Editorial Board

Editors (4)

Prof. Dr. Josef Pieprzyk
1. Data61, CSIRO (the Commonwealth Scientific and Industrial Research Organisation), Sydney, NSW 2000, Australia
2. Insitute of Computer Science, Polish Academy of Science, Warszawa 02-668, Poland
3. School of Electrical Engineering and Computer Science, Queensland University of Technology, Brisbane, QLD 4000, Australia
Interests: algorithms and complexity; cryptography; information security; security of computer networks
Prof. Dr. Wade Trappe
Associate Editor
Department of Electrical and Computer Engineering, Rutgers University, Piscataway, NJ 08854, USA
Interests: multimedia security; wireless security; wireless networking; cryptography
Special Issues and Collections in MDPI journals
Prof. Dr. Carlo Blundo
Associate Editor
Dipartimento di Scienze Aziendali, Management e Innovation Systems, Università degli Studi di Salerno, Via Giovanni Paolo II, 132 84084 Fisciano (SA), Italy
Interests: cryptography; security; privacy
Prof. Dr. Jim Plusquellic *
Section Editor-in-Chief
Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM 87131, USA
Interests: hardware security and trust and design for manufacturability
* Section "Hardware Security"
Special Issues and Collections in MDPI journals

Editorial Board Members (52)

Prof. Dr. Wael Adi
IDA, Institute of Computer and Network Engineering, Technische Universitaet Braunschweig, Hans-Sommer Str. 66, D-38106 Braunschweig, Germany
Interests: physical security; unclonable and clone-resistant architectures; intellectual property right protection for VLSI design cores; robot security; vehicular security; e-money; e-voting and error correction techniques
Special Issues and Collections in MDPI journals
Prof. Dr. Gildas Avoine
IRISA Rennes, Campus universitaire de Beaulieu, 263 Avenue du Général Leclerc, CS 74205, Building F, Office 401 (red floor), 35042 Rennes Cedex, France
Interests: cryptographic protocols based on symmetric-key protocols (especially includes authentication protocols, distance-bounding protocols, secure channels); low-cost devices (Internet of Things, lightweight cryptography, privacy, etc.); cryptanalytic time-memory trade-offs (TMTO)
Dr. Aydin Aysu *
Department of Electrical and Computer Engineering, North Carolina State University, Raleigh, NC 27606, USA
Interests: applied cryptography; computer architectures; hardware security
* Section Associate Editor
Special Issues and Collections in MDPI journals
Dr. Alessandro Barenghi
Department of Electronics, Information and Bioengineering (DEIB), Politecnico di Milano, 20133 Milano, Italy
Interests: applied cryptography; computer security; formal languages
Dr. Dario Catalano
Dipartimento di Matematica e Informatica, University of Catania, Via Andrea Doria 6, 95125 Catania, Italy
Interests: digital signatures; homomorphic authenticators; encryption schemes
Dr. Wenjie Che
Assistant Professor, Klipsch School of Electrical and Computer Engineering, New Mexico State University, 1780 E University Ave, Las Cruces, NM 88003, USA
Interests: Hardware Security and Trust, Machine Learning on Security, Embedded System Security, Hardware Software Co-Design, Design for Test
Prof. Dr. Tzung-Her Chen
Department of Computer Science and Information Engineering, National Chiayi University, No.300 Syuefu Rd., Chiayi City 60004, Taiwan
Interests: information security; information hiding; multimedia security; digital rights management; security for wireless and mobile networks
Special Issues and Collections in MDPI journals
Prof. Dr. Franco Chiaraluce
Department of Information Engineering (DII), Università Politecnica delle Marche, 60131 Ancona, Italy
Interests: coding; cryptography; physical layer security
Dr. Stelvio Cimato
Department of Computer Science, Università degli studi di Milano, Milan, Italy
Interests: data and network security; cryptographic protocols and applications
Special Issues and Collections in MDPI journals
Dr. Nicolas T. Courtois
Department of Computer Science, University College London, London WC1E 6BT, UK
Interests: cryptanalysis; block ciphers; Feistel ciphers; invariant theory; backdoors; multivariate polynomials; applied cryptography; industrial standards; TLS; digital signatures; crypto history; historical ciphers; Enigma; T-310; DES; SHA256; payment; smart cards; side channel attacks; security of bitcoin wallets; crypto currencies; secp256k1
Back to TopTop