Example of International Journal of Applied Cryptography format
Recent searches

Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
Look Inside
Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format Example of International Journal of Applied Cryptography format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
open access Open Access

International Journal of Applied Cryptography — Template for authors

Categories Rank Trend in last 3 yrs
Applied Mathematics #264 of 548 down down by 152 ranks
Computational Mathematics #87 of 152 down down by 44 ranks
Computational Theory and Mathematics #77 of 133 down down by 39 ranks
Computer Networks and Communications #194 of 334 down down by 94 ranks
journal-quality-icon Journal quality:
Good
calendar-icon Last 4 years overview: 16 Published Papers | 31 Citations
indexed-in-icon Indexed in: Scopus
last-updated-icon Last updated: 09/06/2020
Related journals
Insights
General info
Top papers
Popular templates
Get started guide
Why choose from SciSpace
FAQ

Related Journals

open access Open Access

Springer

Quality:  
High
CiteRatio: 6.1
SJR: 1.461
SNIP: 1.491
open access Open Access

Elsevier

Quality:  
High
CiteRatio: 4.5
SJR: 0.573
SNIP: 1.276
open access Open Access

Inderscience Publishers

Quality:  
Good
CiteRatio: 1.9
SJR: 0.179
SNIP: 0.489
open access Open Access

Springer

Quality:  
Medium
CiteRatio: 1.5
SJR: 0.518
SNIP: 0.952

Journal Performance & Insights

CiteRatio

SCImago Journal Rank (SJR)

Source Normalized Impact per Paper (SNIP)

A measure of average citations received per peer-reviewed paper published in the journal.

Measures weighted citations received by the journal. Citation weighting depends on the categories and prestige of the citing journal.

Measures actual citations received relative to citations expected for the journal's category.

1.9

CiteRatio for International Journal of Applied Cryptography from 2016 - 2020
Year Value
2020 1.9
2018 0.3
2017 2.8
2016 1.9
graph view Graph view
table view Table view

0.246

102% from 2018

SJR for International Journal of Applied Cryptography from 2016 - 2020
Year Value
2020 0.246
2018 0.122
2017 0.455
2016 0.262
graph view Graph view
table view Table view

1.938

637% from 2018

SNIP for International Journal of Applied Cryptography from 2016 - 2020
Year Value
2020 1.938
2018 0.263
2017 2.654
2016 0.795
graph view Graph view
table view Table view

insights Insights

  • This journal’s CiteRatio is in the top 10 percentile category.

insights Insights

  • SJR of this journal has increased by 102% in last years.
  • This journal’s SJR is in the top 10 percentile category.

insights Insights

  • SNIP of this journal has increased by 637% in last years.
  • This journal’s SNIP is in the top 10 percentile category.

International Journal of Applied Cryptography

Guideline source: View

All company, product and service names used in this website are for identification purposes only. All product names, trademarks and registered trademarks are property of their respective owners.

Use of these names, trademarks and brands does not imply endorsement or affiliation. Disclaimer Notice

Inderscience Publishers

International Journal of Applied Cryptography

Approved by publishing and review experts on SciSpace, this template is built as per for International Journal of Applied Cryptography formatting guidelines as mentioned in Inderscience Publishers author instructions. The current version was created on 09 Jun 2020 and has been used by 522 authors to write and format their manuscripts to this journal.

i
Last updated on
09 Jun 2020
i
ISSN
1753-0563
i
Impact Factor
Medium - 0.735
i
Open Access
No
i
Sherpa RoMEO Archiving Policy
Yellow faq
i
Plagiarism Check
Available via Turnitin
i
Endnote Style
Download Available
i
Bibliography Name
plainnat
i
Citation Type
Author Year
(Blonder et al., 1982)
i
Bibliography Example
Beenakker, C. W. J. (2006). ‘Specular Andreev Reflection in Graphene’. Phys. Rev. Lett., Vol 97, No 6, pp. 067007.

