International Journal of Cryptology Research
The International Journal of Cryptology Research (IJCR) is the official journal of the Malaysian Society for Cryptology Research and provides a forum for publication of original results in all areas of modern information security. It consists of two issues per year.
IJCR began publication in 2008 under MSCR and is published biannually, in June and December.
Aims and Scope
IJCR publishes original research papers and review articles on modern information security, covering theoretical foundations, applications, implementations, cryptology, information and network security, and related underlying technologies.
Editorial Statement
The abbreviation for IJCR is Int J. Cryptol. Res.
Journal Subscription
All IJCR articles are freely available online in PDF through open access. All issues are made available online once published.
IJCR gives a worldwide audience larger than that of any subscription-based journal and increases the visibility and impact of published works. It is fully committed to the Open Access Initiative and provides free access to all articles as soon as they are published.
For institutional subscribers, contact the Editorial Assistants via editor.ijcr@mscr.org.my.
Chief Editor: Prof. Dr. Ramlan Mahmod
International Journal of Cryptology Research, Malaysian Society for Cryptology Research, C/O Institute for Mathematical Research, Universiti Putra Malaysia, 43400 UPM Serdang, Selangor, Malaysia.
Email: editor.ijcr@mscr.org.my
Author and Archive Links
- Download IJCR LaTeX Template
- Editorial Board
- Guideline for Authors
- Format of Manuscript
- Style of The Manuscript
- Submission of Manuscript
- IJCR Articles Archive
Editorial Board
Chief Editor
Ramlan Mahmod, Universiti Putra Malaysia
Editorial Board
- Kamel Ariffin Mohd Atan, Universiti Putra Malaysia
- Tor Helleseth, University of Bergen, Norway
- Robert H. Deng, Singapore Management University, Singapore
- Rennato Renner, ETH Zurich, Switzerland
- Keith Martin, Royal Holloway, University of London, United Kingdom
- Steven Galbraith, University of Auckland, New Zealand
- Heng Swee Huang, Multimedia University, Malaysia
- Goi Bok Min, Universiti Tunku Abdul Rahman, Malaysia
- Raphael C.W. Phan, Monash University Malaysia
- Hailiza Kamarulhaili, Universiti Sains Malaysia
- Azman Samsudin, Universiti Sains Malaysia
- Mohamed Ridza Wahidin, International Islamic University Malaysia
- Zailani Mohamed Sidek, Universiti Teknologi Malaysia
- Aizaini Maarof, Universiti Teknologi Malaysia
- Rabiah Ahmad, Universiti Teknikal Malaysia Melaka
- Eddie Shahril Ismail, Universiti Kebangsaan Malaysia
- Ramlan Mahmod, Universiti Putra Malaysia
- Mohd Rushdan Md. Said, Universiti Putra Malaysia
- Muhammad Rezal Kamel Ariffin, Universiti Putra Malaysia
- Aman Jantan, Universiti Sains Malaysia
- Shekh Faisal Abdul Latip, Universiti Teknikal Malaysia Melaka
Guideline for Authors
Publication Copyright: IJCR policy prohibits concurrent submission to two or more publications and prohibits publication of any manuscript already published either in whole or substantial part elsewhere. It also does not permit publication of manuscripts that have been published in full in proceedings. The editorial team may use a plagiarism detection system. By submitting to IJCR, authors accept that manuscripts may be screened for plagiarism against previously published works.
Editorial process: Authors are notified on receipt of a manuscript and upon the editorial decision regarding publication. Manuscripts deemed suitable are sent to Editorial Board members and/or reviewers. Authors are encouraged to suggest possible reviewers. Notification of editorial decision is usually provided within ten to twelve weeks from receipt of manuscript.
Author approval: Authors are responsible for all statements in articles, including changes made by editors. The liaison author must be available during the editorial process and approve edited copy. Changes cannot be made after the edited version has been approved.
Manuscript preparation: IJCR accepts research or original articles and proposals for special issues. Articles must be in English and written clearly and concisely. Manuscripts not adhering to instructions will be returned for revision without review.
Research/original article size: At least 10 and not exceeding 20 pages, excluding abstract, references, tables and/or figures.
Special issue article size: At least 10 and not exceeding 20 pages, excluding abstract, references, tables and/or figures.
Format of Manuscript
The paper should be formatted using the LaTeX template. A maximum of eight keywords should be indicated below the abstract. Leave a blank line between paragraphs and between bibliographic reference entries. Tables should preferably be placed in the same electronic file as the text.
Every page of the manuscript, including title page, references, and tables, should be numbered. Authors are recommended to prepare manuscripts in LaTeX using the IJCR template.
- Full title of the article.
- Author(s) and corresponding author information, including names, institutions, and full address for editorial correspondence.
- Abstract under 250 words and no more than eight keywords in alphabetical order.
- Number of black and white / colour figures and tables.
- Article body beginning with Introduction.
