Cryptogr_MDPI Profile Banner
Cryptography MDPI Profile
Cryptography MDPI

@Cryptogr_MDPI

Followers
313
Following
113
Media
500
Statuses
566

Cryptography (ISSN 2410-387X) is an #ESCI and #Scopus indexed #openaccess journal of #cryptography, published quarterly online by @MDPIOpenAccess.

Basel, Switzerland
Joined June 2020
Don't wanna be here? Send us removal request.
@Cryptogr_MDPI
Cryptography MDPI
1 month
๐ŸŽ‰ We are proud to announce that Cryptography has received a new Impact Factor of 2.1!. ๐Ÿ”— Explore more: @ComSciMath_Mdpi #ImpactFactor #OpenAccess
Tweet media one
0
1
1
@Cryptogr_MDPI
Cryptography MDPI
15 hours
๐Ÿ”’ New in Cryptography. "Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing" ๐Ÿ„๐Ÿ“Š. ๐Ÿ“– Read more: #DecentralizedTrust #DataOwnership #LivestockTech #FLEX @ComSciMath_Mdpi
Tweet media one
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
3 days
๐Ÿ”’ Highly Viewed Paper in Cryptography!. ๐Ÿ“„ โ€œWhispers from the Wristโ€: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities. ๐Ÿ‘‰ Read more: #HealthData #Privacy @ComSciMath_Mdpi
Tweet media one
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
7 days
๐Ÿ” We are proud to highlight one of our most downloaded papers in Cryptography:. โ€œPost Quantum Design in SPDM for Device Authentication and Key Establishmentโ€. ๐Ÿ”— Read more: #DeviceAuthentication #DeviceSecureSession @ComSciMath_Mdpi.
Tweet card summary image
mdpi.com
The Security Protocol and Data Model (SPDM) defines a set of flows whose purpose includes the authentication of a computing deviceโ€™s hardware identity. SPDM also allows for the creation of a secure...
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
7 days
๐Ÿฅณ๐ŸฅณCongratulations for 30th Australasian Conference on Information Security and Privacy, Wollongong, Australia #ACISP2025. welcome to submit the extended version papers to our special issue:.
Tweet media one
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
14 days
๐Ÿ”We are proud to highlight one of our most downloaded papers in Cryptography:. โ€œA Survey of Post-Quantum Cryptography: Start of a New Raceโ€. ๐Ÿ”— Read more: #PQC #SignatureSchemes @ComSciMath_Mdpi
Tweet media one
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
16 days
๐Ÿ”’ Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applicationsโšก๐Ÿงฎ. ๐Ÿ“– Read the full paper: #MPC #VOLE #TensorTriple @ComSciMath_Mdpi.
Tweet card summary image
mdpi.com
Over years of development in secure multi-party computation (MPC), many sophisticated functionalities have been made practical, and multi-dimensional operations occur more and more frequently in MPC...
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
21 days
๐Ÿš€ New Research from Cryptography!. ๐Ÿ”’ Image Encryption with Dual Watermark Based on Chaotic Map. ๐Ÿ” Dive into the full study: @ComSciMath_Mdpi #DualWatermark #ChaoticMap #ImageEncryption
Tweet media one
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
23 days
๐Ÿš€ Highly cited paper from Cryptography!. Connected Blockchain Federations for Sharing Electronic Health Records. ๐Ÿ“– Read now: @ComSciMath_Mdpi #BlockchainIntegration #SmartContracts
Tweet media one
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
24 days
๐Ÿง  New Research Published in Cryptography. ๐Ÿ“„ Title: Generation of Affine-Shifted S-Boxes with Constant Confusion Coefficient Variance and Application in the Partitioning of the S-Box Space. ๐Ÿ“– Read the full article:
Tweet media one
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
28 days
๐Ÿ” New Article Published in Cryptography. ๐Ÿ“˜ Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems. ๐Ÿ“– Read the full article: @ComSciMath_Mdpi #IntegerMultiplication #ModularReduction.
Tweet card summary image
mdpi.com
Modular multiplication is a pivotal operation in public-key cryptosystems such as RSA, ElGamal, and ECC. Modular multiplication design is crucial for improving overall system performance due to the...
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
30 days
RT @Entropy_MDPI: Excited to be at the 2025 IEEE International Symposium on Information Theory (#ISIT2025) as an exhibitor! . Welcome to stโ€ฆ.
0
1
0
@Cryptogr_MDPI
Cryptography MDPI
1 month
๐Ÿ” New Paper Published in Cryptography! ๐Ÿง ๐Ÿ“˜. ๐Ÿ“ Title: Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems. ๐Ÿ‘‰ Read more: @ComSciMath_Mdpi #PrimeFields #IntegerMultiplication #ModularReduction.
Tweet card summary image
mdpi.com
Modular multiplication is a pivotal operation in public-key cryptosystems such as RSA, ElGamal, and ECC. Modular multiplication design is crucial for improving overall system performance due to the...
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
1 month
๐Ÿ” Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis. ๐Ÿ“„ Read the full paper: @ComSciMath_Mdpi #OutsourcedDatabases #HPC #FHE.
Tweet card summary image
mdpi.com
We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes cipherte...
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
1 month
๐Ÿ”’ New Research from Cryptography. ๐Ÿš—๐Ÿ’ป Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem. Read the full study here: @ComSciMath_Mdpi #SpanProgram #IoV
Tweet media one
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
2 months
๐ŸŽ‰๐ŸŽ‰Cryptography has received an increased CiteScore of 5.0 in the latest ranking! . Q1 (93 out of 665) in "Applied Mathematics".Q1 (44 out of 197) in "Computational Theory and Mathematics".Q2 (171 out of 507) in "Computer Networks and Communications" .
Tweet media one
0
0
1
@Cryptogr_MDPI
Cryptography MDPI
2 months
๐Ÿ” New Research Published in Cryptography Journal. Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations. ๐Ÿ“– Read the full article here: @ComSciMath_Mdpi #SecurityAnalysis #PerfomanceAnalysis
Tweet media one
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
2 months
๐Ÿ” Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers. ๐Ÿ”Ž Read the full paper: @ComSciMath_Mdpi #SmartCities #EdgeComputing #IoT
Tweet media one
0
0
0
@Cryptogr_MDPI
Cryptography MDPI
2 months
Reliability Improvement of 28 nm Intel FPGA Ring Oscillator PUF for Chip Identification. ๐Ÿ”— Read more: @ComSciMath_Mdpi #ChipIdentification #FPGA #ReliabilityImprovement
Tweet media one
0
0
1