Journal of Mathematical Cryptology
ISSN:1862-2976

Journal of Mathematical Cryptology

J MATH CRYPTOL
学科领域:计算机科学
是否预警:不在预警名单内
是否OA:
录用周期:100 Weeks
新锐分区:计算机科学3区
年发文量:18
影响因子:0.8
JCR分区:Q3

基本信息

-
1862-2976ESCI/Scopus收录/DOAJ开放期刊
0.8
0
2026年3月发布
点击查看历史分区趋势    >
大类学科小类学科Top期刊综述期刊
计算机科学3区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
3区
MATHEMATICS, APPLIED 应用数学
3区
N/A
WOS期刊SCI分区  2024-2025最新升级版
按JIF指标学科分区收集子录JIF分区JIF排名百分位
学科:COMPUTER SCIENCE, THEORY & METHODS
ESCI
Q4
111/147
学科:MATHEMATICS, APPLIED
ESCI
Q3
235/344
按JCR指标学科分区收集子录JCR分区JCR排名百分位
学科:COMPUTER SCIENCE, THEORY & METHODS
ESCI
Q3
95/147
学科:MATHEMATICS, APPLIED
ESCI
Q4
279/344
暂无h-index数据
18
2%-100 WeeksEUR1000COMPUTER SCIENCE, THEORY & METHODS-
0%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
100.00%100%-
CiteScore:2.30
SJR:0.338
SNIP:1.145
学科类别分区排名百分位
大类:Mathematics
小类:Applied Mathematics
Q2
311 / 665
大类:Mathematics
小类:Computational Mathematics
Q2
99 / 201
大类:Mathematics
小类:Computer Science Applications
Q3
586 / 947

期刊高被引文献

Hash functions from superspecial genus-2 curves using Richelot isogenies
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/JMC-2019-0021
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2020-0079
New number-theoretic cryptographic primitives
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0035
Secret sharing and duality
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0045
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠 )
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2015-0046
The Eleventh Power Residue Symbol
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2020-0077
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2016-0044
Discretisation and Product Distributions in Ring-LWE
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2020-0073
Exact information ratios for secret sharing on small graphs with girth at least 5
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0024
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0030
A framework for cryptographic problems from linear algebra
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0032
Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0031
Improved cryptanalysis of the AJPS Mersenne based cryptosystem
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0027
Polynomial expressions of p-ary auction functions
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0016
On the equivalence of authentication codes and robust (2, 2)-threshold schemes
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0048
Capitulation of the 2-ideal classes of type (2,\u202f2,\u202f2) of some quartic cyclic number fields
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2017-0037
Can we Beat the Square Root Bound for ECDLP over 𝔽p2 via Representation?
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2019-0025
Predicate signatures from pair encodings via dual system proof technique
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2017-0007
Enhancing Goldreich, Goldwasser and Halevi’s scheme with intersecting lattices
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2016-0066
Generic constructions of PoRs from codes and instantiations
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0018
Signcryption schemes with insider security in an ideal permutation model
来源期刊:Journal of Mathematical CryptologyDOI:10.1515/jmc-2018-0006

相关文章

2026年3月发布(新锐分区)
大类学科小类学科Top期刊综述期刊
计算机科学3区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
3区
MATHEMATICS, APPLIED 应用数学
3区
N/A
2025年3月升级版
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区