default search action
Journal of Cryptographic Engineering, Volume 8
Volume 8, Number 1, April 2018
- Qian Ge, Yuval Yarom, David A. Cock, Gernot Heiser:
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. 1-27 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:
TriviA and uTriviA: two fast and secure authenticated encryption schemes. 29-48 - Debrup Chakraborty, Cuauhtemoc Mancillas López, Palash Sarkar:
Disk encryption: do we need to preserve length? 49-69 - Markku-Juhani O. Saarinen:
Arithmetic coding and blinding countermeasures for lattice signatures - Engineering a side-channel resistant post-quantum signature scheme with compact signatures. 71-84 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny:
Regulating the pace of von Neumann correctors. 85-91
Volume 8, Number 2, June 2018
- Wieland Fischer, Naofumi Homma:
Introduction to the CHES 2017 special issue. 93-94 - Tung Chou:
McBits revisited: toward a fast constant-time code-based KEM. 95-107 - Hannes Groß, Stefan Mangard:
A unified masking approach. 109-124 - Vincent Immler, Robert Specht, Florian Unterstein:
Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs - extended version. 125-139 - George Hatzivasilis, Konstantinos Fysarakis, Ioannis Papaefstathiou, Charalampos Manifavas:
A review of lightweight block ciphers. 141-184
Volume 8, Number 3, September 2018
- Francisco Rodríguez-Henríquez, Erkay Savas:
Special issue in honor of Peter Lawrence Montgomery. 185-187 - Jean-Claude Bajard, Julien Eynard, Nabil Merkiche:
Montgomery reduction within the context of residue number system arithmetic. 189-200 - Erkay Savas, Çetin Kaya Koç:
Montgomery inversion. 201-210 - Wangchen Dai, Ray C. C. Cheung:
Spectral arithmetic in Montgomery modular multiplication. 211-226 - Craig Costello, Benjamin Smith:
Montgomery curves and their arithmetic - The case of large characteristic fields. 227-240 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:
The Montgomery ladder on binary elliptic curves. 241-258 - Murat Cenk:
Karatsuba-like formulae and their associated techniques. 259-269
Volume 8, Number 4, November 2018
- Luckas A. Farias, Bruno C. Albertini, Paulo S. L. M. Barreto:
A class of safe and efficient binary Edwards curves. 271-283 - Kimmo Järvinen, Sujoy Sinha Roy, Ingrid Verbauwhede:
Arithmetic of $$\tau $$ τ -adic expansions for lightweight Koblitz curve cryptography. 285-300 - Liran Lerman, Romain Poussier, Olivier Markowitch, François-Xavier Standaert:
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version. 301-313 - John DeVale, Ryan N. Rakvic, Kevin Rudd:
Another dimension in integrated circuit trust. 315-326 - Sandip Karmakar, Dipanwita Roy Chowdhury:
Scan-based side channel attack on stream ciphers and its prevention. 327-340 - Boris Skoric:
A trivial debiasing scheme for Helper Data Systems. 341-349 - Fangan-Yssouf Dosso, Fabien Herbaut, Nicolas Méloni, Pascal Véron:
Euclidean addition chains scalar multiplication on curves with efficient endomorphism. 351-367
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.