Stop the war!
Остановите войну!
for scientists:
default search action
Journal of Cryptographic Engineering, Volume 14
Volume 14, Number 1, April 2024
- Felix Oberhansl, Tim Fritzmann, Thomas Pöppelmann, Debapriya Basu Roy, Georg Sigl:
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography. 1-18 - Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. 19-34 - Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton Bezerra Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos:
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures. 35-41 - Shiping Cai, Zhi Hu, Zheng-an Yao, Chang-An Zhao:
The elliptic net algorithm revisited. 43-55 - Cuiping Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang:
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit. 57-70 - Dúnia Marchiori, Ricardo Custódio, Daniel Panario, Lucia Moura:
Probabilistic root finding in code-based cryptography. 71-85 - Elif Ozbay Gurler, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 87-101 - Priyanka Joshi, Bodhisatwa Mazumdar:
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN. 103-125 - Dmitrii I. Koshelev:
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing. 127-128 - Fan Zhang:
Editorial about PROOFS 2021. 129 - Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Toward finding best linear codes for side-channel protections (extended version). 131-145 - Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. 147-164 - Tamon Asano, Takeshi Sugawara:
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version. 165-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.