Cryptography
短名 | |
Journal Impact | 1.67 |
国际分区 | COMPUTER SCIENCE, THEORY & METHODS(Q2) |
ISSN | 2410-387X |
h-index | 18 |
涉及主题 | 计算机科学计算机安全数学操作系统算法计算机网络密码学工程类程序设计语言加密物理生物政治学法学理论计算机科学量子力学生态学嵌入式系统钥匙(锁)统计电气工程地理计算机硬件 |
出版信息 | 出版商: Multidisciplinary Digital Publishing Institute (MDPI),出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2017,原创研究文献占比: 92.19%,自引率:11.10%, Gold OA占比: 99.39% |
平均审稿周期 | 网友分享经验:11 Weeks |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts
2024-9-12
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
2024-9-11
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
2024-9-8
A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment
2024-9-2
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves
2024-8-27
RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62
2024-8-23
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
2024-8-8
A Note on the Quasigroup of Lai–Massey Structures
2024-8-7
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
2024-8-4
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities
2024-8-1
Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions
2024-7-15
Improve Parallel Resistance of Hashcash Tree
2024-7-8
Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles
2024-7-8
Public Key Protocols from Twisted-Skew Group Rings
2024-7-5
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
2024-7-5
The Emerging Challenges of Wearable Biometric Cryptosystems
2024-6-21
“Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities
2024-6-19
A Survey on Complexity Measures for Pseudo-Random Sequences
2024-6-13
The Security Evaluation of an Efficient Lightweight AES Accelerator
2024-6-4
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance
2024-6-2
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
2024-5-28
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
2024-5-23
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids
2024-5-9
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks
2024-5-1
Auditable Anonymous Electronic Examination
2024-5-1
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography
2024-4-25
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor
2024-4-22
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
2024-4-19
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource
2024-4-6
Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE
2024-4-6
A Survey of Consortium Blockchain and Its Applications
2024-3-22
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
2024-3-18
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval
2024-3-13
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V
2024-2-29
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data
2024-2-27
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
2024-2-25
Generation of Pseudorandom and Prime Numbers for Cryptographic Applications
2024-2-14
Key Management
2024-2-14
Stream Ciphers
2024-2-14
Frontmatter
2024-2-14
Introduction to Cryptanalysis Attacks on Symmetric Ciphers
2024-2-14
Hash Functions, Message Authentication Codes, and Digital Signature
2024-2-14
Block Ciphers: Basics, <scp>TDEA</scp> , and <scp>AES</scp>
2024-2-14
Digital Certificate, Public‐Key Infrastructure, <scp>TLS</scp> , and Kerberos
2024-2-14
Introduction to Computer Security
2024-2-14
Introduction to Cryptography
2024-2-14
Block Cipher Modes of Operation for Authentication and Confidentiality
2024-2-14
Introduction to Security Analysis of Block Ciphers
2024-2-14
Appendix: Multiple Choice Questions and Answers
2024-2-14
Symmetric Ciphering
2024-2-14
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远