journal /Cryptography/ (https://www.mdpi.com/journal/cryptography)
Volume 6, Issue 4, which are free to access and can be downloaded here:
1. WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
https://www.mdpi.com/2410-387X/6/4/53
2. On Advances of Lattice-Based Cryptographic Schemes and Their
Implementations
https://www.mdpi.com/2410-387X/6/4/56
3. Physical Visitor Access Control and Authentication Using Blockchain,
Smart Contracts and Internet of Things
https://www.mdpi.com/2410-387X/6/4/65
4. Efficient RO-PUF for Generation of Identifiers and Keys in
Resource-Constrained Embedded Systems
https://www.mdpi.com/2410-387X/6/4/51
5. Post Quantum Design in SPDM for Device Authentication and Key
Establishment
https://www.mdpi.com/2410-387X/6/4/48
See this full volume via https://www.mdpi.com/2410-387X/6.
Any questions about the journal Cryptography, please contact
cryptography@mdpi.com.
Best regards,
Xue Cheng
Managing Editor
--
MDPI Branch Office, Wuhan
Cryptography Editorial Office
https://www.mdpi.com/journal/cryptography
MDPI, St. Alban-Anlage 66, 4052 Basel, Switzerland
News: Cryptography Receives Its First Impact Factor of 1.6
https://www.mdpi.com/about/announcements/6138
Highly Cited Papers:
Efficient RO-PUF for Generation of Identifiers and Keys in
Resource-Constrained Embedded Systems
https://www.mdpi.com/2410-387X/6/4/51
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
https://www.mdpi.com/2410-387X/6/4/53
Twitter: @Cryptogr_MDPI https://twitter.com/Cryptogr_MDPI
LinkedIn: Cryptography-MDPI
Disclaimer: The information and files contained in this message are
confidential and intended solely for the use of the individual or entity
to whom they are addressed. If you have received this message in error,
please notify me and delete this message from your system. You may not
copy this message in its entirety or in part, or disclose its contents
to anyone.
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************