Wednesday, July 19, 2023

[DMANET] [Cryptography] (ISSN 2410-387X, ESCI & Scopus indexed) Top Cited Papers in Volume 6

We are sharing with you some selected top cited papers published in the
open access journal /Cryptography/
(https://www.mdpi.com/journal/cryptography)
Volume 6, Issue 1, which are free to access and can be downloaded here:

1. Functional Encryption for Pattern Matching with a Hidden String
https://www.mdpi.com/2410-387X/6/1/1

2. Variations of QKD Protocols Based on Conventional System
Measurements: A Literature Review
https://www.mdpi.com/2410-387X/6/1/12

3. A Searchable Encryption Scheme with Biometric Authentication and
Authorization for Cloud Environments
https://www.mdpi.com/2410-387X/6/1/8

4. Designing a Practical Code-Based Signature Scheme from Zero-Knowledge
Proofs with Trusted Setup
https://www.mdpi.com/2410-387X/6/1/5

5. A Survey on Group Signatures and Ring Signatures: Traceability vs.
Anonymity
https://www.mdpi.com/2410-387X/6/1/3

See this full volume via https://www.mdpi.com/2410-387X/6.

Any questions about the journal Cryptography, please contact
cryptography@mdpi.com.

Best regards,
Xue Cheng
Managing Editor
--
MDPI Branch Office, Wuhan
Cryptography Editorial Office
https://www.mdpi.com/journal/cryptography
MDPI, St. Alban-Anlage 66, 4052 Basel, Switzerland

News: Cryptography Receives Its First Impact Factor of 1.6
https://www.mdpi.com/about/announcements/6138

Highly Cited Papers:
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
https://www.mdpi.com/2410-387X/6/3/34
Hardware Limitations of Lightweight Cryptographic Designs for IoT in
Healthcare
https://www.mdpi.com/2410-387X/6/3/45

Twitter: @Cryptogr_MDPI https://twitter.com/Cryptogr_MDPI
LinkedIn: Cryptography-MDPI

Disclaimer: The information and files contained in this message are
confidential and intended solely for the use of the individual or entity
to whom they are addressed. If you have received this message in error,
please notify me and delete this message from your system. You may not
copy this message in its entirety or in part, or disclose its contents
to anyone.
**********************************************************
*
* Contributions to be spread via DMANET are submitted to
*
* DMANET@zpr.uni-koeln.de
*
* Replies to a message carried on DMANET should NOT be
* addressed to DMANET but to the original sender. The
* original sender, however, is invited to prepare an
* update of the replies received and to communicate it
* via DMANET.
*
* DISCRETE MATHEMATICS AND ALGORITHMS NETWORK (DMANET)
* http://www.zaik.uni-koeln.de/AFS/publications/dmanet/
*
**********************************************************