22 August 2023
Cryptography | Top Cited Articles in 2022

1. “A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions”
by Keerthi Nelaturu, Han Du and Duc-Phong Le
Cryptography 2022, 6(2), 18; https://doi.org/10.3390/cryptography6020018
Full text available online: https://www.mdpi.com/2410-387X/6/2/18

2. “Benchmark Analysis of YOLO Performance on Edge Intelligence Devices”
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
Cryptography 2022, 6(2), 16; https://doi.org/10.3390/cryptography6020016
Full text available online: https://www.mdpi.com/2410-387X/6/2/16

3. “A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity”
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
Cryptography 2022, 6(1), 3; https://doi.org/10.3390/cryptography6010003
Full text available online: https://www.mdpi.com/2410-387X/6/1/3

4. “A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments”
by Marius Iulian Mihailescu and Stefania Loredana Nita
Cryptography 2022, 6(1), 8; https://doi.org/10.3390/cryptography6010008
Full text available online: https://www.mdpi.com/2410-387X/6/1/8

5. “Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review”
by Abdulbast A. Abushgra
Cryptography 2022, 6(1), 12; https://doi.org/10.3390/cryptography6010012
Full text available online: https://www.mdpi.com/2410-387X/6/1/12

6. “ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3”
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Cryptography 2022, 6(2), 30; https://doi.org/10.3390/cryptography6020030
Full text available online: https://www.mdpi.com/2410-387X/6/2/30

7. “Light Weight Authentication Scheme for Smart Home IoT Devices”
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
Cryptography 2022, 6(3), 37; https://doi.org/10.3390/cryptography6030037
Full text available online: https://www.mdpi.com/2410-387X/6/3/37

8. “Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup”
by Shay Gueron, Edoardo Persichetti and Paolo Santini
Cryptography 2022, 6(1), 5; https://doi.org/10.3390/cryptography6010005
Full text available online: https://www.mdpi.com/2410-387X/6/1/5

Back to TopTop