1.9(top 20%)
impact factor
311(top 50%)
papers
2.0K(top 50%)
citations
18(top 50%)
h-index
1.9(top 20%)
extended IF
319
all documents
2.1K
doc citations
36(top 20%)
g-index

Top Articles

#TitleJournalYearCitations
1Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future PerspectivesCryptography2019303
2Multi-Factor Authentication: A SurveyCryptography2018194
3Provably Secure Covert Communication on BlockchainCryptography201866
4Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the LaymanCryptography202065
5QUARC: Quantum Research Cubesat—A Constellation for Quantum CommunicationCryptography202046
6Beyond Bitcoin: A Critical Look at Blockchain-Based SystemsCryptography201743
7A Privacy-Preserving, Mutual PUF-Based Authentication ProtocolCryptography201740
8Multiparty Delegated Quantum ComputingCryptography201733
9Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research DirectionsCryptography201732
10A Taxonomy of Blockchain Consensus MethodsCryptography202032
11An Enhanced Key Management Scheme for LoRaWANCryptography201829
12Can Ternary Computing Improve Information Assurance?Cryptography201829
13Benchmark Analysis of YOLO Performance on Edge Intelligence DevicesCryptography202225
14A Novel Algorithm of Constructing Highly Nonlinear S-p-boxesCryptography201924
15An Overview of DRAM-Based Security PrimitivesCryptography201819
16A Simple Protocol for Certifying Graph States and Applications in Quantum NetworksCryptography202019
17Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?Cryptography202119
18Analysis of Entropy in a Hardware-Embedded Delay PUFCryptography201718
19FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with NoiseCryptography201718
20Password-Hashing StatusCryptography201718
21Pairing Free Identity-Based Blind Signature Scheme with Message RecoveryCryptography201818
22A Novel Ultra-Compact FPGA PUF: The DD-PUFCryptography202118
23Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full TreatmentCryptography201817
24A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud EnvironmentsCryptography202216
25Light Weight Authentication Scheme for Smart Home IoT DevicesCryptography202216
26Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging ProtocolsCryptography201715
27Privacy Protection in Real Time HEVC Standard Using Chaotic SystemCryptography202015
28Variations of QKD Protocols Based on Conventional System Measurements: A Literature ReviewCryptography202215
29A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future DirectionsCryptography202215
30Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †Cryptography201814
31Security Analysis of Lightweight IoT Cipher: ChaskeyCryptography202014
32On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking ApplicationsCryptography202114
33Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted SetupCryptography202214
34Synchronization in Quantum Key Distribution SystemsCryptography201713
35An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate ArraysCryptography201813
36ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License ValidationCryptography201813
37Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)Cryptography201913
38New Cryptanalytic Attack on RSA Modulus N=pq Using Small Prime Difference MethodCryptography201913
39Barrel Shifter Physical Unclonable Function Based EncryptionCryptography201812
40Further Observations on SIMON and SPECK Block Cipher FamiliesCryptography201912
41Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAMCryptography201912
42Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box ApproachCryptography202012
43Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based ApproachCryptography202112
44ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3Cryptography202212
45Garbled Quantum ComputationCryptography201711
46A Text-Independent Speaker Authentication System for Mobile DevicesCryptography201711
47New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoTCryptography201911
48A Survey on Group Signatures and Ring Signatures: Traceability vs. AnonymityCryptography202211
49A New Visual Multi-Secrets Sharing Scheme by Random GridsCryptography201810
50Security and Cryptographic Challenges for Authentication Based on Biometrics DataCryptography201810