Journal of Cryptographic Engineering

Journal of Cryptographic Engineering

J CRYPTOGR ENG
影响因子:1.4
是否综述期刊:
是否预警:不在预警名单内
是否OA:
出版国家/地区:GERMANY
出版社:SPRINGER HEIDELBERG
发刊时间:0
发刊频率:4 issues per year
收录数据库:SCIE/Scopus收录
ISSN:2190-8508

期刊介绍

The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools, implementations and applications in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, side-channel attacks and countermeasures, and embedded security. JCEN serves the academic and corporate R&D community interested in cryptographic hardware and embedded security.JCEN publishes essential research on broad and varied topics including:Public-key cryptography, secret-key cryptography and post-quantum cryptographyCryptographic implementations include cryptographic processors, physical unclonable functions, true and deterministic random number generators, efficient software and hardware architecturesAttacks on implementations and their countermeasures, such as side-channel attacks, fault attacks, hardware tampering and reverse engineering techniquesSecurity evaluation of real-world cryptographic systems, formal methods and verification tools for secure embedded design that offer provable security, and metrics for measuring securityApplications of state-of-the-art cryptography, such as IoTs, RFIDs, IP protection, cyber-physical systems composed of analog and digital components, automotive security and trusted computing
《密码工程杂志》(JCEN)介绍了密码工程中有关架构、算法、技术、工具、实现和应用的高质量科学研究,包括密码硬件、密码嵌入式系统、旁道攻击和对策以及嵌入式安全。JCEN服务于对加密硬件和嵌入式安全感兴趣的学术和企业研发社区。JCEN发表了广泛而多样的主题的基础研究,包括:公钥加密、私钥加密和后量子加密加密实现包括加密处理器、物理不可克隆函数、真实和确定性随机数生成器、高效的软件和硬件架构对实现的攻击及其对策,如侧通道攻击、故障攻击、硬件篡改和逆向工程技术现实世界加密系统的安全评估、提供可证明安全性的安全嵌入式设计的形式化方法和验证工具,以及测量安全性的度量标准最先进加密技术的应用,如物联网、RFID、IP保护、由模拟和数字组件组成的网络物理系统、汽车安全和可信计算
年发文量 20
国人发稿量 0.59
国人发文占比 0.03%
自引率 -
平均录取率-
平均审稿周期 -
版面费 US$2780
偏重研究方向 COMPUTER SCIENCE, THEORY & METHODS-
期刊官网 https://www.springer.com/13389
投稿链接 https://www.editorialmanager.com/jcen/

期刊高被引文献

How to reveal the secrets of an obscure white-box implementation
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00207-5
Applications of machine learning techniques in side-channel attacks: a survey
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00212-8
Deep learning for side-channel analysis and introduction to ASCAD database
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00220-8
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00209-3
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00204-8
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-018-00202-2
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00211-9
Polynomial multiplication over binary finite fields: new upper bounds
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00210-w
Side-channel robustness analysis of masked assembly codes using a symbolic approach
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00205-7
Faster modular arithmetic for isogeny-based crypto on embedded devices
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00214-6
Uniform Montgomery multiplier
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00213-7
On the feasibility of deriving cryptographic keys from MEMS sensors
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00208-4
On the verification of system-level information flow properties for virtualized execution platforms
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00216-4
Physical model of sensitive data leakage from PC-based cryptographic systems
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00215-5
Same value analysis on Edwards curves
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00206-6
An automated framework for exploitable fault identification in block ciphers
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00203-9
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00219-1
Efficient and secure software implementations of Fantomas
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00218-2
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-019-00217-3
Improving side-channel attacks against pairing-based cryptography
来源期刊:Journal of Cryptographic EngineeringDOI:10.1007/s13389-018-00201-3

质量指标占比

研究类文章占比 OA被引用占比 撤稿占比 出版后修正文章占比
100.00%28.05%--

相关指数

影响因子
影响因子
年发文量
自引率
Cite Score

预警情况

查看说明
时间 预警情况
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
*来源:中科院《 国际期刊预警名单》

JCR分区

WOS分区等级:Q3区
版本 按学科 分区
WOS期刊SCI分区
WOS期刊SCI分区
WOS期刊SCI分区是指SCI官方(Web of Science)为每个学科内的期刊按照IF数值排 序,将期刊按照四等分的方法划分的Q1-Q4等级,Q1代表质量最高,即常说的1区期刊。
(2024-2025年最新版)
COMPUTER SCIENCE, THEORY & METHODS
Q3

中科院分区

查看说明
版本 大类学科 小类学科 Top期刊 综述期刊
2025年3月最新升级版
计算机科学4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
3区
2023年12月升级版
计算机科学4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区
2022年12月旧的升级版
计算机科学4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
3区