
The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools, implementations and applications in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, side-channel attacks and countermeasures, and embedded security. JCEN serves the academic and corporate R&D community interested in cryptographic hardware and embedded security.
JCEN publishes essential research on broad and varied topics including:
- Public-key cryptography, secret-key cryptography and post-quantum cryptography
- Cryptographic implementations include cryptographic processors, physical unclonable functions, true and deterministic random number generators, efficient software and hardware architectures
- Attacks on implementations and their countermeasures, such as side-channel attacks, fault attacks, hardware tampering and reverse engineering techniques
- Security evaluation of real-world cryptographic systems, formal methods and verification tools for secure embedded design that offer provable security, and metrics for measuring security
- Applications of state-of-the-art cryptography, such as IoTs, RFIDs, IP protection, cyber-physical systems composed of analog and digital components, automotive security and trusted computing
- The only journal devoted to cryptographic implementations, from design to attacks and to countermeasures in order to create secure and robust systems
- Benefits professionals in both academic and corporate settings
- Recommended by our authors - 100% of authors surveyed in 2017 rated their publishing experience as ‘excellent’ or ‘good’
Journal information
- Editor-in-Chief
-
- Çetin Kaya Koç
- Publishing model
- Hybrid (Transformative Journal). Learn about publishing Open Access with us
Journal metrics
- 95 days
- Submission to first decision
- 384 days
- Submission to acceptance
- 22,321 (2019)
- Downloads
Latest issue

Latest articles
-
-
-
Physical security in the post-quantum era
Authors (first, second and last of 6)
-
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure
Authors (first, second and last of 6)
-
Spectral approach to process the (multivariate) high-order template attack against any masking scheme
Authors (first, second and last of 4)
About this journal
- Electronic ISSN
- 2190-8516
- Print ISSN
- 2190-8508
- Abstracted and indexed in
-
- CNKI
- Current Contents/Engineering, Computing and Technology
- DBLP
- Dimensions
- EBSCO Discovery Service
- EI Compendex
- Google Scholar
- INSPEC
- Institute of Scientific and Technical Information of China
- Japanese Science and Technology Agency (JST)
- Naver
- OCLC WorldCat Discovery Service
- ProQuest Advanced Technologies & Aerospace Database
- ProQuest Central
- ProQuest Engineering
- ProQuest Materials Science and Engineering Database
- ProQuest SciTech Premium Collection
- ProQuest Technology Collection
- ProQuest-ExLibris Primo
- ProQuest-ExLibris Summon
- SCImago
- SCOPUS
- Science Citation Index Expanded (SciSearch)
- TD Net Discovery Service
- UGC-CARE List (India)
- WTI Frankfurt eG
- Copyright information