Introduction

Information is the basic ingredient for all kinds of activities in our civilized society. It is treated as marketable commodity. Now a day, information generation and access-to-information is being considered as an indicator to measure the social progress of a country. In fact, Internet has wrought a dramatic change in accessing and transferring information; thereby offer us a powerful means of managing information in modest way. However, phenomenal increase of digital information assets drastically changes the information behavior. But opportunities and complications are two sides of a coin. Indeed, a new information society has formed exploiting efficient technologies, and further development of these technologies have been aggravated many ills of information handling activities by means of hacking, cracking, phishing, spying, DNS poisoning, IP spoofing, virus infection, and so many (read as cybercrime). Thus Internet often misleads users, and creates a hurdle in transferring authentic information securely through distributed network environment. Therefore, Information security has been a crucial issue in modern information management.

“Cryptography” is the science of information security, closely related to the cryptanalysis. The word is derived from the Greek kryptós, means hidden. Thus cryptography refers to numerous ways to hide information in storage or transit; often associated with the process of encryption and decryption. In particular, Cryptology is the science of secret messages that underpins cryptography, which concerns designing cryptosystems for coding and decoding messages; and more glamorous cryptanalysis, which is concerned with breaking cryptosystems, or deciphering messages without prior detailed knowledge of the cryptosystem (Dooley 2013). The first known use of a modern cipher was by Julius Caesar (100 BC to 44 BC), who did not trust his messengers when communicating with his governors and officers; thereby, he created a system in which each character in his messages was replaced by a character three positions ahead of it in the Roman alphabet.

Modern cryptography is concerned with the cryptosystems, refers to the art of keeping messages secure using mathematical procedures and computer programs, includes regulation of human behavior. Thus, it enables the users to communicate securely over an insecure channel in a way that guarantees their transmissions’ privacy and authenticity (Coron 2006). Therefore, the ability to store and transfer sensitive information securely has become a critical issue in achieving required success in cryptology. In fact, it has turned into a battleground of the world’s best mathematicians and computer scientists. The field has expanded to encompass many others—including information theory, communication theory, number theory, discrete mathematics, algebraic geometry, application of algorithms, provable security, advanced protocols, social engineering, etc.

Attaining information security had been one of the major policy issues for many nations since last two decades. Owing to the vision of all our technocrats’ and great leaders, India has made immense progress towards information security over the last decade. The country is now focusing on DNS security and testing of hardware to minimize the tampering of devices. Recently, it has introduced National Cyber Security Policy (NCSP-2013), released on 2 July 2013. The President of India, Shri Pranab Mukherjee, in his speech at the 48th Convocation of Indian Statistical Institute, Kolkata (on 10 January 2014), had accorded the importance to information security. He stated that “ISI is involved in developing technologies and theories in the areas of cryptology and information security that are likely to have far reaching impact on national security policies”.

Realizing the growing importance of information security, Government of India (Ministry of Communication and Information Technology) regularly conducts Information Security Education and Awareness (ISEA) Programme to create awareness among social commons, on how to protect our information in the cyber space. In no doubt, cryptography is becoming increasingly important as the Internet and other forms of electronic communications (via e-mail, e-voting, digital coins, e-shopping, e-commerce, credit card, etc.) have become more prevalent; thereby, application of cryptographic techniques has become inevitable to safeguard the digital information assets and to defend the invasion of privacy in every sphere of the modern society (Blanchette 2013).

Quantitative studies are more prevalent among scientific disciplines (read as scientometrics), often used to evaluate the trends-in-research of a discipline confined to an emerging area. Numerous studies have been carried out in multiple dimensions in order to understand the growth of research, prolific contributors, potential collaborators, active sub-domains of research, and to track many other issues (Anyi et al. 2009). In reverse, mapping of literature of a particular discipline over a period of time depicts the changes in cognitive structure and scientific behaviour of that discipline. In fact, various bibliometric methods are extensively used for nurturing scientific information and research domains are increasingly evaluated based on the publication count and related indices. Essentially such counting is predominant by means of publications in a premier scholarly journal of the discipline concerned—since an esteemed journal is considered as sample representative of all scientific communications in a particular domain.

Indeed an assessment of cryptographic research becomes imperative over other disciplines, as cryptography has emerged as an indispensible tool for provable security and technological applications. However, scientometric analysis on this area of research has not been published as yet. Therefore, an attempt has been made to analyze the trends in cryptographic research through scholarly publications of the Journal of Cryptology (JOC). This paper is hence interesting in providing a systematic and comprehensive survey of cryptography using quantitative methods and techniques; which empirically access the research impact (Glänzel and Moed 2002), analyze emerging trends of the given field of research (Chen et al. 2012).

