The Journal of Cryptology provides a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are covered, including information theoretic and complexity theoretic perspectives as well as implementation, application, and standards issues. Illustrative topics include public key and conventional algorithms and their implementations, cryptanalytic attacks, pseudo-random sequences, computational number theory, cryptographic protocols, untraceability, privacy, authentication, and key management. In addition to full-length articles, short notes will be considered. Survey articles and position papers on timely topics may be considered as well.
Authors should submit a manuscript by emailing it as a pdf attachment to the Editor in Chief, or directly to one editor on the Editorial Board. Non-electronic submissions are strongly discouraged; please contact the Editor in Chief if you wish for an exception to be made on this policy.
The first page of your manuscript must include names and affiliations for all authors. Submissions formatted using latex are strongly preferred, although no specific style files are required.