default search action
Journal of Cryptographic Engineering, Volume 13
Volume 13, Number 1, April 2023
- Andreas Wiemers, Johannes Mittmann:
Improving recent side-channel attacks against the DES key schedule. 1-17 - Ihsan Çiçek, Ahmad Alkhas:
A new read-write collision-based SRAM PUF implemented on Xilinx FPGAs. 19-36 - Jean-Marc Robert, Pascal Véron:
Faster multiplication over ${\mathbb {F}}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction. 37-55 - Vidal Attias, Luigi Vigneri, Vassil S. Dimitrov:
Rethinking modular multi-exponentiation in real-world applications. 57-70 - Alexandre Augusto Giron, Ricardo Custódio, Francisco Rodríguez-Henríquez:
Post-quantum hybrid key exchange: a systematic mapping study. 71-88 - Gora Adj, Jesús-Javier Chi-Domínguez, Francisco Rodríguez-Henríquez:
Karatsuba-based square-root Vélu's formulas applied to two isogeny-based protocols. 89-106 - Pradeep Kumar Goud Nadikuda, Lakshmi Boppana:
Low area-time complexity point multiplication architecture for ECC over GF(2rmm) using polynomial basis. 107-123 - Dmitrii I. Koshelev:
Subgroup membership testing on elliptic curves via the Tate pairing. 125-128
Volume 13, Number 2, June 2023
- Loïc Masure, Rémi Strullu:
Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning. 129-147 - Vincent Werner, Laurent Maingault, Marie-Laure Potet:
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. 149-165 - Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen:
Streamlined NTRU Prime on FPGA. 167-186 - Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture. 187-199 - Priyanka Joshi, Bodhisatwa Mazumdar:
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox. 201-222 - Yaxin Cui, Hong Xu, Lin Tan, Huajin Chen, Wenfeng Qi:
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64. 223-234 - Elena Almaraz Luengo, Bittor Alaña Olivares, Luis Javier García-Villalba, Julio Hernandez-Castro, Darren Hurley-Smith:
StringENT test suite: ENT battery revisited for efficient P value computation. 235-249 - Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, Naofumi Homma:
Homomorphic encryption for stochastic computing. 251-263
Volume 13, Number 3, September 2023
- Iftekhar Salam, Wei-Chuen Yau, Raphaël C.-W. Phan, Josef Pieprzyk:
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. 265-281 - Jason T. LeGrow:
A faster method for fault attack resistance in static/ephemeral CSIDH. 283-294 - Pedro Geraldo M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha:
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference. 295-310 - Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. 311-324 - Dor Salomon, Itamar Levi:
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case. 325-342 - Hamed Arshad, Pablo Picazo-Sanchez, Christian Johansen, Gerardo Schneider:
Attribute-based encryption with enforceable obligations. 343-371 - Jean-Claude Bajard, Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth:
Fast verification and public key storage optimization for unstructured lattice-based signatures. 373-388
Volume 13, Number 4, November 2023
- Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, Ulrich Rührmair:
The ASHES 2021 special issue at JCEN. 389-390 - Calvin Deutschbein, Andres Meza, Francesco Restuccia, Ryan Kastner, Cynthia Sturton:
Isadora: automated information-flow property generation for hardware security verification. 391-407 - Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine:
Spatial dependency analysis to extract information from side-channel mixtures: extended version. 409-425 - Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino:
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM. 427-442 - Kalle Ngo, Elena Dubrova, Thomas Johansson:
A side-channel attack on a masked and shuffled software implementation of Saber. 443-460 - Malik Imran, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini:
High-speed SABER key encapsulation mechanism in 65nm CMOS. 461-471 - Rony Komissarov, Sharon Vaisman, Avishai Wool:
Spoofing attacks against vehicular FMCW radar. 473-484 - Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik:
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version). 485-499
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.