Top papers written in this journal

Journal Article DOI: 10.1504/IJACT.2008.017048
Homomorphic encryption and secure comparison
Ivan Damgård1, Martin Geisler1, Mikkel Kroigard1

Abstract:

We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty Computation (MPC). We show how... We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty Computation (MPC). We show how our comparison protocol can be used to improve security of online auctions, and demonstrate that it is efficient enough to be used in practice. For comparison of 16 bits numbers with security based on 1024 bits RSA (executed by two parties), our implementation takes 0.28 sec including all computation and communication. Using precomputation, one can save a factor of roughly 10. read more read less

Topics:

Homomorphic secret sharing (63%)63% related to the paper, Probabilistic encryption (63%)63% related to the paper, 56-bit encryption (62%)62% related to the paper, Homomorphic encryption (58%)58% related to the paper, Secure two-party computation (57%)57% related to the paper
223 Citations
Journal Article DOI: 10.1504/IJACT.2014.062722
Power analysis attack: an approach based on machine learning
Liran Lerman1, Gianluca Bontempi1, Olivier Markowitch1

Abstract:

In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e., techniques able to extract information ... In cryptography, a side-channel attack is any attack based on the analysis of measurements related to the physical implementation of a cryptosystem. Nowadays, the possibility of collecting a large amount of observations paves the way to the adoption of machine learning techniques, i.e., techniques able to extract information and patterns from large datasets. The use of statistical techniques for side-channel attacks is not new. Techniques like the template attack have shown their effectiveness in recent years. However, these techniques rely on parametric assumptions and are often limited to small dimensionality settings, which limit their range of application. This paper explores the use of machine learning techniques to relax such assumptions and to deal with high dimensional feature vectors. read more read less

Topics:

Side channel attack (61%)61% related to the paper, Power analysis (61%)61% related to the paper, Timing attack (59%)59% related to the paper, Ciphertext-only attack (58%)58% related to the paper, Feature vector (54%)54% related to the paper
View PDF
117 Citations
Journal Article DOI: 10.1504/IJACT.2010.033798
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
Keita Emura1, Atsuko Miyaji1, Kazumasa Omote1, Akito Nomura2, Masakazu Soshi3

Abstract:

An Attribute-Based Encryption (ABE) is an encryption scheme where users with some attributes can decrypt ciphertexts associated with these attributes. The length of the ciphertext depends on the number of attributes in previous ABE schemes. In this paper, we propose a new Ciphertext-Policy Attribute-Based Encryption (CP-ABE) ... An Attribute-Based Encryption (ABE) is an encryption scheme where users with some attributes can decrypt ciphertexts associated with these attributes. The length of the ciphertext depends on the number of attributes in previous ABE schemes. In this paper, we propose a new Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with constant ciphertext length. In our scheme, the number of pairing computations is also constant. In addition, the number of additional bits required from chosen plaintext attack-secure CP-ABE to chosen ciphertext attack-secure CP-ABE is reduced by 90% with respect to that of the previous scheme. read more read less

Topics:

Attribute-based encryption (73%)73% related to the paper, Ciphertext (73%)73% related to the paper, Semantic security (72%)72% related to the paper, Ciphertext indistinguishability (71%)71% related to the paper, Plaintext-aware encryption (69%)69% related to the paper
115 Citations
Journal Article DOI: 10.1504/IJACT.2012.048079
Public key encryption schemes supporting equality test with authorisation of different granularity
Qiang Tang1

Abstract:

In this paper, we extend the work about public key encryption schemes supporting fine-grained authorisation (FG-PKEET), done by Tang (2011b). First of all, we correct some flaws in Tang (2011b) and discuss how to extend the proposed cryptosystem to support approximate equality test. Secondly, we present a comparison between F... In this paper, we extend the work about public key encryption schemes supporting fine-grained authorisation (FG-PKEET), done by Tang (2011b). First of all, we correct some flaws in Tang (2011b) and discuss how to extend the proposed cryptosystem to support approximate equality test. Secondly, we present a comparison between FG-PKEET and other similar primitives including AoN-PKEET by Tang (2011a) and PKEET by Yang et al. (2010), and demonstrate their differences in complexity and achieved security. Thirdly, to mitigate the inherent offline message recovery attacks, we extend FG-PKEET to a two-proxy setting, where two proxies need to collaborate in order to perform an equality test. Finally, we propose a cryptosystem and prove its security in the two-proxy setting. read more read less

