Announcements

3 January 2023
Cryptography | Top 10 Cited Articles in 2021

1. “Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?”
by Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri and Navid Asadizanjani
Cryptography 2021, 5(1), 9; https://doi.org/10.3390/cryptography5010009
Available online: https://www.mdpi.com/2410-387X/5/1/9

2. “A New Class of Q-Ary Codes for the McEliece Cryptosystem”
by Jürgen Freudenberger and Johann-Philipp Thiers
Cryptography 2021, 5(1), 11; https://doi.org/10.3390/cryptography5010011
Available online: https://www.mdpi.com/2410-387X/5/1/11

3. “A Novel Ultra-Compact FPGA PUF: The DD-PUF”
by Riccardo Della Sala, Davide Bellizia and Giuseppe Scotti
Cryptography 2021, 5(3), 23; https://doi.org/10.3390/cryptography5030023
Available online: https://www.mdpi.com/2410-387X/5/3/23

4. “Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach”
by Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar Costa, Setareh Rafatirad and Houman Homayoun
Cryptography 2021, 5(4), 28; https://doi.org/10.3390/cryptography5040028
Available online: https://www.mdpi.com/2410-387X/5/4/28

5. “TRNGs from Pre-Formed ReRAM Arrays”
by Bertrand Cambou, Donald Telesca, Sareh Assiri, Michael Garrett, Saloni Jain and Michael Partridge
Cryptography 2021, 5(1), 8; https://doi.org/10.3390/cryptography5010008
Available online: https://www.mdpi.com/2410-387X/5/1/8

6. “The Cost of a True Random Bit—On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs”
by Netanel Klein, Eyal Harel and Itamar Levi
Cryptography 2021, 5(3), 25; https://doi.org/10.3390/cryptography5030025
Available online: https://www.mdpi.com/2410-387X/5/3/25

7. “Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography”
by Johann-Philipp Thiers and Jürgen Freudenberger
Cryptography 2021, 5(4), 33; https://doi.org/10.3390/cryptography5040033
Available online: https://www.mdpi.com/2410-387X/5/4/33

8. “Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification”
by Andre Ostrak, Jaak Randmets, Ville Sokk, Sven Laur and Liina Kamm
Cryptography 2021, 5(3), 21; https://doi.org/10.3390/cryptography5030021
Available online: https://www.mdpi.com/2410-387X/5/3/21

9. “Flash-Based Security Primitives: Evolution, Challenges and Future Directions”
by Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian and Fatemeh Tehranipoor
Cryptography 2021, 5(1), 7; https://doi.org/10.3390/cryptography5010007
Available online: https://www.mdpi.com/2410-387X/5/1/7

10. “On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications”
by Irene Ioannidou and Nicolas Sklavos
Cryptography 2021, 5(4), 29; https://doi.org/10.3390/cryptography5040029
Available online: https://www.mdpi.com/2410-387X/5/4/29

More News...
Back to TopTop