
Cryptography MDPI
@Cryptogr_MDPI
Followers
313
Following
113
Media
500
Statuses
566
Cryptography (ISSN 2410-387X) is an #ESCI and #Scopus indexed #openaccess journal of #cryptography, published quarterly online by @MDPIOpenAccess.
Basel, Switzerland
Joined June 2020
๐ We are proud to announce that Cryptography has received a new Impact Factor of 2.1!. ๐ Explore more: @ComSciMath_Mdpi #ImpactFactor #OpenAccess
0
1
1
๐ New in Cryptography. "Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing" ๐๐. ๐ Read more: #DecentralizedTrust #DataOwnership #LivestockTech #FLEX @ComSciMath_Mdpi
0
0
1
๐ Highly Viewed Paper in Cryptography!. ๐ โWhispers from the Wristโ: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities. ๐ Read more: #HealthData #Privacy @ComSciMath_Mdpi
0
0
0
๐ We are proud to highlight one of our most downloaded papers in Cryptography:. โPost Quantum Design in SPDM for Device Authentication and Key Establishmentโ. ๐ Read more: #DeviceAuthentication #DeviceSecureSession @ComSciMath_Mdpi.
mdpi.com
The Security Protocol and Data Model (SPDM) defines a set of flows whose purpose includes the authentication of a computing deviceโs hardware identity. SPDM also allows for the creation of a secure...
0
0
1
๐ฅณ๐ฅณCongratulations for 30th Australasian Conference on Information Security and Privacy, Wollongong, Australia #ACISP2025. welcome to submit the extended version papers to our special issue:.
0
0
1
๐We are proud to highlight one of our most downloaded papers in Cryptography:. โA Survey of Post-Quantum Cryptography: Start of a New Raceโ. ๐ Read more: #PQC #SignatureSchemes @ComSciMath_Mdpi
0
0
1
๐ Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applicationsโก๐งฎ. ๐ Read the full paper: #MPC #VOLE #TensorTriple @ComSciMath_Mdpi.
mdpi.com
Over years of development in secure multi-party computation (MPC), many sophisticated functionalities have been made practical, and multi-dimensional operations occur more and more frequently in MPC...
0
0
0
๐ New Research from Cryptography!. ๐ Image Encryption with Dual Watermark Based on Chaotic Map. ๐ Dive into the full study: @ComSciMath_Mdpi #DualWatermark #ChaoticMap #ImageEncryption
0
0
1
๐ Highly cited paper from Cryptography!. Connected Blockchain Federations for Sharing Electronic Health Records. ๐ Read now: @ComSciMath_Mdpi #BlockchainIntegration #SmartContracts
0
0
0
๐ New Article Published in Cryptography. ๐ Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems. ๐ Read the full article: @ComSciMath_Mdpi #IntegerMultiplication #ModularReduction.
mdpi.com
Modular multiplication is a pivotal operation in public-key cryptosystems such as RSA, ElGamal, and ECC. Modular multiplication design is crucial for improving overall system performance due to the...
0
0
0
RT @Entropy_MDPI: Excited to be at the 2025 IEEE International Symposium on Information Theory (#ISIT2025) as an exhibitor! . Welcome to stโฆ.
0
1
0
๐ New Paper Published in Cryptography! ๐ง ๐. ๐ Title: Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems. ๐ Read more: @ComSciMath_Mdpi #PrimeFields #IntegerMultiplication #ModularReduction.
mdpi.com
Modular multiplication is a pivotal operation in public-key cryptosystems such as RSA, ElGamal, and ECC. Modular multiplication design is crucial for improving overall system performance due to the...
0
0
0
๐ Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis. ๐ Read the full paper: @ComSciMath_Mdpi #OutsourcedDatabases #HPC #FHE.
mdpi.com
We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes cipherte...
0
0
0
๐ New Research in Cryptography. An Improved Attack on the RSA Variant Based on Cubic Pell Equation. ๐ Read more: #Factorization #CoppersmithMethod.
mdpi.com
In this paper, we present a novel method to solve trivariate polynomial modular equations of the form x(y2+Ay+B)+zโก0ย (modย e). Our approach integrates Coppersmithโs method with lattice basis reduction...
0
0
0
๐ New Research from Cryptography. ๐๐ป Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem. Read the full study here: @ComSciMath_Mdpi #SpanProgram #IoV
0
0
1
๐ New Research Published in Cryptography Journal. Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations. ๐ Read the full article here: @ComSciMath_Mdpi #SecurityAnalysis #PerfomanceAnalysis
0
0
0
๐ Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers. ๐ Read the full paper: @ComSciMath_Mdpi #SmartCities #EdgeComputing #IoT
0
0
0
Reliability Improvement of 28 nm Intel FPGA Ring Oscillator PUF for Chip Identification. ๐ Read more: @ComSciMath_Mdpi #ChipIdentification #FPGA #ReliabilityImprovement
0
0
1