Certainly the study will provide useful information on research performance of an academia; stimulates visualization of esteemed institutions, prolific authors, and core journals by depicting citation behavior of this field of knowledge. Thus it enables researchers to identify the gaps and research frontiers to carry out in future, so as to insist aspiring researchers in their career planning. No doubt, this work will be useful for better research governance through capacity building by means of resource allocations, and collection development of this scientific specialty.

Scope and objectives

The study is confined to the scholarly literatures published in the Journal of Cryptology (ISSN: 0933-2790) over a decade of the present century i.e. from 2001 to 2010. It is a premier international scholarly journal, published by the International Association for Cryptologic Research (IACR) since June 1988. Currently it is technically co-sponsored by Springer-Verlag Publisher (New York, USA) available both in print and online.

The journal, founded under the editorship of Ernest F. Brickell (a celebrated cryptographer), emerged to extend the unique perceptions, both in theoretical results and application standards. It carries much of the path-breaking research works of eminent scientists in the field, thereby illustrates original contributions in cryptology and allied areas of modern information security to pursue vigorous research activities (Brickell 1988).

However, it provides an excellent communication channel for exchanging innovative ideas in different dimensions of cryptology and intends to serve a broad readership; which makes the journal an effective and reliable representation of modern cryptographic research. The journal, thus, has played a decisive role to the advancement and dissemination of cryptographic information worldwide; thereby well regarded by the peers.

Further the study is conducted purely based on the research articles of cryptology (includes cryptography, cryptanalysis, and allied areas of research); therefore the communications like a few preface, editorial note, erratum, book reviews, letter to editor, corrigendum, obituary, etc. (those have lesser research impact) are discarded from the purview of this study. Indeed, a scientometric analysis of scholarly articles appeared during a decade would certainly be indicative for analyzing current trends of cryptographic research.

Objectively, the study is intended to investigate the recent trends in cryptographic research for enabling better research governance and monitoring academic administration of this scientific specialty; thereby could be utilized as a tool for capacity building, resource allocations, and collection development as well. Thus academic administrators could be able to compare their peers, policymakers could identify relative strengths or weakness in strategically important research areas, and funding agencies could be able to predict their possible areas of investments.

It is also conducted with the following specific objectives.

  1. (a)

    to understand the growth of cryptographic research by analyzing JOC’s performance compare with the world’s cryptographic publications over a passage of time.

  2. (b)

    to examine the authorship pattern and degree of collaboration as well as collaboration density in the research of this scientific specialty.

  3. (c)

    to prepare a rank list of prolific contributors and to test the empirical validation of Lotka’s law for author productivity within the scope of this study.

  4. (d)

    to determine the potential collaborators of cryptographic research and extent of collaborative research across institutions and countries.

  5. (e)

    to analyze the scattering of publications into various subject-clusters and to identify high-score keywords for detecting active areas or topics of research in cryptology.

Justification of the study

On its’ twenty-five years journey, JOC has undergone radical changes in quality, visibility, and readership of cryptographic research; thus it accommodated several thought-breaking research publications. It also compensates an endless diversification among the facets in cryptology that are related symbiotically, thereby theory and applications became increasingly blurred over the journal issues. Reportedly scientometric studies are more frequent in emerging areas of science, but no such study has been traced on Cryptology. In fact, JOC being top grade channel of research with international recognition makes extra significance to conduct such a study for representing current trends in cryptographic research—hence the quest is pursued.

However, over the passage of time, JOC has created significant queries among the cryptographers as well as scientometricians—how far the Journal is being pursued the trends of current cryptographic research in terms of coverage, internationality, authorship, collaboration, interdisciplinary approach, proactive areas, etc. as envisaged by the IACR? Indeed appropriate to look back a decade of twenty-first century for accessing the trends in cryptographic research and set the course of future direction in this scientific specialty.

Data source and methodology

In order to achieve the aforesaid objectives, primary data of the study has been collected from MathSciNet (1940–2014). It enables web access to Mathematical Reviews (MR) database via multiple mirror sites and offers excellent content with powerful search functionality and timely updates. It’s dynamic search interface provides diverse searchable fields including author affiliations, institution-code, country code, classification code, and source journal name that could be useful to identify the articles of a particular journal across different time-frame. In fact, Boolean operators can effectively create different combinations among the fields. Therefore, bibliographic data of the articles having source-journal as Journal of Cryptology in the byline and published during 2001 to 2010 were retrieved from the MathSciNet database. Search string used for “(Journal = (Journal of Cryptology) NOT MR Number = (MR2371222) AND Publication Type = (Journals)) AND pubyear in [2001 2010]”. Complete searching displayed 167 hit records (excluding an erratum in vol. 20, no. 3, 2007), thus found a reasonable sample size for the purpose of the study.

