Logo - springer
Slogan - springer

New & Forthcoming Titles | Journal of Cryptographic Engineering - incl. option to publish open access (Editorial Board)

Journal of Cryptographic Engineering

Journal of Cryptographic Engineering

Editor-in-Chief: Çetin K. Koç

ISSN: 2190-8508 (print version)
ISSN: 2190-8516 (electronic version)

Journal no. 13389

$99.00 Personal Rate e-only for the Americas
Get Subscription

Online subscription, valid from January through December of current calendar year

Immediate access to this year's issues via SpringerLink

1 Volume(-s) with 4 issue(-s) per annual subscription

Automatic annual renewal

More information: >> FAQs // >> Policy


Çetin Kaya Koç
University of California, Santa Barbara, USA

Steering Committee:

Çetin Kaya Koç
University of California, Santa Barbara, USA

Christof Paar
Ruhr University of Bochum, Germany

Jean-Jacques Quisquater
Université catholique de Louvain, Belgium

Ingrid Verbauwhede
Katholieke Universiteit Leuven, Belgium


Editorial Board:

Lejla Batina, Radboud University Nijmegen, The Netherlands

Daniel J. Bernstein, University of Illinois at Chicago, USA

Guido Marco Bertoni, ST Microelectronics, Italy

Joan Daemen, ST Microelectronics, Belgium

Ricardo Dahab, University of Campinas, Brazil

Jean-Luc Danger, Télécom ParisTech, France

Thomas Eisenbarth, Worcester Polytechnic Institute, USA

Serdar Süer Erdem, Gebze Technical University, Turkey

Wieland Fischer, Infineon Technologies, Neubiberg, Germany

Krzysztof Gaj, George Mason University, USA

Tim Güneysu, Ruhr University of Bochum, Germany

Sylvain Guilley, Télécom ParisTech, France

Anwar Hasan, University of Waterloo, Canada

Naofumi Homma, Tohoku University, Japan

Marc Joye, Technicolor, France

Tanja Lange, Technische Universiteit Eindhoven, The Netherlands

Zhe Liu, University of Luxembourg

Patrick Longa, Microsoft Research, USA

Roel Maes, Intrinsic-ID, The Netherlands

Stefan Mangard, Graz University of Technology, Austria

Debdeep Mukhopadhyay, Indian Institute of Technology Kharagpur, India

David Naccache, École normale supérieure, Paris, France

Elisabeth Oswald, University of Bristol, UK

Emmanuel Prouff, Morpho, Issy-les-Moulineaux, France

Francisco Rodríguez Henríquez, CINVESTAV, IPN, Mexico

Pankaj Rohatgi, Cryptography Research, USA

Kazuo Sakiyama, The University of Electro-Communications, Japan

Erkay Savaş, Sabanci University, Turkey

Patrick Schaumont, Virginia Tech, USA

Werner Schindler, Bundesamt für Sicherheit in der Informationstechnik, Germany

Peter Schwabe, Radboud University, The Netherlands

Jean-Pierre Seifert, TU Berlin, Germany

François-Xavier Standaert, Université catholique de Louvain, Belgium

Tsuyoshi Takagi, University of Tokyo, Japan

Damien Vergnaud, École normale supérieure, Paris, France


Read this Journal on Springerlink

For authors and editors

  • Aims and Scope

    Aims and Scope


    The Journal of Cryptographic Engineering is an archival journal publishing high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals.

    The Journal of Cryptographic Engineering will cover the research areas summarized below.

    Cryptographic Hardware:

    Hardware architectures for public-key cryptography and secret-key cryptography; special-purpose hardware for cryptanalysis; cryptographic processors and co-processors; hardware accelerators for security protocols (security processors, network processors, etc.); true and pseudorandom number generators; Physically Unclonable Functions (PUFs).

    Cryptographic Software for Embedded Systems:

    Efficient software implementations of cryptography for embedded processors; efficient and secure implementations of cryptography using multiprocessor cores; cryptographic libraries; cryptographic algorithms targeting embedded devices.

    Attacks Against Implementations and Countermeasures Against These Attacks:

    Side channel attacks and countermeasures; faults and fault models for cryptographic devices; fault attacks and countermeasures; hardware tamper resistance; Trojan hardware.

    Tools and Methodologies:

    Computer aided cryptographic engineering; methodologies and environments for fair comparison of hardware and software efficiency of cryptographic algorithms, architectures, and implementations; partial and run-time reconfiguration of cryptographic systems; reliability and fault tolerance in cryptography and cryptanalysis; architectures for trusted computing.

