About
Technology
Issues
FAQ
Search
Scientometrics
Impact Factor
Discipline Ranks
h
-index
g
-index
Articles
Citations
Article Citations
Citation Distribution
Overviews
Top Institutions
Top Schools
Top Authors
Prolific Authors
Top Articles
Citing Bodies
Top Citing Authors
Top Citing Institutions
Top Citing Schools
Top Citing Journals
Top Citing Disciplines
exaly
›
Journals
›
Cryptography
›
top-articles
Cryptography
1.9
(top 20%)
impact factor
311
(top 50%)
papers
2.0K
(top 50%)
citations
18
(top 50%)
h
-index
1.9
(top 20%)
extended IF
319
all documents
2.1K
doc citations
36
(top 20%)
g
-index
Top Articles
#
Title
Journal
Year
Citations
1
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
Cryptography
2019
303
2
Multi-Factor Authentication: A Survey
Cryptography
2018
194
3
Provably Secure Covert Communication on Blockchain
Cryptography
2018
66
4
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
Cryptography
2020
65
5
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication
Cryptography
2020
46
6
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
Cryptography
2017
43
7
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
Cryptography
2017
40
8
Multiparty Delegated Quantum Computing
Cryptography
2017
33
9
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions
Cryptography
2017
32
10
A Taxonomy of Blockchain Consensus Methods
Cryptography
2020
32
11
An Enhanced Key Management Scheme for LoRaWAN
Cryptography
2018
29
12
Can Ternary Computing Improve Information Assurance?
Cryptography
2018
29
13
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
Cryptography
2022
25
14
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes
Cryptography
2019
24
15
An Overview of DRAM-Based Security Primitives
Cryptography
2018
19
16
A Simple Protocol for Certifying Graph States and Applications in Quantum Networks
Cryptography
2020
19
17
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
Cryptography
2021
19
18
Analysis of Entropy in a Hardware-Embedded Delay PUF
Cryptography
2017
18
19
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
Cryptography
2017
18
20
Password-Hashing Status
Cryptography
2017
18
21
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
Cryptography
2018
18
22
A Novel Ultra-Compact FPGA PUF: The DD-PUF
Cryptography
2021
18
23
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
Cryptography
2018
17
24
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
Cryptography
2022
16
25
Light Weight Authentication Scheme for Smart Home IoT Devices
Cryptography
2022
16
26
Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols
Cryptography
2017
15
27
Privacy Protection in Real Time HEVC Standard Using Chaotic System
Cryptography
2020
15
28
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
Cryptography
2022
15
29
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
Cryptography
2022
15
30
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †
Cryptography
2018
14
31
Security Analysis of Lightweight IoT Cipher: Chaskey
Cryptography
2020
14
32
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
Cryptography
2021
14
33
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
Cryptography
2022
14
34
Synchronization in Quantum Key Distribution Systems
Cryptography
2017
13
35
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
Cryptography
2018
13
36
ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation
Cryptography
2018
13
37
Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)
Cryptography
2019
13
38
New Cryptanalytic Attack on RSA Modulus N=pq Using Small Prime Difference Method
Cryptography
2019
13
39
Barrel Shifter Physical Unclonable Function Based Encryption
Cryptography
2018
12
40
Further Observations on SIMON and SPECK Block Cipher Families
Cryptography
2019
12
41
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
Cryptography
2019
12
42
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
Cryptography
2020
12
43
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
Cryptography
2021
12
44
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
Cryptography
2022
12
45
Garbled Quantum Computation
Cryptography
2017
11
46
A Text-Independent Speaker Authentication System for Mobile Devices
Cryptography
2017
11
47
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT
Cryptography
2019
11
48
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
Cryptography
2022
11
49
A New Visual Multi-Secrets Sharing Scheme by Random Grids
Cryptography
2018
10
50
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Cryptography
2018
10
site/software ©
exaly
; All materials licenced under
CC by-SA
.