- Research/original papers should use headings Introduction, Materials and Methods, Results and Discussion, and Conclusions.
- Tables should be numbered consecutively with Arabic numerals.
- Equations and formulae should be set clearly; equation numbers should be in square brackets on the right margin.
- Figures and photographs should be print quality and numbered consecutively.
- References must conform to APA style and remain consistent throughout the manuscript.
Style of The Manuscript
Manuscripts should follow the latest version of the Publication Manual of the American Psychological Association (APA). The journal uses American or British spelling, and authors may follow the latest edition of the Oxford Advanced Learner’s Dictionary for British spelling.
Submission of Manuscript
Submit electronic files, including cover letter, manuscript, Submission of Manuscript Form, and Referral forms, via email directly to the Editorial Assistant at editor.ijcr@mscr.org.my.
All submissions must include a cover letter detailing what is being submitted. Papers are accepted on the understanding that the article is original and has not been published or submitted elsewhere. The cover letter must also acknowledge that all authors contributed significantly and agree with the manuscript content.
IJCR follows a double-blind peer-review process. At least two referees independently evaluate submitted manuscripts. Authors are encouraged to indicate four potential referees, but editors make the final choice.
The review process includes initial editorial screening, blinded review by referees, editorial decision, revision where needed, re-review where appropriate, final acceptance or rejection, and production. Accepted papers are sent to press and should appear in approximately four months.
All authors are required to have manuscripts edited by professional English language editors before submission. Authors publishing with IJCR will be asked to sign a declaration form covering copyright and permission for any copyrighted or previously published material.
IJCR Articles Archive
Volume 12(1) | January – June 2022
- Table of Contents
- Security Analysis of a Public Key Cryptosystem for Synchronized Chaotic Systems
- A Security-Mediated ElGamal Identity-Based Encryption Scheme
- A New Macaulay Matrix Structure for Solving Multivariate Quadratic Problem
- Survival of the First Practical Lattice-based Encryption Scheme: A Review
Volume 11(2) | July – December 2021
- Table of Contents
- The AAβ Pseudo-Random Bit Generator and Its Statistical Tests
- Cryptography in Blockchain Technology
- An Empirical Attack on a Polynomial Reconstruction Problem Potential Cryptosystem
Volume 11(1) | January – June 2021
- Table of Contents
- Simple Cryptanalysis on the Phony Rivest-Shamir-Adleman cryptosystem
- AKSA MySEAL Block Ciphers: Four Years On
- A Comment on “Key Generation Using Generalized Pell’s Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis”
Volume 10(2) | July – December 2020
- Table of Contents
- Randomness Tests on Nine Data Categories of RECTANGLE Using NIST Statistical Test Suite
- Security Analysis of the Key Encapsulation Mechanism based on Rabin-p Encryption Scheme
Volume 10(1) | January – June 2020
- Table of Contents
- Some Variants for NTRU Public-Key Cryptosystem: An Overview and Compilation
- Improvement of Scalar Multiplication on Elliptic Curve with j-invariant 0
- A New Short Decryption Exponent Cryptanalysis Attacks of Factoring RSA Modulus N = pq
Volume 9(2) | July – December 2019
- Table of Contents
- Factorization of Prime Power Moduli N = prqs Using Continued Fractions Method
- Forging the TNC Digital Signature
- A New Signing Scheme Based on BFHP and DLP
Volume 9(1) | January – June 2019
- Table of Contents
- Cryptographic Randomness Analysis on Simon32/64
- Rabin-p Key Encapsulation Mechanism for CyberSecurity Malaysia MySEAL Initiative
- Enhanced Statistical Analysis Evaluation Using CSM Randomness Test Tool
- LED and SIMECK FPGA Implementation
- New Vulnerabilities Upon Pomaranch Boolean Function Through Fault Injection Analysis (FIA)
Volume 8(2) | July – December 2018
- Table of Contents
- Common Modulus Attack Against Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field
- Generalizing Equivalent Elliptic Divisibility Sequence for Elliptic Net Scalar Multi- plication
- Security Analysis of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field using Two Types of GMITM Attacks
- Electrical Power SCADA Testbed for Cyber Security Assessment
Volume 8(1) | January – June 2018
- Table of Contents
- Fast and Efficient Design for AAβ Cryptosystem
- New Cryptanalysis of Multiple Moduli Ni = p²i qi Using Good Approximation of ?(Ni )
- Extending Pollard’s p – 1 Class of Weak Primes and Its Application on RSA
- Evaluation Criteria on Ambience-Based True Random Number Generators
Volume 7(1) | January – June 2017
- Table of Contents