Prior to tabulation, retrieved data set is verified with the physical volumes of the journal available in ISI library collection. Thereafter, necessary bibliographic elements of each article like title, author(s) name with affiliation, publication year, volume, issue, pages, mathematics subject classification (primary), reviewer name, etc. were tabulated in the corresponding data sheets using MS-Excell. However, the data relating to number of references, author-assigned keywords of each publication were collected directly from the electronic version of the articles. Ultimately, various scientometric techniques are applied to determine the authorship patterns of publications and the extent of collaborations across the institutions of various geographical boundaries, and to trace many other issues; subsequently analyzed for making observations and interpretations.

Chronological distribution of cryptographic contributions (JOC vs. World-total) has been performed, and activity index (AI) has been calculated to analyze how JOC’s performance changed with the world’s cryptographic research over a passage of time; using the indicator as studied by Bujdosó and Braun (1983). Collaboration trend of research has been assessed by means of proportion of non-collaborative versus collaborative (having two or more authors) papers; extent of collaborative research is determined on the basis of lateral relations within the collaborative publications both institution-wise and country-wise; thereby unilateral, bi-lateral and multilateral collaborations were traced out. In addition, strength in collaboration by means of degree of collaboration (DC) has been estimated using Subramanyam’s formula (Subramanyam 1983). Strenuous efforts have been made for empirical validation of Lotka’s law (Lotka 1926). Worthy to mention, instead of commonly used inverse square law, a generalized form of the law (referred to inverse power law) as presented by Bookstein (1976) is applied and tested. A rank list of prolific contributors has been prepared on the basis of weighted values of the publications using adjusted or fractional counting method (Van-Hooydonk 1997).

Geographical diversity in authorship is considered as an indicator to measure the internationality of cryptographic publications; thereby a rank list of institutions as well as countries has been prepared based on the weighted value of contributions. Weighted value (actual share) has been calculated using fractional counting method, i.e. considering proportionate representation of authorship in contributions produced by a particular institution or country. It has resulted more distinct list for determining the ranks.

Scattering of publications across sub-domains are examined on the basis of AMS classification code in two, three, even five-digit-level; thus active areas of research in Cryptology were detected.

Therefore, a thorough analysis of collected data has been worked out in different dimensions using quantitative techniques. However, necessary data sheets are presented in tables and graphs for better interpretation.

Quantitative analysis and empirical findings

A detailed analysis of collected data; duly illustrated by tables and graphs, revealed lots of information to answer various interesting questions and interpreted towards decision-making, which are presented in the following sections.

Chronological distribution of contributions

Table 1 presents year wise distribution of 167 articles published in the journal over 10 volumes consisting 40 issues, during the study period. It appears that the number of contributions increased consistently over the years (except in 2003 and 2004), and an average of 4 articles is contributed to each issue of this journal. Significantly the activity of this journal founds very much precious to the cryptographic publications produced worldwide over the same period, as shown in the table and Fig. 1.

Table 1 Year-wise distribution of contributions (JOC vs. World-total)
Fig. 1
figure 1

Activity index of JOC during 2001–2010

World contributions to cryptology research (given under World-total) has been obtained from MathSciNet database using search expression “(MSC Primary = (94A60 or 94A62 or 11T71 or 14G50 or 68P25 or 81P94) AND Publication Type = (Journals)) AND pubyear = 2001”. In the above expression MSC Primary denotes the subject-codes primarily assigned for cryptography and related sub-domains in the mathematics subject classification of AMS; whereas publication type indicates the cryptology literatures published in journals during specified year, within the scope of the source database.

The AI characterizes the relative research efforts of a journal in the given subject or scientific specialty (Bujdosó and Braun 1983). Here, AI has been calculated for different years to analyze how JOC’s performance changed with the world’s research performance over a passage of time, using the formula; Activity Index = [{(JOC’s output in a particular year)/(JOC’s total output during study period)}/{(World’s cryptology publication output in a particular year)/(World’s total cryptology publication output during study period)}].

$$ {\text{Symbolically it can expressed as}},{\text{AI}} = [({\text{Jy}}/{\text{Jt}})/\left( {{\text{Wy}}/{\text{Wt}}} \right)] $$

Activity index (AI) equals to 1 indicates that JOC’s research effort in the given field corresponds precisely to the world’s average; while AI greater than 1 reflects higher activity. Here, average AI is derived 1.1, invariably means the research activity of the JOC is almost similar to this scientific specialty and could be considered as a sample representative of this domain of research. Therefore, a consistent growth with steady increasing pace has been maintained in JOC when compared to the world average. However, as reflected the values, JOC’s efforts in cryptology research were much higher than the world average in the first two years and it was at peak in 2001 (AI = 2.19), which implies the authoritativeness of this journal in this scientific specialty.

Authorship pattern

Table 2 presents the authorship pattern observed in the contributions of JOC during 2001–2010. The study shows a total of 403 occurrences of authors counted in 167 articles produced during the period, thus average authorship obtained 2.4 for each publication. It is also observed that a quarter of the publications (25.75 %) produced under single-authorship; rests in collaboration—either by two-authors or three, four, five, six, seven, even by ten-authors. Thus contributors of this scientific specialty are mostly preferred to work in collaborative manner. Collaboration among two-authors (33 %) is predominant, followed by three authors (26 %), and four authors (11 %), etc.