Topics:

Cryptosystem (58%)58% related to the paper, Public-key cryptography (54%)54% related to the paper, Cryptography (53%)53% related to the paper
115 Citations
Journal Article DOI: 10.1504/IJACT.2009.028031
A correction to 'efficient and secure comparison for on-line auctions'
Ivan Damgård1, Martin Geisler1, Mikkel Kroigard1

Abstract:

In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure without it. In this paper, we describe a correction to the cryptosystem proposed in Damgard et al. from Int. J. Applied Cryptography, Vol. 1, No. 1. Although, the correction is small and does not affect the performance of the protocols from Damgard et al., it is necessary, as the cryptosystem is not secure without it. read more read less

Topics:

Cryptosystem (59%)59% related to the paper, Homomorphic encryption (51%)51% related to the paper, Cryptography (50%)50% related to the paper
107 Citations
Author Pic

SciSpace is a very innovative solution to the formatting problem and existing providers, such as Mendeley or Word did not really evolve in recent years.

- Andreas Frutiger, Researcher, ETH Zurich, Institute for Biomedical Engineering

Get MS-Word and LaTeX output to any Journal within seconds
1
Choose a template
Select a template from a library of 40,000+ templates
2
Import a MS-Word file or start fresh
It takes only few seconds to import
3
View and edit your final output
SciSpace will automatically format your output to meet journal guidelines
4
Submit directly or Download
Submit to journal directly or Download in PDF, MS Word or LaTeX

(Before submission check for plagiarism via Turnitin)

clock Less than 3 minutes

What to expect from SciSpace?

Speed and accuracy over MS Word

''

With SciSpace, you do not need a word template for International Journal of Applied Cryptography.

It automatically formats your research paper to Inderscience Publishers formatting guidelines and citation style.

You can download a submission ready research paper in pdf, LaTeX and docx formats.

Time comparison

Time taken to format a paper and Compliance with guidelines

Plagiarism Reports via Turnitin

SciSpace has partnered with Turnitin, the leading provider of Plagiarism Check software.

Using this service, researchers can compare submissions against more than 170 million scholarly articles, a database of 70+ billion current and archived web pages. How Turnitin Integration works?

Turnitin Stats
Publisher Logos

Freedom from formatting guidelines

One editor, 100K journal formats – world's largest collection of journal templates

With such a huge verified library, what you need is already there.

publisher-logos

Easy support from all your favorite tools

International Journal of Applied Cryptography format uses plainnat citation style.

Automatically format and order your citations and bibliography in a click.

SciSpace allows imports from all reference managers like Mendeley, Zotero, Endnote, Google Scholar etc.

Frequently asked questions

1. Can I write International Journal of Applied Cryptography in LaTeX?

Absolutely not! Our tool has been designed to help you focus on writing. You can write your entire paper as per the International Journal of Applied Cryptography guidelines and auto format it.

2. Do you follow the International Journal of Applied Cryptography guidelines?

Yes, the template is compliant with the International Journal of Applied Cryptography guidelines. Our experts at SciSpace ensure that. If there are any changes to the journal's guidelines, we'll change our algorithm accordingly.

3. Can I cite my article in multiple styles in International Journal of Applied Cryptography?

Of course! We support all the top citation styles, such as APA style, MLA style, Vancouver style, Harvard style, and Chicago style. For example, when you write your paper and hit autoformat, our system will automatically update your article as per the International Journal of Applied Cryptography citation style.

4. Can I use the International Journal of Applied Cryptography templates for free?

Sign up for our free trial, and you'll be able to use all our features for seven days. You'll see how helpful they are and how inexpensive they are compared to other options, Especially for International Journal of Applied Cryptography.

