Key Metrics
CiteScore 

1
SJR 

Q4Applied Mathematics

SNIP 

0.68
Recommended pre-submission checks
Powered by 

Topics Covered on Journal of Mathematical Cryptology
Journal of Mathematical Cryptology Journal Specifications
| Overview | |
| Publisher | DE GRUYTER POLAND SP Z O O |
| Language | English |
| Frequency | Continuous publication |
| Article Processing Charges | EUR 1000 |
| Publication Time | 100 |
| Editorial Review Process | Anonymous peer review |
| General Details | |
| Language | English |
| Frequency | Continuous publication |
| Publication Start Year | 2007 |
| Publisher URL | Visit website |
| Website URL | Visit website |
| Publication Details | |
| Publication Time | 100 |
| Waiver Policy | Visit website |
| Editorial Review Detail | |
| Information for authors | |
| Author instructions | Visit website |
| Copyright Details | Visit website |
| Deposit Policy | Sherpa/Romeo |
| License type | CC BY, CC BY-NC-ND |
| OA statement | Visit website |
View less
Planning to publish in Journal of Mathematical Cryptology ?
Upload your Manuscript to get
- Degree of match
- Common matching concepts
- Additional journal recommendations

Recently Published Papers in Journal of Mathematical Cryptology
Leveled homomorphic encryption schemes for homomorphic encryption standard
- 6 Oct 2025
- Journal of Mathematical Cryptology
Sherlock Holmes zero-knowledge protocols secure against active attackers
- 17 Sep 2025
- Journal of Mathematical Cryptology
On the independence heuristic in the dual attack
- 3 Jul 2025
- Journal of Mathematical Cryptology
Security analysis of ZKPoK based on MQ problem in the multi-instance setting
- 15 Apr 2025
- Journal of Mathematical Cryptology
BTLE: Atomic swaps with time-lock puzzles
- 15 Apr 2025
- Journal of Mathematical Cryptology
Smaller public keys for MinRank-based schemes
- 14 Apr 2025
- Journal of Mathematical Cryptology
Leveled homomorphic encryption schemes for homomorphic encryption standard
- 6 Oct 2025
- Journal of Mathematical Cryptology
Sherlock Holmes zero-knowledge protocols secure against active attackers
- 17 Sep 2025
- Journal of Mathematical Cryptology
On the independence heuristic in the dual attack
- 3 Jul 2025
- Journal of Mathematical Cryptology
Security analysis of ZKPoK based on MQ problem in the multi-instance setting
- 15 Apr 2025
- Journal of Mathematical Cryptology
BTLE: Atomic swaps with time-lock puzzles
- 15 Apr 2025
- Journal of Mathematical Cryptology
Smaller public keys for MinRank-based schemes
- 14 Apr 2025
- Journal of Mathematical Cryptology