Table 2 Authorship distribution of JOC publications

The study depicts an increasing trend of multi-authored publications (46 % in 2004 and 90 % in 2009) has been observed in agreement with many other disciplines (Bandyopadhyay 2001). Such a trend of collaboration among the researchers is perhaps due to increased complexity in research activities, technological expositions combined with more specializations, cost of modern investigations, impact on citations, and often interdisciplinary research areas have been forcing the researchers to share their expertise in producing their output.

Research collaboration

Research collaboration has become prevalent in many scientific specialties and highly practiced in twenty-first century. Huang et al. (2014) noted that multi-authored publications have been increased steadily in post-web era. Collaboration is an intense form of interaction that allows for effective communication as well as sharing of competence and other resources. However, multiple-authorship in different dimensions (say for inter-department, inter-institute, inter-country, etc.) provides a measure of intensity in collaborations. Indeed lateral relationship among the collaborated authors might be considered as viable indicator to determine the intensity in research collaboration.

Table 3 depicts the collaboration scenario among the authors in different two levels—namely Domestic (co-authors are from the same country), and International (collaboration occurs within two or more authors of different countries). Out of 124 collaborative contributions domestic collaboration constituted only 44 %, while 56 % contributions are collaborated among cryptologists across the countries. Thus it brings out the prevalence of team research and the scientists working in this field prefer to conduct research in collaboration.

Table 3 Collaboration trend and degree of collaboration

In order to measure the degree of collaboration (DC) in quantitative terms, the formula given by Subramanyam (1983) can be useful. He worked out the DC, which is determined by the ratio of number of collaborative publications and total number of publications during certain period of time. That can be expressed as,

$$ {\text{DC}} = \frac{{N_{\text{m}} }}{{N_{\text{m}} + N_{\text{s}} }} = \frac{124}{124 + 43} = 0.742 $$

where N m refers to multi-authored (two or more) contributions and N s denote the number of single-authored contributions published in the journal during study period. Thus, average degree of collaboration is found to be 0.74 and quite significant. The extent of collaboration distribution over the period is presented in Fig. 2. Clearly it indicates the prevalence of collaborative research (74.25 %) over the solo research (25.75 %) in the specialty studied here, as envisaged in the contributions of JOC.

Fig. 2
figure 2

Collaboration trend over the years (single vs. multi-authors)

Collaboration density (bilateral and multilateral)

Table 4 reveals further distribution of collaborative contributions in order to map the lateral relations among co-authors. The lateral relationship among co-authors can be studied under three different levels of aggregation; namely unilateral, bilateral, and multilateral. Unilateral collaboration is described when co-authorship of a publication occurs within a link, whereas bilateral collaboration implies the co-authorship occurs between two (only two) different links. Multilateral collaboration indicates the participation of co-authors from two or more different links for producing an article.

Table 4 Lateral relations among co-authors

However, collaborative contributions are viewed laterally in two different angles to determine the intensity in collaboration, viz. Domestic (within the country, institute-wise linkage) and International (cross-country collaboration). So, domestic collaboration of a publication happens to be made by the co-authors from the same country; either from the same institute (unilateral) or two different institutes (bilateral), otherwise may be from more than two different institutes. Similarly, International (inter-country) multilateral collaboration of a publication implies that author’s affiliated institutes are located in three or more different countries.

While multilateral collaboration have more intent over the bilateral collaboration, then cross-country collaboration identifies greater intensity in compare to domestic collaborations—thus defines collaboration density. Such indicator helps to determine the strength of a research network, where international multilateral has greater strength than domestic multilateral collaboration. A considerable number of bilateral and multilateral collaboration signifies that intellectual perceptions of authors from diverse origin have been used to produce the research outputs in this scientific specialty.

Ranking of prolific authors

Table 5 depicts the ranking of prolific authors based on the weighted value of their contributions (by authorship) in JOC during the study period. Weighted value of contributed articles has been calculated using fractional counting method; where total weight of an article always considered 1, which is distributed equally among the authors responsible for the article. Such a ranking method entails more accurate values in making the differences with finer tunes; thus removes anonymous ranking of authors, as yielded from direct counting method (Egghe et al. 2000). For instance, authors produced 5 articles each would come to the same rank in direct counting method; but they can be ranked more appropriately having different weighted values of their shared contributions, if fractional counting method is applied.