- Scalar Decomposition Methods on Genus One Elliptic Curves
- Algebraic Cryptanalysis on the AAβ Cryptosystem
- Cancellable Fingerprint Minutiae Template Protection Using Bit Toggling Technique for Privacy Preserving
Volume 6(2) | July – December 2016
- Table of Contents
- Recent Advances on the Theory of S-box Design Strategies
- Statistical-based Repeated Differential Properties in the AES and PRESENT Key Schedules
Volume 6(1) | January – June 2016
- Table of Contents
- Hybrid Heuristic Methods in Constructing Cryptographically Strong S-boxes
- An Optimized Pairing-Based Cryptography Library for Android
- Identity-Based Signature using Bilinear Pairings on iPhones
- CSM S-Box Evaluation Tool (CSET); Tool to Evaluate the Strength of an S-Box
- A Review on Lattice Based Cryptography Resistance to Quantum Computing
Volume 5(2) | July – December 2015
- Table of Contents
- Provably Secure Randomized AAβ Cryptosystem
- An Overview of Frequency-based Digital Image Steganography
- Statistical Analysis on Lightweight Block Cipher, SIMON
- A Secure Cryptographic Algorithm against Side Channel Attacks
- Comparative Study on the Distribution of ISD and GLV Scalars
Volume 5(1) | January – June 2015
- Table of Contents
- CFEA-Technique: Smaller Size of the Compressed Plaintext
- Rabin-RZ: A New Efficient Method to Overcome Rabin Cryptosystem Decryption Failure Problem
- Linkability Attack of an ID-based Blind Signature Scheme
- Generic Construction for Attribute-Based Identification Schemes Secure against Reset Attacks
- A New Arbitrated Signing Scheme Based on BFHP
- Randomness Analysis on Speck Family Of Lightweight Block Cipher
- Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion
- Digital Image Watermarking using Digital Holographic Interferometry (DHI) Technique
Volume 4(1) | January – June 2013
- Table of Contents
- Modelling Stochastic Correlated Node Behaviour for Survivability in Ad Hoc Networks
- Holographic Watermarking based on Off-Axis Hologram and DWT-SVD
- Threshold Signature with Hybrid Problems
- On the Mathematical Complexity and the Time Implementation of Proposed Variants of Elliptic Curves Cryptosystems
- Mutual Remote Attestation in IPSec Based VPN
- Key Exchange for New Cryptosystem Analogous to LUCELG and Cramer-Shoup
- Bivariate Polynomials Public Key Encryption Schemes
- Design and Implementation of Key-Policy Attribute-Based Encryption in Body Sensor Network
- Security of NIDV Proof Systems for Certificate-Free Undeniable Signature Schemes
Volume 3(1) | January – June 2011
- Table of Contents
- Spectral Test via Discrete Tchebichef Transform for Randomness
- Secure Electronic Cash Using Elliptic Curve Cryptography Based on Zero Knowledge Proof
- ACM Cryptographic Key Exchange for Secure Communications
- The Applications of DH-Tuple Witness Indistinguishable Protocols
- Development of Undeniable Signature Schemes without Certificates
Volume 2(1) | January – June 2010
- Table of Contents
- A New Public Key Cryptosystem Based on IFS
- A k-Resilient Identity-Based Identification Scheme in the Standard Model
- Bias in the Nonlinear Filter Generator Output Sequence
- Security Analysis of the Step (D,K) Generator Respect to its Parameters
- Algebraic Analysis of Small Scale LEX-BES
- Conditional Probability Based Camera Identification
- One Megabit Random Ambience
- Detecting Attacks in Encrypted Networks using Secret-Sharing Schemes
Volume 1(2) | July – December 2009
- Table of Contents
- LILI to Dragon: from Bit-based to Word-based Stream Ciphers
- AAbeta-Cryptosystem: A Chaos Based Public Key Cryptosystem
- RSA Decryption Techniques and The Underlying Mathematical Concepts
- GCD Attack on the LUC4 Cryptosystem
- A New Cryptosystem Analogous to LUCLEG and Cramer Shoup
- The Beta-Transformation: A Case Study for Chaos Based Cryptography
- A Faster Version of Rijndael Cryptographic Algorithm Using Cyclic Shift and Bit Wise Operations
- Hardware Implementation of RC4 Stream Cipher
- Improving Security Performance with Parallel Crypto Operations in SSL Bulk Data Transfer
- A Shift Column Different Offset for better Rijndael Security
Volume 1(1) | January – June 2009
- Table of Contents
- A New Blind Signature Scheme Based On Factoring and Discrete Logarithms
- A New Online/Offline Signature Scheme without Key Exposure in the Standard Model
- Java Implementation for Identity-Based Identification
- Garbage-Man-In-The-Middle Attack on the Luc4 Cryptosystem
- A Method of SSO IN P2P Networks with the Capability of Adaptation at Network Topology Change
- Design Flaws of a Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection
- Random Walk Algorithm Based Design Technique for S-Box
- Differential Distinguishing Attack of Shannon Stream Cipher
- Conditions for Counter Measures Against One Time Pad Attack on Baptista Type Chaotic Cryptosystem
- Crazy: A New 256-Bit Compression Function for Hash Algorithm
- Cryptographic Key From Webcam Image