Cryptography Reviews
A section of Cryptography (ISSN 2410-387X).
Section Information
Scope and Focus
The Cryptographic Review section provides a dedicated platform for critical evaluations, systematic comparisons, and comprehensive syntheses of existing cryptographic schemes, protocols, and paradigms. In contrast to the journal’s primary focus on novel cryptographic constructions and cryptanalytic results, this section emphasizes retrospective analysis, trend mapping, and integrative discussions that draw connections across cryptographic subfields.
Key Contributions We Seek
- Comparative Surveys:
- Detailed comparisons of cryptographic primitives (e.g., encryption schemes, digital signatures, zero-knowledge proofs) with respect to security properties, efficiency, implementation maturity, and applicability;
- Analyses of design trade-offs, performance bottlenecks, and standardization challenges.
- Systematic Reviews:
- Surveys of emerging trends such as post-quantum transition, privacy-enhancing technologies, or hardware-based security;
- Meta-analyses of well-established paradigms (e.g., secure multiparty computation, homomorphic encryption) with attention to practical deployment and adoption barriers.
- Taxonomy and Classification:
- New or refined frameworks for classifying cryptographic constructs by functionality, security model, or resource profile;
- Explorations of theoretical or practical linkages across cryptographic domains.
- Critical Commentaries and Perspectives:
- Constructive critiques of prevailing assumptions, widely adopted standards, or evaluation methodologies;
- Position papers highlighting underexplored vulnerabilities, open problems, or conceptual blind spots in existing cryptographic practice.
Out-of-Scope Submissions
Articles presenting new cryptographic constructions, novel protocols, or original cryptanalytic results are outside the scope of this section and should be submitted to the main research article track of the journal.
Why Submit to Cryptographic Review?
This section aims to advance the field by contextualizing current knowledge, identifying undercurrents in cryptographic research, and fostering scholarly reflection. We encourage submissions that consolidate fragmented insights, expose implicit assumptions, or provide forward-looking analyses grounded in rigorous scholarship.
Defining Features
- Emphasis on retrospective and synthetic analysis;
- Focus on cross-scheme/protocol comparisons and thematic reviews;
- Exclusion of novel designs and attack results;
- Strong preference for critical thinking and interdisciplinary relevance.
Prof. Dr. Licheng Wang
Section Editor-in-Chief