Table 5 Top-twenty productive authors (based on weighted value of contributions)

Out of 273 unique authors having 403 occurrences of authorship in 167 contributions; 28 prolific contributors ranked within top-twenty, as presented in Table 5. It is observed that top-ten authors received a total weighted score of 31 (out of 167) by contributing in 57 articles. Other listed authors carrying out the score within 1.08 to 1.75. Yehuda Lindell (Department of Computer Science, Bar-Ilan University, Israel) is found to be the most prolific author; followed by Rosario Gennaro (IBM, Thomas J. Watson Research Center, USA), Tamir Tassa (Open University, Israel), Jonathan Katz (Department of Computer Science, University of Maryland, USA), Lars R. Knudsen (Department of Mathematics, Technical University of Denmark), Serge Vaudenay (Swiss Federal Institute of Technology, Switzerland), etc. Rest 245 unique authors, who received the weighted score ≥1 is not revealed in the ranked list.

More interestingly, vast majority of the top-twenty ranked researchers come largely from Anglo-American countries. In fact 12 productive authors affiliated in USA, 8 in Israel, 2 in Switzerland, 1 in Denmark, 1 in Canada, 1 in France, 1 in Netherlands, etc.

Empirical validation of Lotka’s law

Lotka’s empirical law of scientific productivity states that y number of authors each credited with x number of papers is inversely proportional to x, which is the output of individual author. Thus relation is expressed as (Lotka 1926),

$$ x^{n}\upalpha\frac{1}{y}\quad {\text{or }}\quad x^{n} y = C\left[ {n{\text{ and }}C{\text{ are two constants}}} \right] $$
(1)

There has been a considerable literature on the empirical validation of Lotka’s law. Several studies have reported that Lotka’s law is applicable for the productivity trend distributions of well-recognized disciplines. Usually such disciplines follow the distribution patterns that conform Lotka’s law in its original form with exponent value of 2. While some other investigations found that the value of exponent n is not always 2, rather a variable value around 2.

Murphy (1973) in a study applied the Lotka’s law appropriately in the field of humanities, without any statistical test to check the degree of significance. Pao (1985) presented the application process of Lotkás law (step by step) deducing the values of constant and exponent based on the method as same as Lotka, and tested the degree of significance. Later she applied this procedure over 48 groups of authors (representing 20 scientific disciplines) and found that in most of the cases the original law of Lotka holds good (Pao 1986). Nicholls (1986) has conducted studies on 15 different datasets of humanities, social sciences, and sciences for testing the empirical validation of the Law. He observed that the studies on their majority are conflicting, incomparable, and inconclusive; thus do not provide any clear-cut validation of the Lotka’s law. Such inconsistencies in validation of the Law are perhaps due to a steady increase of co-authored publications over the time. Potter (1981) noted that Lotka credited only the senior author for each contribution ignoring all co-authors, as multi-authorship contribution was less common in Lotka’s time. However, a number of studies showed that using total or even fractional counting of authorship lead to a breakdown of Lotka’s law (Rousseau 1992).

Therefore, instead of commonly used inverse square law, Lotka’s formulation can be observed as inverse power law in general, i.e. x n·y = C. The exponent (n) and the constant (C) can be estimated from the given set of author productivity data. A generalized form of Lotka’s law (referred to inverse power law) as devised by Bookstein (1976) could be useful.

$$ a_{n} = \frac{C}{{n^{\upalpha} }}\quad {\text{for}}\quad n \, = \, 1, \, 2, \, 3 \ldots \quad {\text{and}}\quad C \, > \, 0 $$
(2)

where a n represents the probability of authors producing n contributions each and C and α are two parameters to be estimated for a specific set of data. The value of productivity constant (α) or characteristic exponent can be determined by considering the values of n (1, 2, 3…) applying either graphical or mathematical method.

Now, an attempt has been made to predict simply on the applicability of Lotka’s law for author productivity in the dataset studied here; and to what extent author’s productivity conforms to Lotka’s law has also been carried out. Table 6 shows the author productivity considering all the authors; where 204 authors have one paper each, 40 authors produced only two papers each, 17 authors contributed three papers each, 5 authors have four papers each to their credit, and so on. Maximum number of papers that have been credited to an individual author is found as 13. Now considering the observed data (204 authors have produced 1 paper each), anyone can easily derive the value of C from the Eq. (2).

Table 6 Author productivity in JOC during 2001–2010 (all authors considered)
$$ a_{n} = \frac{C}{{n^{\upalpha} }}\quad {\text{or}},\quad 204 = \frac{C}{{1^{\upalpha} }}\quad{\text{or}},\quad C = 204 $$

Subsequently, taking the expected value of α as 2 and putting the derived value of C as well as values of n (1, 2, 3, 4,…) in the above equation, corresponding values of expected authors (a n ) are obtained. Result shows (Table 6) a considerable variation in the expected values when compare to observed values. So, the Law does not fit in this case and a violation is clearly observed.

