Cryptography

短名
Journal Impact1.67
国际分区COMPUTER SCIENCE, THEORY & METHODS(Q2)
ISSN2410-387X
h-index18

期刊主页
涉及主题计算机科学计算机安全数学操作系统算法计算机网络密码学工程类程序设计语言加密物理生物政治学法学理论计算机科学量子力学生态学嵌入式系统钥匙(锁)统计电气工程地理计算机硬件
出版信息出版商: Multidisciplinary Digital Publishing Institute (MDPI)出版周期: 期刊类型: journal
基本数据创刊年份: 2017原创研究文献占比92.19%自引率:11.10%Gold OA占比: 99.39%
平均审稿周期 网友分享经验:11 Weeks

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts

2024-9-12

Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack

2024-9-11

Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants

2024-9-8

A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment

2024-9-2

Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves

2024-8-27

RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62

2024-8-23

Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs

2024-8-8

A Note on the Quasigroup of Lai–Massey Structures

2024-8-7

A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

2024-8-4

Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities

2024-8-1

Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions

2024-7-15

Improve Parallel Resistance of Hashcash Tree

2024-7-8

Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles

2024-7-8

Public Key Protocols from Twisted-Skew Group Rings

2024-7-5

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation

2024-7-5

The Emerging Challenges of Wearable Biometric Cryptosystems

2024-6-21

“Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities

2024-6-19

A Survey on Complexity Measures for Pseudo-Random Sequences

2024-6-13

The Security Evaluation of an Efficient Lightweight AES Accelerator

2024-6-4

Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance

2024-6-2

Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths

2024-5-28

Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

2024-5-23

A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids

2024-5-9

An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks

2024-5-1

Auditable Anonymous Electronic Examination

2024-5-1

Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography

2024-4-25

An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor

2024-4-22

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

2024-4-19

Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource

2024-4-6

Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE

2024-4-6

A Survey of Consortium Blockchain and Its Applications

2024-3-22

Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography

2024-3-18

E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval

2024-3-13

NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V

2024-2-29

FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data

2024-2-27

Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures

2024-2-25

Generation of Pseudorandom and Prime Numbers for Cryptographic Applications

2024-2-14

Key Management

2024-2-14

Stream Ciphers

2024-2-14

Frontmatter

2024-2-14

Introduction to Cryptanalysis Attacks on Symmetric Ciphers

2024-2-14

Hash Functions, Message Authentication Codes, and Digital Signature

2024-2-14

Block Ciphers: Basics, <scp>TDEA</scp> , and <scp>AES</scp>

2024-2-14

Digital Certificate, Public‐Key Infrastructure, <scp>TLS</scp> , and Kerberos

2024-2-14

Introduction to Computer Security

2024-2-14

Introduction to Cryptography

2024-2-14

Block Cipher Modes of Operation for Authentication and Confidentiality

2024-2-14

Introduction to Security Analysis of Block Ciphers

2024-2-14

Appendix: Multiple Choice Questions and Answers

2024-2-14

Symmetric Ciphering

2024-2-14

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司