Journal Information
Journal of Cryptographic Engineering
http://www.springer.com/computer/security+and+cryptology/journal/13389
Publisher:
Springer
ISSN:
2190-8508
Viewed:
4573
Tracked:
0

Advertisment
Call For Papers
The Journal of Cryptographic Engineering is an archival journal publishing high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals.

The Journal of Cryptographic Engineering will cover the research areas summarized below.

Cryptographic Hardware:

Hardware architectures for public-key cryptography and secret-key cryptography; special-purpose hardware for cryptanalysis; cryptographic processors and co-processors; hardware accelerators for security protocols (security processors, network processors, etc.); true and pseudorandom number generators; Physically Unclonable Functions (PUFs).

Cryptographic Software for Embedded Systems:

Efficient software implementations of cryptography for embedded processors; efficient and secure implementations of cryptography using multiprocessor cores; cryptographic libraries; cryptographic algorithms targeting embedded devices.

Attacks Against Implementations and Countermeasures Against These Attacks:

Side channel attacks and countermeasures; faults and fault models for cryptographic devices; fault attacks and countermeasures; hardware tamper resistance; Trojan hardware.

Tools and Methodologies:

Computer aided cryptographic engineering; methodologies and environments for fair comparison of hardware and software efficiency of cryptographic algorithms, architectures, and implementations; partial and run-time reconfiguration of cryptographic systems; reliability and fault tolerance in cryptography and cryptanalysis; architectures for trusted computing.

Applications and Implementation Environments:

Cryptography in wireless applications (mobile phone, WLANs, etc.); cryptography for pervasive computing (RFID, sensor networks, etc.); FPGA design security; hardware IP protection and anti-counterfeiting techniques; reconfigurable hardware for cryptography; smart card processors, systems, and applications; security in commercial consumer applications (pay-TV, automotive, etc.); secure storage devices (memories, disks, etc.); technologies and hardware for content protection; security for embedded software and systems.
Last updated by Dou Sun in 2013-11-23
Related Journals
CCFFull NameImpact FactorPublisherISSN
Digital Communications and NetworksElsevier2352-8648
Microelectronics Journal1.322ELSEVIER0026-2692
Journal of Construction EngineeringHindawi2356-7295
Journal of Computer Networks and CommunicationsHindawi2090-7141
Journal of Computational Science1.925ELSEVIER1877-7503
Computers & Electrical Engineering1.747ELSEVIER0045-7906
bInteracting with Computers0.809Oxford University Press0953-5438
Journal of Electrical and Computer EngineeringHindawi2090-0147
cExpert Systems0.947John Wiley & Sons1468-0394
cJournal of Electronic Testing: Theory and Applications0.554Springer0923-8174
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
aa*a1ICDEInternational Conference on Data Engineering2019-10-082019-12-142020-04-20
ETFAIEEE International Conference on Emerging Technologies And Factory Automation2017-04-092017-05-152017-09-12
cb2ISCISInternational Symposium on Computer and Information Sciences2015-03-302015-05-212015-09-21
ICCAIInternational Conference on Computing and Applied Informatics2019-11-082019-11-152019-11-26
CISIMInternational Conference on Computer Information Systems and Industrial Management Applications2016-04-282016-06-142016-09-14
ISRLInternational Symposium on Reinforcement Learning2019-10-012019-10-152019-12-10
ANTSInternational Conference on Advanced Networks and Telecommunication Systems2019-08-152019-09-152019-12-16
EOOPSInternational Workshop on Engineering Object Oriented Parallel Software 2012-11-252013-03-25
aAMCISAmericas Conference on Information Systems2018-02-282018-04-172018-08-16
Recommendation