It is also evident from the table, when the value of α (productivity parameter) approximated to 2.35 (instead of 2) then the expected values of a n are quite close to the observed values, still a meaningful distance exists therein.

$$ \begin{aligned} & a_{n} = \frac{C}{{n^{\upalpha} }}\quad {\text{or}}\quad n^{\alpha } = \frac{C}{{a_{n} }}\quad {\text{or}}\quad \log n^{\upalpha} = \log \frac{C}{{a_{n} }}\quad {\text{or}}\quad \upalpha\log n = \log \frac{C}{{a_{n} }}\quad{\text{or}}\quad\upalpha = \frac{{\log \frac{C}{{a_{n} }}}}{\log n} \\ \quad {\text{or}}\quad \upalpha = \frac{{\log \frac{204}{40}}}{\log 2}\quad {\text{or}}\quad \left[{{\text{for}}\,C \, = \, 204, \, a_{n} = \, 40, \, n \, = \, 2} \right]\quad {\text{or}}\quad \alpha = \frac{0.70757}{0.30103} = 2.350 \\ \end{aligned} $$

Putting the values of n (1, 2, 3, 4,…) and calculated value of α as 2.35 following values of a n are derived.

$$ a_{n} = \frac{C}{{n^{\upalpha} }} = \frac{204}{{1^{2.35} }} = 204;\frac{204}{{2^{2.35} }} = \frac{204}{5.0982} = 40.01;\frac{204}{{3^{2.35} }} = \frac{204}{13.22} = 15.43;\ldots $$

It is therefore observed that, productivity distribution data (as shown in Table 6) partially fits the Lotka’s law in its original form with a calculated value of exponent α = 2.35; while the number of contributions (articles) does not exceed two. The law does not hold-good beyond this value. Noteworthy is the fact, larger the value of α, greater is the gap between the productivity of individual groups of authors contributing n number of papers each. Practically a larger value of α implies the proportion of highly productive authors is decreased (Gupta 1995). Further statistical tests (viz. Chi-square of goodness-of-fit and KS test) could be useful to confirm the applicability of this Law at an appropriate level of significance.

Geographical diversity of contributions

Table 7 shows the geographical distribution of contributing authors in JOC during the study period. Country names have been identified from the author-affiliations corresponding to their publications, which was primarily available within the ‘institution code’ data-field of MathSciNet. Tabulated data shows that a total of 403 occurrences of authors from 29 countries took part in producing 167 publications. Authors from diverse geographical locations (numerous countries) represented for contributing their research endeavors to JOC, implies that the journal considerably gained diverse experiences and opinions in publishing those articles. Such geographical diversity in authorship could be considered as an indicator to measure the internationality of a journal (Perneger and Hudelson 2007). Obviously, the source journal deserves the status of an international channel of research communications.

Table 7 Rank list of countries (based on weighted value of contributions)

A rank list of participating countries has been prepared on the basis of weighted value of contributions (by authorship) from respective countries, thereby using fractional counting method. USA received the maximum weight by carrying out a score of 57.53 (out of 167), affiliating 149 occurrences of authors in different authorship positions; followed by Israel (31.85), France (12.30), Canada (10.45), and others. It also found that top ten countries are having a total 343 (out of 403) occurrences of authors in various authorship positions, thus carrying an weighted score of 145 (about 87 %). Rest of the weight is eventually distributed over 19 countries, as shown in the Table 7. This indicator helps to find out the partner countries having similar research interests and extent of their involvement in recognizing the international repute of the subject.

Institution-wise diversity of publications

Table 8 depicts the distribution of authors made their contribution to JOC from various institutions of different countries. Distributed data presents a total of 136 individual institutions were involved in generating 167 publications of JOC during the study period. These institutions appeared in the publications through 403 occurrences of authors in various authorship positions, as well as share values. A rank list of participating institutions has been prepared based on the weighted value of the contributions (by authorship) from respective institutions. Weighted value (actual share) has been calculated using fractional counting method, i.e. considering proportionate representation of authorship in contributions produced by a particular institution. It has resulted more distinct list for determining the ranks of the contributed institutions.

Table 8 Rank list of productive institutes (based on weighted value of contributions)

The University of California (six centers), USA is appeared on the top; which is followed by Weizmann Institute of Science, Israel (IL-WEIZ), Bar-Ilan University, Israel (IL-BILN), IBM Research Centers, USA (1-IBM-), Technion—Israel Institute of Technology, Israel (IL-TECH-), University of Maryland, USA (1-MD-), Ecole Normale Superieure, Paris, France (F-ENS-), University of Bristol, England, UK (4-BRST-), etc. Though a few institutes contributed equal number of publications (say 15 each by IL-TECH & 1-MD), but ranked differently due to unequal share value (score 4.68 and 4.67) of their contributions, as shown in Table 8. Active participation of various institutions across geographical boundaries implies the recognition and authoritativeness of this journal in this specialty of research.

Top 10 institutions are carrying about 35 % of the total score (58 out of 167), by affiliating 35 % of the total occurrences of authors (142 out of 403) with various authorship positions. However, first forty-one institutions contributed through 271 occurrences of authors, received a total score 115. Rest of the weight is eventually distributed over 95 institutes, thus each of them received the weighted score ≥1 is not revealed in the ranked list.

