You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
1. “Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman”
Mark Randolph and William Diehl
Cryptography 2020, 4(2), 15; 10.3390/cryptography4020015
Available online: https://www.mdpi.com/2410-387X/4/2/15
2. “QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication”
Luca Mazzarella, Christopher Lowe, David Lowndes, Siddarth Koduru Joshi, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald, John Rarity and Daniel Kuan Li Oi
Cryptography 2020, 4(1), 7; 10.3390/cryptography4010007
Available online: https://www.mdpi.com/2410-387X/4/1/7
3. “A Simple Protocol for Certifying Graph States and Applications in Quantum Networks”
Damian Markham and Alexandra Krause
Cryptography 2020, 4(1), 3; 10.3390/cryptography4010003
Available online: https://www.mdpi.com/2410-387X/4/1/3
4. “Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach”
Debayan Das and Shreyas Sen
Cryptography 2020, 4(4), 30; 10.3390/cryptography4040030
Available online: https://www.mdpi.com/2410-387X/4/4/30
5. “Privacy Protection in Real Time HEVC Standard Using Chaotic System”
Mohammed Abu Taha, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad and Olivier Deforges
Cryptography 2020, 4(2), 18; 10.3390/cryptography4020018
Available online: https://www.mdpi.com/2410-387X/4/2/18
6. “Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions”
Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca and Laurent Njilla
Cryptography 2020, 4(2), 17; 10.3390/cryptography4020017
Available online: https://www.mdpi.com/2410-387X/4/2/17
7. “Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud”
Yunhong Zhou, Shihui Zheng and Licheng Wang
Cryptography 2020, 4(4), 28; 10.3390/cryptography4040028
Available online: https://www.mdpi.com/2410-387X/4/4/28
8. “A Taxonomy of Blockchain Consensus Methods”
Jeff Nijsse and Alan Litchfield
Cryptography 2020, 4(4), 32; 10.3390/cryptography4040032
Available online: https://www.mdpi.com/2410-387X/4/4/32
9. “Security Analysis of Lightweight IoT Cipher: Chaskey”
Ashutosh Dhar Dwivedi
Cryptography 2020, 4(3), 22; 10.3390/cryptography4030022
Available online: https://www.mdpi.com/2410-387X/4/3/22
10. “Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity”
Ivan Bow, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan Robucci, Calvin Chan and Jim Plusquellic
Cryptography 2020, 4(2), 13; 10.3390/cryptography4020013
Available online: https://www.mdpi.com/2410-387X/4/2/13