Journal Information
Journal of Cryptographic Engineering
http://www.springer.com/computer/security+and+cryptology/journal/13389
Publisher:
Springer
ISSN:
2190-8508
Viewed:
11040
Tracked:
1
Call For Papers
The Journal of Cryptographic Engineering is an archival journal publishing high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals.

The Journal of Cryptographic Engineering will cover the research areas summarized below.

Cryptographic Hardware:

Hardware architectures for public-key cryptography and secret-key cryptography; special-purpose hardware for cryptanalysis; cryptographic processors and co-processors; hardware accelerators for security protocols (security processors, network processors, etc.); true and pseudorandom number generators; Physically Unclonable Functions (PUFs).

Cryptographic Software for Embedded Systems:

Efficient software implementations of cryptography for embedded processors; efficient and secure implementations of cryptography using multiprocessor cores; cryptographic libraries; cryptographic algorithms targeting embedded devices.

Attacks Against Implementations and Countermeasures Against These Attacks:

Side channel attacks and countermeasures; faults and fault models for cryptographic devices; fault attacks and countermeasures; hardware tamper resistance; Trojan hardware.

Tools and Methodologies:

Computer aided cryptographic engineering; methodologies and environments for fair comparison of hardware and software efficiency of cryptographic algorithms, architectures, and implementations; partial and run-time reconfiguration of cryptographic systems; reliability and fault tolerance in cryptography and cryptanalysis; architectures for trusted computing.

Applications and Implementation Environments:

Cryptography in wireless applications (mobile phone, WLANs, etc.); cryptography for pervasive computing (RFID, sensor networks, etc.); FPGA design security; hardware IP protection and anti-counterfeiting techniques; reconfigurable hardware for cryptography; smart card processors, systems, and applications; security in commercial consumer applications (pay-TV, automotive, etc.); secure storage devices (memories, disks, etc.); technologies and hardware for content protection; security for embedded software and systems.
Last updated by Dou Sun in 2013-11-23
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
EWCNInternational Conference on Emerging Wireless Communications and Networking2014-12-152015-02-152015-04-06
aa*a1ICDEInternational Conference on Data Engineering2023-11-242023-12-222024-04-16
ICETACInternational Conference on Electrical Technology and Automatic Control2021-10-082021-10-102021-10-23
MDEEInternational Conference on Mechanical Design and Electronic Engineering2017-08-092017-08-152017-08-18
DOORInternational Conference on Discrete Optimization and Operations Research2016-05-032016-06-012016-09-19
Deep-BDBInternational Conference on Deep Learning, Big Data and Blockchain2022-03-102022-05-202022-08-22
ICECCS'International Conference on Eco-friendly Computing and Communication Systems2013-04-252013-06-302013-10-17
CoEEEInternational Joint Conference on Energy and Environmental Engineering2024-04-222024-05-242024-05-22
iAIMInternational Conference on Antenna Innovations and Modern Technologies2017-07-312017-09-302017-11-24
Recommendation