Subject clusters of cryptographic research

Objectively the study ascertains the subject clusters that are predominating in this scientific specialty. Thus it analyzes the scattering of publications into different sub-domains to detect the active areas of research in Cryptology. In view of this objective, subject areas pertaining to the articles are identified based on the primary subject code (assigned for each article using Mathematics Subject Classification of AMS) in two-digit level, available from MathSciNet. Distribution of JOC publications into broad subject clusters and their sub-clusters (two, three or five-digit-level) are presented in Table 9. Evidently the subject cluster Communication Information and Circuits (94- including cryptography) covers almost 87 % of contributed articles in JOC; essentially required to pursue the research on modern information security, as committed by the International Association for Cryptologic Research.

Table 9 Domain-wise distribution of JOC publications

Further distribution of contributions has been made to identify the active sub-domains in this scientific specialty. These sub-clusters have been determined by the MSC primary codes in five-digit level, as shown in the Table 10.

Table 10 Sub-categories of the publications

Sub-domain wise distribution shows that contributors have pursued their research mostly in the areas of Cryptography (94A60) and Authenticated and secret sharing (94A62) followed by coding theory and cryptography (14G50), curves over finite and local fields (11G20), primality in number theory (11Y11), data encryption (68P25), and algebraic coding theory (11T71). Such a simple indicator could help academic administrators to identify potential and allied areas of research in order to pursue their academic endeavors.

Analysis of author-assigned keywords

Keywords are supposed to be one of the best indicators to understand and grasp the thought content of the contributions and specific areas of research addressed. Thus analysis of keywords could be useful for researchers to reflect the precision of subject declaration and choice-of-terms. In this study, a total of 747 keywords (author-assigned) are found in 167 articles of JOC, of which 510 unique keywords are soughed and enumerated. Notably the occurrence frequency of keywords was highly uneven.

Plural form of a term is treated equally with the singular, such as—adversary versus adversaries, cipher versus ciphers, Isogeny versus Isogenies. Coherent terms (either similar in meaning or semantically related) represented by different wordings are treated separately; in order to express the existence of inter-author inconsistencies for choice-of-terms. For instance Elliptic curve, Elliptic curves cryptography, ECC, Elliptic curve cryptosystem, etc. Therefore, metamorphic terms of a concept (e.g. Diffie–Hellman) could be appeared in different alphabetic positions of the keyword list, as given below;

  • Diffie–Hellman

  • Strong Diffie–Hellman

  • Diffie–Hellman problem

  • Gap Diffie–Hellman problem

  • Twin Diffie–Hellman problem

  • Decision Diffie–Hellman problem

  • Tripartite Diffie–Hellman key exchange

The study reveals an indiscriminate use of keywords by the authors, thus addressed wide range of research topics on cryptology and allied areas. A long list invariably declares the lack of practicing standard-vocabulary for assigning the keywords of scholarly articles. It has been found that 413 keywords appeared only once during a decade-long study period and many of them are meaningfully same. It implies the author’s freedom or uniqueness of using terms, rather to maintain standard-vocabulary in order to describe neo micro-thoughts. Author hereby suggests for developing a faceted schema of standard terminologies and its’ widespread implementation for authority control while assigning keywords (or subject headings) in this scientific specialty. A truncated list of highly-cited keywords and their corresponding frequencies are presented in Table 11.

Table 11 Highly cited author-assigned keywords

Not surprisingly, Cryptanalysis listed as the most frequent keyword appeared in 17 articles, followed by Discrete logarithm, Elliptic curve, Block cipher, Provable security, Cryptography, Secure computation, Oblivious transfer, Public-key encryption, Zero-knowledge, etc.

Active topics of research in Cryptology

Among the ranked list, top-ten keywords covered almost 13 % of the total keywords cited by the authors, thus presents the concentrated areas (active topics) of research in Cryptology, as shown in Fig. 3. However the frequency of first 43 keywords cumulated as 226, thereby covered almost 30 % of the total keywords appeared in the list.

Fig. 3
figure 3

Active topics of research in cryptology (2001–2010)

So the study reveals the research focuses in this scientific field. Indeed, the analysis of keywords could bring an insight to the authors for identifying less-covered or active areas of research, and making strategies of pursuing further research in cryptology.

Further research

The study could be useful to track many other issues on the growth of cryptographic research, thereby stimulate further studies on citation behavior and collaboration network; which are most desirable by the community-experts and scholars as a research tool. Therefore, the analyses can be made for determining citation patterns, tracking citation networks, justifying self-citation rate, enumerating source-materials cited, calculating mean-age of cited references, identifying core journals, plotting Bradford’s bibliograph on cited journals, and so on. Notably, Lindsey (1989) reported a couple of problems to be involved in using citation counts as a measure of quality in science.

