![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Cryptographic Engineering, Volume 13
Volume 13, Number 1, April 2023
- Andreas Wiemers
, Johannes Mittmann
:
Improving recent side-channel attacks against the DES key schedule. 1-17 - Ihsan Çiçek
, Ahmad Alkhas
:
A new read-write collision-based SRAM PUF implemented on Xilinx FPGAs. 19-36 - Jean-Marc Robert, Pascal Véron:
Faster multiplication over ${\mathbb {F}}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction. 37-55 - Vidal Attias
, Luigi Vigneri, Vassil S. Dimitrov:
Rethinking modular multi-exponentiation in real-world applications. 57-70 - Alexandre Augusto Giron
, Ricardo Custódio, Francisco Rodríguez-Henríquez:
Post-quantum hybrid key exchange: a systematic mapping study. 71-88 - Gora Adj, Jesús-Javier Chi-Domínguez
, Francisco Rodríguez-Henríquez:
Karatsuba-based square-root Vélu's formulas applied to two isogeny-based protocols. 89-106 - Pradeep Kumar Goud Nadikuda
, Lakshmi Boppana:
Low area-time complexity point multiplication architecture for ECC over GF(2rmm) using polynomial basis. 107-123 - Dmitrii I. Koshelev
:
Subgroup membership testing on elliptic curves via the Tate pairing. 125-128
Volume 13, Number 2, June 2023
- Loïc Masure, Rémi Strullu:
Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning. 129-147 - Vincent Werner, Laurent Maingault, Marie-Laure Potet:
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. 149-165 - Bo-Yuan Peng
, Adrian Marotzke
, Ming-Han Tsai, Bo-Yin Yang
, Ho-Lin Chen:
Streamlined NTRU Prime on FPGA. 167-186 - Sumit Kumar Debnath, Sihem Mesnager
, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture. 187-199 - Priyanka Joshi
, Bodhisatwa Mazumdar:
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox. 201-222 - Yaxin Cui, Hong Xu, Lin Tan, Huajin Chen, Wenfeng Qi:
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64. 223-234 - Elena Almaraz Luengo
, Bittor Alaña Olivares, Luis Javier García-Villalba
, Julio Hernandez-Castro, Darren Hurley-Smith:
StringENT test suite: ENT battery revisited for efficient P value computation. 235-249 - Ryusuke Koseki, Akira Ito, Rei Ueno
, Mehdi Tibouchi, Naofumi Homma
:
Homomorphic encryption for stochastic computing. 251-263
Volume 13, Number 3, September 2023
- Iftekhar Salam
, Wei-Chuen Yau
, Raphaël C.-W. Phan, Josef Pieprzyk
:
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128. 265-281 - Jason T. LeGrow
:
A faster method for fault attack resistance in static/ephemeral CSIDH. 283-294 - Pedro Geraldo M. R. Alves
, Jheyne N. Ortiz
, Diego F. Aranha
:
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference. 295-310 - Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek
:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. 311-324 - Dor Salomon, Itamar Levi
:
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case. 325-342 - Hamed Arshad
, Pablo Picazo-Sanchez
, Christian Johansen
, Gerardo Schneider
:
Attribute-based encryption with enforceable obligations. 343-371 - Jean-Claude Bajard
, Kazuhide Fukushima
, Thomas Plantard
, Arnaud Sipasseuth
:
Fast verification and public key storage optimization for unstructured lattice-based signatures. 373-388
Volume 13, Number 4, November 2023
- Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, Ulrich Rührmair:
The ASHES 2021 special issue at JCEN. 389-390 - Calvin Deutschbein
, Andres Meza, Francesco Restuccia, Ryan Kastner, Cynthia Sturton:
Isadora: automated information-flow property generation for hardware security verification. 391-407 - Aurélien Vasselle
, Hugues Thiebeauld
, Philippe Maurine
:
Spatial dependency analysis to extract information from side-channel mixtures: extended version. 409-425 - Kunihiro Kuroda
, Yuta Fukuda, Kota Yoshida, Takeshi Fujino:
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM. 427-442 - Kalle Ngo
, Elena Dubrova, Thomas Johansson
:
A side-channel attack on a masked and shuffled software implementation of Saber. 443-460 - Malik Imran
, Felipe Almeida, Andrea Basso, Sujoy Sinha Roy, Samuel Pagliarini
:
High-speed SABER key encapsulation mechanism in 65nm CMOS. 461-471 - Rony Komissarov, Sharon Vaisman, Avishai Wool
:
Spoofing attacks against vehicular FMCW radar. 473-484 - Thilo Krachenfels
, Jean-Pierre Seifert, Shahin Tajik:
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version). 485-499
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.