[Cryptography] (IF 2.1, CiteScore 5.0) Top Cited Papers in Volume 8

cryptography cryptography at mdpi.com
Mon Sep 8 00:08:53 EDT 2025


We are sharing with you some top cited papers published in the open
access journal /Cryptography/ (https://www.mdpi.com/journal/cryptography)
Volume 8, which are free to access and can be downloaded here:

1. Securing Data Exchange with Elliptic Curve Cryptography: A Novel
Hash-Based Method for Message Mapping and Integrity Assurance
https://www.mdpi.com/2410-387X/8/2/23

2. Threats, Attacks, and Cryptography Frameworks of Cybersecurity in
Critical Infrastructures
https://www.mdpi.com/2410-387X/8/1/7

3. Constrained Device Performance Benchmarking with the Implementation
of Post-Quantum Cryptography
https://www.mdpi.com/2410-387X/8/2/21

4. Enhancing Smart Communication Security: A Novel Cost Function for
Efficient S-Box Generation in Symmetric Key Cryptography
https://www.mdpi.com/2410-387X/8/2/17

5. A Survey of Consortium Blockchain and Its Applications
https://www.mdpi.com/2410-387X/8/2/12

See this full volume via https://www.mdpi.com/2410-387X/8.

Additionally, we welcome your submissions if you have relevant papers to
be submitted. Please contact the journal editorial office 
cryptography at mdpi.com.

Best regards,
Xue Cheng
Managing Editor
-- 
MDPI Branch Office, Wuhan
Cryptography Editorial Office
https://www.mdpi.com/journal/cryptography
MDPI, Grosspeteranlage 5, 4052 Basel, Switzerland

Twitter: @Cryptogr_MDPI https://twitter.com/Cryptogr_MDPI
LinkedIn: Cryptography-MDPI


More information about the cryptography mailing list