Subsequently assessment of internationality and scientific value of the publications could be the probable areas of research in this direction. Simpson (1949) estimator can be applied towards measuring the concentration and geographical diversity of the cryptographic publications, an indicator to visualize the internationality.

However, a detailed correlation analysis of the publications may be observed between multi-authorship and corresponding citation rates (based on SCI), as viewed by Lindsey (1978). Thus one might easily compute whether and how strongly these pairs of variables are associated (i.e. influencing each other) using Pearson’s correlation coefficient.

Conclusion

This study examined quantitatively the cryptographic research by analyzing publications growth, authorship pattern, collaboration trend, and predominant areas of cryptographic research using well-established scientometric techniques. It also prepared a rank list of prolific contributors, productive institutions and predominant countries using fractional counting method; as well as active topics of research in cryptology are detected. Intrinsic effort has been made to calculate the AI of JOC and to test the empirical validation of Lotka’s law for author productivity. The analysis tracked many other issues for intellectual developments of cryptographic research and to enable better research governance and monitoring academic endeavors as well.

Findings reveal that—research effort of JOC conforms to the growth of world’s cryptographic research over a decade of time. As the average AI is derived more than 1 (AI = 1.1), invariably means the research activity of the JOC is at par, even greater than the world’s publication activity in cryptographic research. Otherwise, a consistent growth with steady increasing pace has been maintained in JOC when compared to the world average. Therefore, implies the authoritativeness of the JOC to be considered as representative sample of this scientific specialty.

In a straightway, this study entails an increasing trend of multi-authored publications (46 % in 2004 and 90 % in 2009); thus promotes collaboration in agreement with many other disciplines. Average degree of collaboration in quantitative terms i.e. DC derived as 0.74 is quite significant. So the prevalence of team research is clearly observed. Such a trend of collaboration is perhaps due to increased complexity in research activities, technological expositions desire more specializations, and often interdisciplinary research areas are forcing the researchers to share their expertise.

In terms of collaboration density—while multi-authored publications constituted 74 %, then cross-country or international collaboration (56 %) is far beyond the domestic collaborations (44 %). Again a considerable number of inter-country bilateral (52) and multilateral (18) collaboration signifies greater intensity over the domestic collaborations. Indeed, cross-country multilateral collaborations have more intent over the bilateral collaboration, thus defines the strength of research network. So it implies that intellectual perceptions of the cryptographers from diverse origin (across the countries) have been accumulated to produce the research outputs in this scientific specialty.

During last decade of this century, cryptographic research was dominated by USA and Israel. USA received the maximum weighted score (57.53) by affiliating 149 occurrences of authors in different authorship positions; followed by Israel (31.85), France, Canada, Germany, UK, and others. More interestingly, vast majority among top-twenty ranked productive authors are affiliated in USA and Israel. Yehuda Lindell is found to be the most prolific author affiliated to the Department of Computer Science, Bar-Ilan University, Israel; followed by Rosario Gennaro (USA), Tamir Tassa (Israel), Jonathan Katz (USA), etc. However, it is observed that author productivity is not in agreement with Lotka’s law. But productivity distribution data partially fits the Law when the value of α (productivity parameter) approximated to 2.35 (instead of 2), provided the number of contributions (articles) does not exceed two. The Law does not hold-good beyond this value.

In view of research collaboration network, Anglo-American institutions were more open than their overseas competitor. Among the most productive institutions University of California (six centers), USA is appeared on the top; which is followed by Weizmann Institute of Science (Israel), Bar-Ilan University (Israel), IBM Research Centers (USA), Technion—Israel Institute of Technology (Israel), University of Maryland (USA), Ecole Normale Superieure, Paris (France), University of Bristol (UK), University of Waterloo (Canada), etc. Although a few institutions are earmarked their positions through active participation, but the contributions are eventually made from as many as 136 institutions across geographical boundaries; which implies the authoritativeness and international recognition of JOC in cryptographic research.

The study ascertained broad subject cluster as communication information and circuits, as well as distinct research streams (sub-clusters) such as cryptography, authenticated and secret sharing. However, coding theory, primality in number theory, algorithms and complexity, curves over finite and local or global fields, data encryption, and network protocols are found to be predominating areas of research. Author-assigned keyword frequencies revealed that cryptanalysis, discrete logarithm, elliptic curve, block cipher, provable security, cryptography, secure computation, oblivious transfer, public-key encryption, zero-knowledge, etc. are active topics of research in cryptology. Therefore, the scholars have been paid more concentration on the aforesaid issues to pursue their research on modern information security.

Invariably this study has revealed much information in multiple dimensions, which might be supportive to the scholars, academic administrators, decision makers, and library managers to formulate strategies by means of capacity building, resources allocation, fund allocation, and collection development in libraries for enhancement of cryptographic research.