Announcements

27 May 2022
Cryptography | Top 10 Cited Articles in 2020

1. “Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman”
Mark Randolph and William Diehl
Cryptography 2020, 4(2), 15; 10.3390/cryptography4020015
Available online: https://www.mdpi.com/2410-387X/4/2/15

2. “QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication”
Luca Mazzarella, Christopher Lowe, David Lowndes, Siddarth Koduru Joshi, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald, John Rarity and Daniel Kuan Li Oi
Cryptography 2020, 4(1), 7; 10.3390/cryptography4010007
Available online: https://www.mdpi.com/2410-387X/4/1/7

3. “A Simple Protocol for Certifying Graph States and Applications in Quantum Networks”
Damian Markham and Alexandra Krause
Cryptography 2020, 4(1), 3; 10.3390/cryptography4010003
Available online: https://www.mdpi.com/2410-387X/4/1/3

4. “Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach”
Debayan Das and Shreyas Sen
Cryptography 2020, 4(4), 30; 10.3390/cryptography4040030
Available online: https://www.mdpi.com/2410-387X/4/4/30

5. “Privacy Protection in Real Time HEVC Standard Using Chaotic System”
Mohammed Abu Taha, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad and Olivier Deforges
Cryptography 2020, 4(2), 18; 10.3390/cryptography4020018
Available online: https://www.mdpi.com/2410-387X/4/2/18

6. “Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions”
Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca and Laurent Njilla
Cryptography 2020, 4(2), 17; 10.3390/cryptography4020017
Available online: https://www.mdpi.com/2410-387X/4/2/17

7. “Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud”
Yunhong Zhou, Shihui Zheng and Licheng Wang
Cryptography 2020, 4(4), 28; 10.3390/cryptography4040028
Available online: https://www.mdpi.com/2410-387X/4/4/28

8. “A Taxonomy of Blockchain Consensus Methods”
Jeff Nijsse and Alan Litchfield
Cryptography 2020, 4(4), 32; 10.3390/cryptography4040032
Available online: https://www.mdpi.com/2410-387X/4/4/32

9. “Security Analysis of Lightweight IoT Cipher: Chaskey”
Ashutosh Dhar Dwivedi
Cryptography 2020, 4(3), 22; 10.3390/cryptography4030022
Available online: https://www.mdpi.com/2410-387X/4/3/22

10. “Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity”
Ivan Bow, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan Robucci, Calvin Chan and Jim Plusquellic
Cryptography 2020, 4(2), 13; 10.3390/cryptography4020013
Available online: https://www.mdpi.com/2410-387X/4/2/13

More News...
Back to TopTop