default search action
Journal of Cryptographic Engineering, Volume 10
Volume 10, Number 1, April 2020
- Damien Jauvart, Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin:
Improving side-channel attacks against pairing-based cryptography. 1-16 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub:
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations. 17-26 - Rodrigo Abarzúa, Santi Martínez, Valeria Mendoza, Nicolas Thériault:
Same value analysis on Edwards curves. 27-48 - Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang:
How to reveal the secrets of an obscure white-box implementation. 49-66 - Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel, Peter W. Deutsch:
On the feasibility of deriving cryptographic keys from MEMS sensors. 67-83 - Yuanyuan Zhou, François-Xavier Standaert:
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. 85-95
Volume 10, Number 2, June 2020
- Joppe W. Bos, Simon Friedberger:
Faster modular arithmetic for isogeny-based crypto on embedded devices. 97-109 - Laurent-Stéphane Didier, Fangan-Yssouf Dosso, Pascal Véron:
Efficient modular operations using the adapted modular number system. 111-133 - Benjamin Hettwer, Stefan Gehrer, Tim Güneysu:
Applications of machine learning techniques in side-channel attacks: a survey. 135-162 - Ryad Benadjila, Emmanuel Prouff, Rémi Strullu, Eleonora Cagli, Cécile Dumas:
Deep learning for side-channel analysis and introduction to ASCAD database. 163-188 - Mohammad Ali Orumiehchiha, Saeed Rostami, Elham Shakour, Josef Pieprzyk:
A differential fault attack on the WG family of stream ciphers. 189-195
Volume 10, Number 3, September 2020
- Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo:
Polynomial multiplication over binary finite fields: new upper bounds. 197-210 - Rafael J. Cruz, Antonio Guimarães, Diego F. Aranha:
Efficient and secure software implementations of Fantomas. 211-228 - Matthias Hiller, Ludwig Kürzinger, Georg Sigl:
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs. 229-247 - Dimitrios Schoinianakis:
Residue arithmetic systems in cryptography: a survey on modern security applications. 249-267 - Andreas Wiemers:
A remark on a success rate model for side-channel attack analysis. 269-274 - Bastian Richter, Amir Moradi:
Template attacks on nano-scale CMOS devices. 275-285
Volume 10, Number 4, November 2020
- Lejla Batina, Nele Mentens:
PROOFS 2018 Editorial. 287 - Manaar Alam, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew-Kei Lam, Thambipillai Srikanthan:
Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization. 289-303 - Danilo Sijacic, Josep Balasch, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede:
Towards efficient and automated side-channel evaluations at design time. 305-319 - Mael Gay, Batya Karp, Osnat Keren, Ilia Polian:
Error control scheme for malicious and natural faults in cryptographic modules. 321-336 - Maamar Ouladj, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux:
On the power of template attacks in highly multivariate context. 337-354 - Anubhab Baksi, Dhiman Saha, Sumanta Sarkar:
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. 355-374
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.