    Applications and Implementation Environments:

    Cryptography in wireless applications (mobile phone, WLANs, etc.); cryptography for pervasive computing (RFID, sensor networks, etc.); FPGA design security; hardware IP protection and anti-counterfeiting techniques; reconfigurable hardware for cryptography; smart card processors, systems, and applications; security in commercial consumer applications (pay-TV, automotive, etc.); secure storage devices (memories, disks, etc.); technologies and hardware for content protection; security for embedded software and systems.    

  • Submit Online
  • Open Choice - Your Way to Open Access
  • CfP - New Journal Announcement (pdf, 156...
  • Instructions for Authors

    Instructions for Authors


  • Author Academy: Training for Authors
  • English Language Editing

    English Language Editing


  • Copyright Information

    Copyright Information


    Copyright Information

    For Authors

    Submission of a manuscript implies: that the work described has not been published before (except in form of an abstract or as part of a published lecture, review or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all co-authors, if any, as well as – tacitly or explicitly – by the responsible authorities at the institution where the work was carried out.

    Author warrants (i) that he/she is the sole owner or has been authorized by any additional copyright owner to assign the right, (ii) that the article does not infringe any third party rights and no license from or payments to a third party is required to publish the article and (iii) that the article has not been previously published or licensed. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. Transfer of copyright to Springer (respectively to owner if other than Springer) becomes effective if and when a Copyright Transfer Statement is signed or transferred electronically by the corresponding author. After submission of the Copyright Transfer Statement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted by Springer.

    The copyright to this article, including any graphic elements therein (e.g. illustrations, charts, moving images), is assigned for good and valuable consideration to Springer effective if and when the article is accepted for publication and to the extent assignable if assignability is restricted for by applicable law or regulations (e.g. for U.S. government or crown employees).

    The copyright assignment includes without limitation the exclusive, assignable and sublicensable right, unlimited in time and territory, to reproduce, publish, distribute, transmit, make available and store the article, including abstracts thereof, in all forms of media of expression now known or developed in the future, including pre- and reprints, translations, photographic reproductions and microform. Springer may use the article in whole or in part in electronic form, such as use in databases or data networks for display, print or download to stationary or portable devices. This includes interactive and multimedia use and the right to alter the article to the extent necessary for such use.

    Authors may self-archive the Author's accepted manuscript of their articles on their own websites. Authors may also deposit this version of the article in any repository, provided it is only made publicly available 12 months after official publication or later. He/she may not use the publisher's version (the final article), which is posted on SpringerLink and other Springer websites, for the purpose of self-archiving or deposit. Furthermore, the Author may only post his/her version provided acknowledgement is given to the original source of publication and a link is inserted to the published article on Springer's website. The link must be accompanied by the following text: "The final publication is available at link.springer.com".

    Prior versions of the article published on non-commercial pre-print servers like arXiv.org can remain on these servers and/or can be updated with Author's accepted version. The final published version (in pdf or html/xml format) cannot be used for this purpose. Acknowledgement needs to be given to the final publication and a link must be inserted to the published article on Springer's website, accompanied by the text "The final publication is available at link.springer.com". Author retains the right to use his/her article for his/her further scientific career by including the final published journal article in other publications such as dissertations and postdoctoral qualifications provided acknowledgement is given to the original source of publication.

    Author is requested to use the appropriate DOI for the article. Articles disseminated via link.springer.com are indexed, abstracted and referenced by many abstracting and information services, bibliographic networks, subscription agencies, library networks, and consortia.

    For Readers

    While the advice and information in this journal is believed to be true and accurate at the date of its publication, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may have been made. The publisher makes no warranty, express or implied, with respect to the material contained herein.

    All articles published in this journal are protected by copyright, which covers the exclusive rights to reproduce and distribute the article (e.g., as offprints), as well as all translation rights. No material published in this journal may be reproduced photographically or stored on microfilm, in electronic data bases, video disks, etc., without first obtaining written permission from the publisher (respectively the copyright owner if other than Springer). The use of general descriptive names, trade names, trademarks, etc., in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.

    Springer has partnered with Copyright Clearance Center's RightsLink service to offer a variety of options for reusing Springer content. For permission to reuse our content please locate the material that you wish to use on link.springer.com or on springerimages.com and click on the permissions link or go to copyright.com, then enter the title of the publication that you wish to use. For assistance in placing a permission request, Copyright Clearance Center can be connected directly via phone: +1-855-239-3415, fax: +1-978-646-8600, or e-mail: info@copyright.com.

    © Springer-Verlag Berlin Heidelberg

Services for the Journal

Alerts for this journal


Get the table of contents of every new issue published in Journal of Cryptographic Engineering.