You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.
All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess.
Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.
Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.
Original Submission Date Received: .
1. “A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions”
by Keerthi Nelaturu, Han Du and Duc-Phong Le
Cryptography 2022, 6(2), 18; https://doi.org/10.3390/cryptography6020018
Full text available online: https://www.mdpi.com/2410-387X/6/2/18
2. “Benchmark Analysis of YOLO Performance on Edge Intelligence Devices”
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
Cryptography 2022, 6(2), 16; https://doi.org/10.3390/cryptography6020016
Full text available online: https://www.mdpi.com/2410-387X/6/2/16
3. “A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity”
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
Cryptography 2022, 6(1), 3; https://doi.org/10.3390/cryptography6010003
Full text available online: https://www.mdpi.com/2410-387X/6/1/3
4. “A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments”
by Marius Iulian Mihailescu and Stefania Loredana Nita
Cryptography 2022, 6(1), 8; https://doi.org/10.3390/cryptography6010008
Full text available online: https://www.mdpi.com/2410-387X/6/1/8
5. “Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review”
by Abdulbast A. Abushgra
Cryptography 2022, 6(1), 12; https://doi.org/10.3390/cryptography6010012
Full text available online: https://www.mdpi.com/2410-387X/6/1/12
6. “ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3”
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Cryptography 2022, 6(2), 30; https://doi.org/10.3390/cryptography6020030
Full text available online: https://www.mdpi.com/2410-387X/6/2/30
7. “Light Weight Authentication Scheme for Smart Home IoT Devices”
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
Cryptography 2022, 6(3), 37; https://doi.org/10.3390/cryptography6030037
Full text available online: https://www.mdpi.com/2410-387X/6/3/37
8. “Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup”
by Shay Gueron, Edoardo Persichetti and Paolo Santini
Cryptography 2022, 6(1), 5; https://doi.org/10.3390/cryptography6010005
Full text available online: https://www.mdpi.com/2410-387X/6/1/5