posted by organizer: monika1193 || 984 views || tracked by 1 users: [display]

JMC 2024 : JOURNAL OF MATHEMATICAL CRYPTOLOGY 2024

FacebookTwitterLinkedInGoogle

Link: https://www.degruyter.com/journal/key/jmc/html#overview
 
When N/A
Where N/A
Submission Deadline Dec 31, 2024
Categories    mathematics   cryptology   cryptography
 

Call For Papers

𝗝𝗒𝗨π—₯π—‘π—”π—Ÿ 𝗒𝗙 π— π—”π—§π—›π—˜π— π—”π—§π—œπ—–π—”π—Ÿ 𝗖π—₯π—¬π—£π—§π—’π—Ÿπ—’π—šπ—¬ (IF 2022: 1.2) is a forum for original research articles in the area of mathematical cryptology. JMC is a fully peer-reviewed, open-access, electronic-only journal publishing works of wide significance, originality, and relevance. Works in the theory of cryptology and articles linking mathematics with cryptology (including quantum cryptology) are welcome. Submissions from all areas of mathematics significant for cryptology are invited, including but not limited to, algebra, algebraic geometry, coding theory, combinatorics, number theory, probability, and stochastic processes

The scope includes mathematical results of algorithmic or computational nature that are of interest to cryptology. While JMC does not cover information security as a whole, the submission of manuscripts on information security with a strong mathematical emphasis is explicitly encouraged.

============
π—§π—’π—£π—œπ—–π—¦

Boolean functions
Elliptic curve cryptography
Mathematical cryptology
Information security
Quantum cryptology
Algebra
Algebraic geometry
Coding theory
Combinatorics and graph theory
Number theory
Probability and stochastic processes
Work linking math to cryptology
Work in the mathematical foundations of crypto
Theoretical aspects of cryptology
Mathematical foundations of cryptology

============
π—˜π——π—œπ—§π—’π—₯π—œπ—”π—Ÿ 𝗖𝗒𝗑𝗧𝗔𝗖𝗧
journal.editor@degruyter.com
===========
π—ͺπ—˜π—•π—¦π—œπ—§π—˜
https://www.degruyter.com/journal/key/jmc/html#overview
============
π—¦π—¨π—•π— π—œπ—¦π—¦π—œπ—’π—‘ π—¦π—¬π—¦π—§π—˜π— 
https://mc.manuscriptcentral.com/jmc#
============
π—˜π——π—œπ—§π—’π—₯-π—œπ—‘-π—–π—›π—œπ—˜π—™
Massimiliano Sala, Department of Mathematics, University of Trento, Italy

π—˜π——π—œπ—§π—’π—₯π—œπ—”π—Ÿ 𝗕𝗒𝗔π—₯𝗗
Boolean functions, symmetric cryptography and combinatorics
Robert Coulter, University of Delaware, USA
Daniel Panario, Carleton University, Canada
Cloud encryption
Ilaria Chillotti, Zama, France
Miran Kim, Hanyang University, South Korea
Romain Gay, IBM Research, Switzerland
Cryptographic protocols
Paolo D'Arco, University of Salerno, Italy
Pascal Lafourcade, University of Clermont Auvergne, France
Barbara Masucci, University of Salerno, Italy
Khoa Nguyen, University of Wollongong, Australia
Number theory and cryptography
Andrej Dujella, University of Zagreb, Croatia
Federico Pintore, University of Bari, Italy
Post-quantum cryptography
Delaram Kahrobaei, City University of New York, USA
Dmytro Savchuk, University of South Florida, USA
Vladimir Shpilrain, University of New York, USA
Quantum cryptography
Aysajan Abidin, KU Leuven, Belgium,
Other cryptographic functions and primitives
Wai Ho Mow, Hong Kong University of Science and Technology, Hong Kong
David Naccache, Γ‰cole Normale SupΓ©rieure, France
Jacques Patarin, University of Versailles, France
Jean-Jacques Quisquater, UniversitΓ© Catholique de Louvain (UCL), Belgium
Tamir Tassa, The Open University of Israel, Israel
Huaxiong Wang, Nanyang Technological University, Singapore
============

𝗔π—₯π—§π—œπ—–π—Ÿπ—˜ 𝗣π—₯π—’π—–π—˜π—¦π—¦π—œπ—‘π—š 𝗖𝗛𝗔π—₯π—šπ—˜π—¦

Articles accepted for publication in the Journal of Mathematical Cryptology are subject to Article Processing Charges (APCs). The publication fee amounts to 1000 EUR. Authors who have no funding for the submitted research can request a waiver or a discount during the submission process. For more details please check the Article Processing Charges file available in Supplementary Materials on our website.
https://www.degruyter.com/journal/key/jmc/html#overview

π—ͺπ—”π—œπ—©π—˜π—₯ π—£π—’π—Ÿπ—œπ—–π—œπ—˜π—¦

If the submitting author is affiliated with an organization that has an open access agreement with De Gruyter, the article processing charges (APCs) may be covered or discounted. Moreover, all authors can apply for a discount or a waiver during the submission process. Authors are asked to contact the journal's Editorial Office (jmc_editorial@degruyter.com) before, or straight after submitting their article.


Related Resources

ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
ICISC 2024   The 27th Annual International Conference on Information Security and Cryptology
SEAS 2025   14th International Conference on Software Engineering and Applications
DLGM 2024   Call For Book Chapters 2024: Deep Learning in Genome Mapping, CRC Press (Taylor & Francis Group)
SECRYPT 2025   22nd International Conference on Security and Cryptography
MCO 2025   Modelling, Computation and Optimization in Information Systems and Management Sciences 2025
SOEA 2025   9th International Conference on Software Engineering and Applications
CSIT 2024   IEEE 19th International Conference on Computer Science and Information Technologies
CICS 2025   13thInternational Conference on Instrumentation and Control Systems
ADEIJ 2024   Advances in Engineering: an International Journal