Test Cover Image of:  Journal of Mathematical Cryptology

Journal of Mathematical Cryptology

Editor In Chief: Timothy J. Hodges

Since 1st January 2020, Journal of Mathematical Cryptology changes the publication model to Open Access.
Submission and publication in 2020 are free of charge.

Your benefits

  • Original research articles
  • International editorial board
  • Mathematical Citation Quotient
  • Wide implications to information security practices
  • Open access publication

Objective
The Journal of Mathematical Cryptology (JMC) is a forum for original research articles in the area of mathematical cryptology. JMC is a fully peer-reviewed, open access, electronic-only journal publishing works of wide significance, originality and relevance. Works in the theory of cryptology and articles linking mathematics with cryptology (including quantum cryptology) are welcome. Submissions from all areas of mathematics significant for cryptology are invited, including but not limited to, algebra, algebraic geometry, coding theory, combinatorics, number theory, probability and stochastic processes

The scope includes mathematical results of algorithmic or computational nature that are of interest to cryptology. While JMC does not cover information security as a whole, the submission of manuscripts on information security with a strong mathematical emphasis is explicitly encouraged. Survey articles with the potential to stimulate follow-up research in the area of mathematical cryptology are welcome.

Topics
  • Mathematical cryptology
  • Information security
  • Theory of cryptology
  • Quantum cryptology
  • Algebra
  • Algebraic geometry
  • Coding theory
  • Combinatorics and Graph Theory
  • Number theory
  • Probability and stochastic processes

Article formats
Original research articles

Information on Submission Process

Journal Metrics

Cite Score
1.1
Mathematical Citation Quotient
0.75
SCImago Journal Rank
0.321
Source Normalized Impact per Paper
0.855

Abstracting & Indexing

Journal of Mathematical Cryptology is covered by the following services:

  • Baidu Scholar
  • Cabell's Whitelist
  • Chronos Hub
  • CNKI Scholar (China National Knowledge Infrastructure)
  • CNPIEC - cnpLINKer
  • DBLP Computer Science Bibliography
  • Dimensions
  • EBSCO (relevant databases)
  • EBSCO Discovery Service
  • Engineering Village
  • Gale/Cengage
  • Genamics JournalSeek
  • Google Scholar
  • Inspec
  • Japan Science and Technology Agency (JST)
  • J-Gate
  • JournalGuide
  • JournalTOCs
  • KESLI-NDSL (Korean National Discovery for Science Leaders)
  • Mathematical Reviews (MathSciNet)
  • Microsoft Academic
  • MyScienceWork
  • Naver Academic
  • Naviga (Softweco)
  • Norwegian Register for Scientific Journals, Series and Publishers
  • Primo Central (ExLibris)
  • ProQuest (relevant databases)
  • Publons
  • QOAM (Quality Open Access Market)
  • ReadCube
  • Reaxys
  • SCImago (SJR)
  • SCOPUS
  • Semantic Scholar
  • Sherpa/RoMEO
  • Summon (ProQuest)
  • TDNet
  • Ulrich's Periodicals Directory/ulrichsweb
  • WanFang Data
  • Web of Science - Emerging Sources Citation Index
  • WorldCat (OCLC)
  • Yewno
  • Zentralblatt Math (zbMATH)

Submission
Please submit to JMC via ScholarOne Manuscripts 

Your benefits of publishing with us

Submission process
  • Before submitting an article, please adhere to the Instructions for Authors (Supplementary Information)
  • Submission of your paper via ScholarOne Manuscripts
  • Peer review procedure
  • Decision on your paper
  • Publishing
  • You will be guided through the whole process of submission
  • In case of any problems editorial assistance will be provided

Please note
  • Before submitting your manuscript, please get familiar with Publication ethics and malpractice statement
  • Beginning from January 2020, JMC is publishing in the Open Access model
  • Online publication for all papers accepted after peer review
  • If you have any general questions please visit our FAQ page for authors

We look forward to receiving your manuscript!

Editor-in-Chief
Timothy J. Hodges, University of Cincinnati, USA

Editorial Advisory Board
Wasim Alhamdani, School of Computer and Information Sciences, University of the Cumberlands, KY, USA
Lejla Batina, Institute for Computing and Information Sciences, Radboud University, The Netherlands
Joseph J. Boutros, Texas A&M University at Qatar, Doha, Qatar
Liqun Chen, Department of Computer Science, University of Surrey, UK
Ray CC Cheung, City University of Hong Kong, Hong Kong
Paolo D'Arco, Università di Salerno, Salerno, Italy
Bernardo David, IT-Universitetet i København, Copenhagen, Denmark
Roberto De Prisco, Università di Salerno, Salerno, Italy
Vipul Goyal, Carnegie Mellon University, Pittsburgh, USA
Shay Gueron, University of Haifa and Intel Corporation, Israel
Chunlei Li, Department of Informatics, University of Bergen, Norway
Carlos Aguilar Melchor, ISAE-SUPAERO, Toulouse University, France
Chris Mitchell, Royal Holloway University of London, Egham, United Kingdom
Wai Ho Mow, Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong
Jean-Jacques Quisquater, Université Catholique de Louvain (UCL), Belgium
Dmytro Savchuk, Department of Mathematics and Statistics, University of South Florida, USA
Dominique Schröder, Department of Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
Peter Schwabe, Digital Security Group, Radboud University, The Netherlands
Gil Segev, School of Computer Science and Engineering, Hebrew University of Jerusalem
Arkadii Slinko, Department of Mathematics, The University of Auckland, New Zealand
Tamir Tassa, The Open University of Israel, Ra'anana, Israel
Huaxiong Wang, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
Susanne Wetzel, Stevens Institute of Technology, Department of Computer Science, Castle Point on Hudson, USA
Øyvind Ytrehus, Simula UiB AS, Norway
Chao Zhang, School of Mathematics, Harbin Institute of Technology, China

Editorial Contact
Ewa Piechota
ewa.piechota@degruyter.com

OPEN ACCESS

Search

Audience:

All those interested in mathematical cryptology, especially mathematicians