The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools, implementations and applications in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, side-channel attacks and countermeasures, and embedded security. JCEN serves the academic and corporate R&D community interested in cryptographic hardware and embedded security.JCEN publishes essential research on broad and varied topics including:Public-key cryptography, secret-key cryptography and post-quantum cryptographyCryptographic implementations include cryptographic processors, physical unclonable functions, true and deterministic random number generators, efficient software and hardware architecturesAttacks on implementations and their countermeasures, such as side-channel attacks, fault attacks, hardware tampering and reverse engineering techniquesSecurity evaluation of real-world cryptographic systems, formal methods and verification tools for secure embedded design that offer provable security, and metrics for measuring securityApplications of state-of-the-art cryptography, such as IoTs, RFIDs, IP protection, cyber-physical systems composed of analog and digital components, automotive security and trusted computing
《密码工程杂志》(JCEN)介绍了密码工程中有关架构、算法、技术、工具、实现和应用的高质量科学研究,包括密码硬件、密码嵌入式系统、旁道攻击和对策以及嵌入式安全。JCEN服务于对加密硬件和嵌入式安全感兴趣的学术和企业研发社区。JCEN发表了广泛而多样的主题的基础研究,包括:公钥加密、私钥加密和后量子加密加密实现包括加密处理器、物理不可克隆函数、真实和确定性随机数生成器、高效的软件和硬件架构对实现的攻击及其对策,如侧通道攻击、故障攻击、硬件篡改和逆向工程技术现实世界加密系统的安全评估、提供可证明安全性的安全嵌入式设计的形式化方法和验证工具,以及测量安全性的度量标准最先进加密技术的应用,如物联网、RFID、IP保护、由模拟和数字组件组成的网络物理系统、汽车安全和可信计算
年发文量 20
国人发稿量 0.59
国人发文占比 0.03%
自引率 -
平均录取率-
平均审稿周期 -
版面费 US$2780
偏重研究方向 COMPUTER SCIENCE, THEORY & METHODS-
期刊官网 https://www.springer.com/13389
投稿链接 https://www.editorialmanager.com/jcen/
How to reveal the secrets of an obscure white-box implementation
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00207-5
Applications of machine learning techniques in side-channel attacks: a survey
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00212-8
Deep learning for side-channel analysis and introduction to ASCAD database
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00220-8
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00209-3
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00204-8
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-018-00202-2
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00211-9
Polynomial multiplication over binary finite fields: new upper bounds
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00210-w
Side-channel robustness analysis of masked assembly codes using a symbolic approach
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00205-7
Faster modular arithmetic for isogeny-based crypto on embedded devices
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00214-6
Uniform Montgomery multiplier
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00213-7
On the feasibility of deriving cryptographic keys from MEMS sensors
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00208-4
On the verification of system-level information flow properties for virtualized execution platforms
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00216-4
Physical model of sensitive data leakage from PC-based cryptographic systems
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00215-5
Same value analysis on Edwards curves
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00206-6
An automated framework for exploitable fault identification in block ciphers
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00203-9
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00219-1
Efficient and secure software implementations of Fantomas
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00218-2
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00217-3
Improving side-channel attacks against pairing-based cryptography
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-018-00201-3