journal /Cryptography/ (https://www.mdpi.com/journal/cryptography)
Volume 8, Issue 3, which are free to access and can be downloaded here:
1. Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel
Convolutional Neural Network and Known Plaintext Attack
https://www.mdpi.com/2410-387X/8/3/41
2. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
https://www.mdpi.com/2410-387X/8/3/40
3. Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical
Unclonable Functions
https://www.mdpi.com/2410-387X/8/3/32
4. Improve Parallel Resistance of Hashcash Tree
https://www.mdpi.com/2410-387X/8/3/30
5. Natural Language Processing for Hardware Security: Case of Hardware
Trojan Detection in FPGAs
https://www.mdpi.com/2410-387X/8/3/36
See this full volume via https://www.mdpi.com/2410-387X/8.
Additionally, we welcome your submissions if you have relevant papers to
be submitted. Please contact the journal editorial office
cryptography@mdpi.com.
Best regards,
Xue Cheng
Managing Editor
--
MDPI Branch Office, Wuhan
Cryptography Editorial Office
https://www.mdpi.com/journal/cryptography
MDPI, Grosspeteranlage 5, 4052 Basel, Switzerland
News: Cryptography Receives an Updated Impact Factor of 1.8
https://www.mdpi.com/journal/cryptography/announcements/8769
Twitter: @Cryptogr_MDPI https://twitter.com/Cryptogr_MDPI
LinkedIn: Cryptography-MDPI
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************