You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
1. “Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?”
by Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri and Navid Asadizanjani
Cryptography 2021, 5(1), 9; https://doi.org/10.3390/cryptography5010009
Available online: https://www.mdpi.com/2410-387X/5/1/9
2. “A New Class of Q-Ary Codes for the McEliece Cryptosystem”
by Jürgen Freudenberger and Johann-Philipp Thiers
Cryptography 2021, 5(1), 11; https://doi.org/10.3390/cryptography5010011
Available online: https://www.mdpi.com/2410-387X/5/1/11
3. “A Novel Ultra-Compact FPGA PUF: The DD-PUF”
by Riccardo Della Sala, Davide Bellizia and Giuseppe Scotti
Cryptography 2021, 5(3), 23; https://doi.org/10.3390/cryptography5030023
Available online: https://www.mdpi.com/2410-387X/5/3/23
4. “Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach”
by Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar Costa, Setareh Rafatirad and Houman Homayoun
Cryptography 2021, 5(4), 28; https://doi.org/10.3390/cryptography5040028
Available online: https://www.mdpi.com/2410-387X/5/4/28
5. “TRNGs from Pre-Formed ReRAM Arrays”
by Bertrand Cambou, Donald Telesca, Sareh Assiri, Michael Garrett, Saloni Jain and Michael Partridge
Cryptography 2021, 5(1), 8; https://doi.org/10.3390/cryptography5010008
Available online: https://www.mdpi.com/2410-387X/5/1/8
6. “The Cost of a True Random Bit—On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs”
by Netanel Klein, Eyal Harel and Itamar Levi
Cryptography 2021, 5(3), 25; https://doi.org/10.3390/cryptography5030025
Available online: https://www.mdpi.com/2410-387X/5/3/25
7. “Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography”
by Johann-Philipp Thiers and Jürgen Freudenberger
Cryptography 2021, 5(4), 33; https://doi.org/10.3390/cryptography5040033
Available online: https://www.mdpi.com/2410-387X/5/4/33
8. “Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification”
by Andre Ostrak, Jaak Randmets, Ville Sokk, Sven Laur and Liina Kamm
Cryptography 2021, 5(3), 21; https://doi.org/10.3390/cryptography5030021
Available online: https://www.mdpi.com/2410-387X/5/3/21
9. “Flash-Based Security Primitives: Evolution, Challenges and Future Directions”
by Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian and Fatemeh Tehranipoor
Cryptography 2021, 5(1), 7; https://doi.org/10.3390/cryptography5010007
Available online: https://www.mdpi.com/2410-387X/5/1/7
10. “On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications”
by Irene Ioannidou and Nicolas Sklavos
Cryptography 2021, 5(4), 29; https://doi.org/10.3390/cryptography5040029
Available online: https://www.mdpi.com/2410-387X/5/4/29