5. Can I use a manuscript in International Journal of Applied Cryptography that I have written in MS Word?

Yes. You can choose the right template, copy-paste the contents from the word document, and click on auto-format. Once you're done, you'll have a publish-ready paper International Journal of Applied Cryptography that you can download at the end.

6. How long does it usually take you to format my papers in International Journal of Applied Cryptography?

It only takes a matter of seconds to edit your manuscript. Besides that, our intuitive editor saves you from writing and formatting it in International Journal of Applied Cryptography.

7. Where can I find the template for the International Journal of Applied Cryptography?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Applied Cryptography's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

8. Can I reformat my paper to fit the International Journal of Applied Cryptography's guidelines?

Of course! You can do this using our intuitive editor. It's very easy. If you need help, our support team is always ready to assist you.

9. International Journal of Applied Cryptography an online tool or is there a desktop version?

SciSpace's International Journal of Applied Cryptography is currently available as an online tool. We're developing a desktop version, too. You can request (or upvote) any features that you think would be helpful for you and other researchers in the "feature request" section of your account once you've signed up with us.

10. I cannot find my template in your gallery. Can you create it for me like International Journal of Applied Cryptography?

Sure. You can request any template and we'll have it setup within a few days. You can find the request box in Journal Gallery on the right side bar under the heading, "Couldn't find the format you were looking for like International Journal of Applied Cryptography?”

11. What is the output that I would get after using International Journal of Applied Cryptography?

After writing your paper autoformatting in International Journal of Applied Cryptography, you can download it in multiple formats, viz., PDF, Docx, and LaTeX.

12. Is International Journal of Applied Cryptography's impact factor high enough that I should try publishing my article there?

To be honest, the answer is no. The impact factor is one of the many elements that determine the quality of a journal. Few of these factors include review board, rejection rates, frequency of inclusion in indexes, and Eigenfactor. You need to assess all these factors before you make your final call.

13. What is Sherpa RoMEO Archiving Policy for International Journal of Applied Cryptography?

SHERPA/RoMEO Database

We extracted this data from Sherpa Romeo to help researchers understand the access level of this journal in accordance with the Sherpa Romeo Archiving Policy for International Journal of Applied Cryptography. The table below indicates the level of access a journal has as per Sherpa Romeo's archiving policy.

RoMEO Colour Archiving policy
Green Can archive pre-print and post-print or publisher's version/PDF
Blue Can archive post-print (ie final draft post-refereeing) or publisher's version/PDF
Yellow Can archive pre-print (ie pre-refereeing)
White Archiving not formally supported
FYI:
  1. Pre-prints as being the version of the paper before peer review and
  2. Post-prints as being the version of the paper after peer-review, with revisions having been made.

14. What are the most common citation types In International Journal of Applied Cryptography?

The 5 most common citation types in order of usage for International Journal of Applied Cryptography are:.

S. No. Citation Style Type
1. Author Year
2. Numbered
3. Numbered (Superscripted)
4. Author Year (Cited Pages)
5. Footnote

15. How do I submit my article to the International Journal of Applied Cryptography?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Applied Cryptography's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

16. Can I download International Journal of Applied Cryptography in Endnote format?

Yes, SciSpace provides this functionality. After signing up, you would need to import your existing references from Word or Bib file to SciSpace. Then SciSpace would allow you to download your references in International Journal of Applied Cryptography Endnote style according to Elsevier guidelines.

Fast and reliable,
built for complaince.

Instant formatting to 100% publisher guidelines on - SciSpace.

Available only on desktops 🖥

No word template required

Typset automatically formats your research paper to International Journal of Applied Cryptography formatting guidelines and citation style.

Verifed journal formats

One editor, 100K journal formats.
With the largest collection of verified journal formats, what you need is already there.

Trusted by academicians

I spent hours with MS word for reformatting. It was frustrating - plain and simple. With SciSpace, I can draft my manuscripts and once it is finished I can just submit. In case, I have to submit to another journal it is really just a button click instead of an afternoon of reformatting.

Andreas Frutiger
Researcher & Ex MS Word user
Use this template