615:
265:
557:
25:
610:
508:
501:
235:
494:
639:
669:
517:
442:
362:
337:
662:
35:
333:
708:
655:
594:
313:
465:
693:
260:
93:
65:
305:
301:
127:
688:
72:
50:
79:
703:
698:
643:
354:
248:
61:
587:
536:
405:
223:
239:
580:
486:
350:
244:
227:
173:
86:
430:
426:
384:
378:
422:
371:
629:
564:
325:
625:
622:
179:
147:
446:
153:
682:
208:
42:
614:
438:
132:
256:
194:
24:
434:
286:
556:
321:
609:
183:
481:
400:
342:
274:
490:
18:
633:
568:
46:
642:. Further suggestions might be found on the article's
640:
See tips for writing articles about academic journals
524:
392:
369:
297:
285:
273:
219:
205:
191:
172:
164:
159:
146:
138:
126:
518:International Association for Cryptologic Research
443:International Association for Cryptologic Research
264:
663:
588:
502:
8:
441:. The journal is published quarterly by the
117:
51:introducing citations to additional sources
670:
656:
595:
581:
509:
495:
487:
116:
41:Relevant discussion may be found on the
563:This cryptography-related article is a
458:
466:Journal of Cryptology Editorial Board
7:
606:
604:
553:
551:
632:. You can help Knowledge (XXG) by
567:. You can help Knowledge (XXG) by
14:
468:, Springer, retrieved 2022-05-09.
613:
608:
555:
263:
34:relies largely or entirely on a
23:
709:Computer science journal stubs
1:
725:
603:
550:
694:Computer science journals
537:Cryptology ePrint Archive
445:. Its editor-in-chief is
397:
62:"Journal of Cryptology"
220:Standard abbreviations
689:Cryptography journals
621:This article about a
532:Journal of Cryptology
482:Journal of Cryptology
418:Journal of Cryptology
120:Journal of Cryptology
47:improve this article
160:Publication details
123:
704:Cryptography stubs
699:Quarterly journals
431:scientific journal
651:
650:
576:
575:
545:
544:
413:
412:
112:
111:
97:
716:
672:
665:
658:
623:computer science
617:
612:
605:
597:
590:
583:
559:
552:
511:
504:
497:
488:
469:
463:
433:in the field of
401:Journal homepage
381:
374:
365:
269:
267:
266:
211:
197:
124:
121:
114:Academic journal
107:
104:
98:
96:
55:
27:
19:
16:Academic journal
724:
723:
719:
718:
717:
715:
714:
713:
679:
678:
677:
676:
602:
601:
548:
546:
541:
520:
515:
478:
473:
472:
464:
460:
455:
388:
383:
377:
370:
341:
300:
299:
243:
222:
221:
212:
207:
198:
193:
187:
180:Springer Nature
119:
115:
108:
102:
99:
56:
54:
40:
28:
17:
12:
11:
5:
722:
720:
712:
711:
706:
701:
696:
691:
681:
680:
675:
674:
667:
660:
652:
649:
648:
618:
600:
599:
592:
585:
577:
574:
573:
560:
543:
542:
540:
539:
534:
528:
526:
522:
521:
516:
514:
513:
506:
499:
491:
485:
484:
477:
476:External links
474:
471:
470:
457:
456:
454:
451:
447:Vincent Rijmen
411:
410:
409:
408:
403:
395:
394:
390:
389:
375:
367:
366:
295:
294:
289:
283:
282:
277:
271:
270:
217:
216:
213:
206:
203:
202:
199:
192:
189:
188:
178:
176:
170:
169:
166:
162:
161:
157:
156:
154:Vincent Rijmen
151:
144:
143:
140:
136:
135:
130:
113:
110:
109:
45:. Please help
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
721:
710:
707:
705:
702:
700:
697:
695:
692:
690:
687:
686:
684:
673:
668:
666:
661:
659:
654:
653:
647:
645:
641:
637:
635:
631:
627:
624:
619:
616:
611:
607:
598:
593:
591:
586:
584:
579:
578:
572:
570:
566:
561:
558:
554:
549:
538:
535:
533:
530:
529:
527:
523:
519:
512:
507:
505:
500:
498:
493:
492:
489:
483:
480:
479:
475:
467:
462:
459:
452:
450:
448:
444:
440:
436:
432:
428:
424:
420:
419:
407:
406:Online access
404:
402:
399:
398:
396:
391:
386:
382: (print)
380:
376:
373:
368:
364:
360:
356:
352:
348:
344:
339:
335:
331:
327:
323:
319:
315:
311:
307:
303:
296:
293:
292:J. Cryptology
290:
288:
284:
281:
278:
276:
272:
262:
258:
254:
250:
246:
241:
237:
233:
229:
225:
218:
214:
210:
209:Impact factor
204:
200:
196:
190:
185:
181:
177:
175:
171:
167:
163:
158:
155:
152:
149:
145:
141:
137:
134:
131:
129:
125:
122:
106:
95:
92:
88:
85:
81:
78:
74:
71:
67:
64: –
63:
59:
58:Find sources:
52:
48:
44:
38:
37:
36:single source
32:This article
30:
26:
21:
20:
638:
634:expanding it
620:
569:expanding it
562:
547:
531:
525:Publications
461:
439:cryptography
417:
416:
414:
358:
346:
329:
317:
309:
291:
279:
252:
231:
215:1.221 (2020)
168:1988–present
133:Cryptography
118:
100:
90:
83:
76:
69:
57:
33:
387: (web)
280:J. Cryptol.
195:Open access
683:Categories
453:References
435:cryptology
287:MathSciNet
257:MathSciNet
128:Discipline
103:April 2024
73:newspapers
644:talk page
427:0933-2790
385:1432-1378
379:0933-2790
174:Publisher
43:talk page
298:Indexing
236:Bluebook
150: by
139:Language
626:journal
429:) is a
357:)
328:)
316:)
251:)
230:)
184:Germany
182: (
165:History
142:English
87:scholar
425:
363:Scopus
359:·
347:·
345:
330:·
318:·
310:·
308:
253:·
232:·
201:Hybrid
148:Edited
89:
82:
75:
68:
60:
628:is a
393:Links
361:
349:
332:
322:JSTOR
320:
312:
302:CODEN
275:ISO 4
255:
234:
224:ISO 4
94:JSTOR
80:books
630:stub
565:stub
437:and
423:ISSN
415:The
372:ISSN
343:MIAR
334:LCCN
314:alt2
66:news
355:alt
351:NLM
338:alt
326:alt
306:alt
261:alt
249:alt
245:NLM
240:alt
228:alt
49:by
685::
449:.
671:e
664:t
657:v
646:.
636:.
596:e
589:t
582:v
571:.
510:e
503:t
496:v
421:(
353:(
340:)
336:(
324:(
304:(
268:)
259:(
247:(
242:)
238:(
226:(
186:)
105:)
101:(
91:·
84:·
77:·
70:·
53:.
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.