: (613) 952-8243; e-mail: cisti.docdel@nrc.ca. You may also contact INFOTRIEVE (web: http://www.infotrieve.com/; email: orders@infotrieve.com; fax: 310-208-5971; phone: 800-422-4633), UnCover: http://www.ingenta.com; UMI: http://www.umi.com/; ISI: http://www.isinet.com

Alerts for this journal

 

Get the table of contents of every new issue published in Journal of Cryptology.