


default search action
Journal of Cryptographic Engineering, Volume 1
Volume 1, Number 1, April 2011
- Çetin Kaya Koç

:
Introduction to the Journal of Cryptographic Engineering. 1-3 - Paul C. Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi:

Introduction to differential power analysis. 5-27 - H. Gregor Molter

, Marc Stöttinger
, Abdulhadi Shoufan
, Falko Strenzke:
A simple power analysis attack on a McEliece cryptoprocessor. 29-36 - Tim Güneysu

:
Utilizing hard cores of modern FPGA devices for high-performance cryptography. 37-55 - Agustin Dominguez-Oviedo, M. Anwar Hasan:

Algorithm-level error detection for Montgomery ladder-based ECSM. 57-69 - Sergei Skorobogatov:

Synchronization method for SCA and fault attacks. 71-77 - Cédric Hocquet, Dina Kamel, Francesco Regazzoni

, Jean-Didier Legat, Denis Flandre
, David Bol, François-Xavier Standaert
:
Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags. 79-86
Volume 1, Number 2, August 2011
- Carlos Moreno, M. Anwar Hasan:

SPA-resistant binary exponentiation with optimal execution time. 87-99 - Jean-Luc Beuchat

, Eiji Okamoto, Teppei Yamazaki:
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO. 101-121 - Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert

:
Univariate side channel attacks and leakage modeling. 123-144 - Carolyn Whitnall, Elisabeth Oswald:

A fair evaluation framework for comparing side-channel distinguishers. 145-160 - Raveen R. Goundar, Marc Joye, Atsuko Miyaji

, Matthieu Rivain, Alexandre Venelli:
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic. 161-176
Volume 1, Number 3, November 2011
- Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen

, Christian Wachsmann:
Recyclable PUFs: logically reconfigurable PUFs. 177-186 - Jonathan Taverne, Armando Faz-Hernández

, Diego F. Aranha
, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López:
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction. 187-199 - Nicolas Méloni, Christophe Nègre, M. Anwar Hasan:

High performance GHASH and impacts of a class of unconventional bases. 201-218 - Michael Tunstall

:
Practical complexity differential cryptanalysis and fault analysis of AES. 219-230 - Marcel Medwed, François-Xavier Standaert

:
Extractors against side-channel attacks: weak or strong? 231-241 - Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi

:
Modulus fault attacks against RSA-CRT signatures. 243-253
Volume 1, Number 4, December 2011
- Markus Dichtl:

A new method of black box power analysis and a fast algorithm for optimal key search. 255-264 - Sho Endo, Takeshi Sugawara

, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
An on-chip glitchy-clock generator for testing fault injection attacks. 265-270 - Roberto Avanzi, Simon Hoerder

, Dan Page, Michael Tunstall
:
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. 271-281 - Falko Strenzke:

Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties. 283-292 - Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede

, Joos Vandewalle:
Machine learning in side-channel analysis: a first study. 293-302 - Alexander Lux, Artem Starostin:

A tool for static detection of timing channels in Java. 303-313

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














