Journal Information
Journal of Cryptographic Engineering
http://www.springer.com/computer/security+and+cryptology/journal/13389
Publisher:
Springer
ISSN:
2190-8508
Viewed:
5260
Tracked:
0

Call For Papers
The Journal of Cryptographic Engineering is an archival journal publishing high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals.

The Journal of Cryptographic Engineering will cover the research areas summarized below.

Cryptographic Hardware:

Hardware architectures for public-key cryptography and secret-key cryptography; special-purpose hardware for cryptanalysis; cryptographic processors and co-processors; hardware accelerators for security protocols (security processors, network processors, etc.); true and pseudorandom number generators; Physically Unclonable Functions (PUFs).

Cryptographic Software for Embedded Systems:

Efficient software implementations of cryptography for embedded processors; efficient and secure implementations of cryptography using multiprocessor cores; cryptographic libraries; cryptographic algorithms targeting embedded devices.

Attacks Against Implementations and Countermeasures Against These Attacks:

Side channel attacks and countermeasures; faults and fault models for cryptographic devices; fault attacks and countermeasures; hardware tamper resistance; Trojan hardware.

Tools and Methodologies:

Computer aided cryptographic engineering; methodologies and environments for fair comparison of hardware and software efficiency of cryptographic algorithms, architectures, and implementations; partial and run-time reconfiguration of cryptographic systems; reliability and fault tolerance in cryptography and cryptanalysis; architectures for trusted computing.

Applications and Implementation Environments:

Cryptography in wireless applications (mobile phone, WLANs, etc.); cryptography for pervasive computing (RFID, sensor networks, etc.); FPGA design security; hardware IP protection and anti-counterfeiting techniques; reconfigurable hardware for cryptography; smart card processors, systems, and applications; security in commercial consumer applications (pay-TV, automotive, etc.); secure storage devices (memories, disks, etc.); technologies and hardware for content protection; security for embedded software and systems.
Last updated by Dou Sun in 2013-11-23
Related Journals
CCFFull NameImpact FactorPublisherISSN
International Journal of Embedded and Real-Time Communication SystemsIGI Global Publishing1947-3176
Journal of Medical Signals and SensorsWolters Kluwer Health2228-7477
Computing in Science & Engineering2.074IEEE1521-9615
ETRI Journal0.861Wiley-Blackwell1225-6463
Microelectronics Journal1.284Elsevier0026-2692
Journal of Control Science and EngineeringHindawi1687-5249
Journal of Intelligent Transportation Systems2.568Taylor & Francis1547-2450
Journal of Construction EngineeringHindawi2356-7295
Journal of Computational Science2.502Elsevier1877-7503
International Journal of Systems Science: Operations & LogisticsTaylor & Francis2330-2674
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
cPSDPrivacy in Statistical Databases2020-05-242020-06-262020-09-23
aa*a1ICDEInternational Conference on Data Engineering2019-10-082019-12-142020-04-20
ETFAIEEE International Conference on Emerging Technologies And Factory Automation2017-04-092017-05-152017-09-12
cb2ISCISInternational Symposium on Computer and Information Sciences2015-03-302015-05-212015-09-21
ICCAIInternational Conference on Computing and Applied Informatics2019-11-082019-11-152019-11-26
CISIMInternational Conference on Computer Information Systems and Industrial Management Applications2016-04-282016-06-142016-09-14
MLHMIInternational Conference on Machine Learning and Human-Computer Interaction2020-11-052020-11-302021-03-19
ISRLInternational Symposium on Reinforcement Learning2020-02-152020-04-152020-06-26
ANTSInternational Conference on Advanced Networks and Telecommunication Systems2019-08-152019-09-152019-12-16
Recommendation