Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/jce:"
@article{DBLP:journals/jce/AdjCR23, author = {Gora Adj and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Karatsuba-based square-root V{\'{e}}lu's formulas applied to two isogeny-based protocols}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {89--106}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00293-y}, doi = {10.1007/S13389-022-00293-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AdjCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AlvesOA23, author = {Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha}, title = {Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {295--310}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00325-1}, doi = {10.1007/S13389-023-00325-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AlvesOA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ArshadPJS23, author = {Hamed Arshad and Pablo Picazo{-}Sanchez and Christian Johansen and Gerardo Schneider}, title = {Attribute-based encryption with enforceable obligations}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {343--371}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00317-1}, doi = {10.1007/S13389-023-00317-1}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ArshadPJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AttiasVD23, author = {Vidal Attias and Luigi Vigneri and Vassil S. Dimitrov}, title = {Rethinking modular multi-exponentiation in real-world applications}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {57--70}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00287-w}, doi = {10.1007/S13389-022-00287-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AttiasVD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BajardFPS23, author = {Jean{-}Claude Bajard and Kazuhide Fukushima and Thomas Plantard and Arnaud Sipasseuth}, title = {Fast verification and public key storage optimization for unstructured lattice-based signatures}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {373--388}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00309-1}, doi = {10.1007/S13389-023-00309-1}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BajardFPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChangKMR23, author = {Chip{-}Hong Chang and Stefan Katzenbeisser and Debdeep Mukhopadhyay and Ulrich R{\"{u}}hrmair}, title = {The {ASHES} 2021 special issue at {JCEN}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {389--390}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00338-w}, doi = {10.1007/S13389-023-00338-W}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/ChangKMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CicekA23, author = {Ihsan {\c{C}}i{\c{c}}ek and Ahmad Alkhas}, title = {A new read-write collision-based {SRAM} {PUF} implemented on Xilinx FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {19--36}, year = {2023}, url = {https://doi.org/10.1007/s13389-021-00281-8}, doi = {10.1007/S13389-021-00281-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CicekA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CuiXTCQ23, author = {Yaxin Cui and Hong Xu and Lin Tan and Huajin Chen and Wenfeng Qi}, title = {Construction of equivalent linear trails and multiple linear attack on reduced-round {GIFT-64}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {223--234}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00298-7}, doi = {10.1007/S13389-022-00298-7}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/CuiXTCQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DebnathMSPK23, author = {Sumit Kumar Debnath and Sihem Mesnager and Vikas Srivastava and Saibal Kumar Pal and Nibedita Kundu}, title = {Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based {NDN} architecture}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {187--199}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00308-8}, doi = {10.1007/S13389-022-00308-8}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DebnathMSPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DeutschbeinMRKS23, author = {Calvin Deutschbein and Andres Meza and Francesco Restuccia and Ryan Kastner and Cynthia Sturton}, title = {Isadora: automated information-flow property generation for hardware security verification}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {391--407}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00306-w}, doi = {10.1007/S13389-022-00306-W}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DeutschbeinMRKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GironCR23, author = {Alexandre Augusto Giron and Ricardo Cust{\'{o}}dio and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Post-quantum hybrid key exchange: a systematic mapping study}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {71--88}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00288-9}, doi = {10.1007/S13389-022-00288-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GironCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ImranABRP23, author = {Malik Imran and Felipe Almeida and Andrea Basso and Sujoy Sinha Roy and Samuel Pagliarini}, title = {High-speed {SABER} key encapsulation mechanism in 65nm {CMOS}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {461--471}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00316-2}, doi = {10.1007/S13389-023-00316-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/ImranABRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JoshiM23, author = {Priyanka Joshi and Bodhisatwa Mazumdar}, title = {{SPSA:} Semi-Permanent Stuck-At fault analysis of {AES} Rijndael SBox}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {201--222}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00301-1}, doi = {10.1007/S13389-022-00301-1}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JoshiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KerkhofWPP23, author = {Maikel Kerkhof and Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {311--324}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00320-6}, doi = {10.1007/S13389-023-00320-6}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KerkhofWPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KomissarovVW23, author = {Rony Komissarov and Sharon Vaisman and Avishai Wool}, title = {Spoofing attacks against vehicular {FMCW} radar}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {473--484}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00321-5}, doi = {10.1007/S13389-023-00321-5}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KomissarovVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KosekiIUTH23, author = {Ryusuke Koseki and Akira Ito and Rei Ueno and Mehdi Tibouchi and Naofumi Homma}, title = {Homomorphic encryption for stochastic computing}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {251--263}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00299-6}, doi = {10.1007/S13389-022-00299-6}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KosekiIUTH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Koshelev23, author = {Dmitrii I. Koshelev}, title = {Subgroup membership testing on elliptic curves via the Tate pairing}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {125--128}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00296-9}, doi = {10.1007/S13389-022-00296-9}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/Koshelev23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KrachenfelsST23, author = {Thilo Krachenfels and Jean{-}Pierre Seifert and Shahin Tajik}, title = {Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {485--499}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00323-3}, doi = {10.1007/S13389-023-00323-3}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KrachenfelsST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KurodaFYF23, author = {Kunihiro Kuroda and Yuta Fukuda and Kota Yoshida and Takeshi Fujino}, title = {Practical aspects on non-profiled deep-learning side-channel attacks against {AES} software implementation with two types of masking countermeasures including {RSM}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {427--442}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00312-6}, doi = {10.1007/S13389-023-00312-6}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KurodaFYF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LeGrow23, author = {Jason T. LeGrow}, title = {A faster method for fault attack resistance in static/ephemeral {CSIDH}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {283--294}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00318-0}, doi = {10.1007/S13389-023-00318-0}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LeGrow23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LuengoOGHH23, author = {Elena Almaraz Luengo and Bittor Ala{\~{n}}a Olivares and Luis Javier Garc{\'{\i}}a{-}Villalba and Julio Hernandez{-}Castro and Darren Hurley{-}Smith}, title = {StringENT test suite: {ENT} battery revisited for efficient {P} value computation}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {235--249}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00313-5}, doi = {10.1007/S13389-023-00313-5}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LuengoOGHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MasureS23, author = {Lo{\"{\i}}c Masure and R{\'{e}}mi Strullu}, title = {Side-channel analysis against ANSSI's protected {AES} implementation on {ARM:} end-to-end attacks with multi-task learning}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {129--147}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00311-7}, doi = {10.1007/S13389-023-00311-7}, timestamp = {Thu, 01 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MasureS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NadikudaB23, author = {Pradeep Kumar Goud Nadikuda and Lakshmi Boppana}, title = {Low area-time complexity point multiplication architecture for {ECC} over GF(2\({}^{\mbox{rmm}}\)) using polynomial basis}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {107--123}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00302-0}, doi = {10.1007/S13389-022-00302-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NadikudaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NgoDJ23, author = {Kalle Ngo and Elena Dubrova and Thomas Johansson}, title = {A side-channel attack on a masked and shuffled software implementation of Saber}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {443--460}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00315-3}, doi = {10.1007/S13389-023-00315-3}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/NgoDJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PengMTYC23, author = {Bo{-}Yuan Peng and Adrian Marotzke and Ming{-}Han Tsai and Bo{-}Yin Yang and Ho{-}Lin Chen}, title = {Streamlined {NTRU} Prime on {FPGA}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {167--186}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00303-z}, doi = {10.1007/S13389-022-00303-Z}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PengMTYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RobertV23, author = {Jean{-}Marc Robert and Pascal V{\'{e}}ron}, title = {Faster multiplication over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}2[X]{\textdollar} using {AVX512} instruction set and {VPCLMULQDQ} instruction}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {37--55}, year = {2023}, url = {https://doi.org/10.1007/s13389-021-00278-3}, doi = {10.1007/S13389-021-00278-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RobertV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SalamYPP23, author = {Iftekhar Salam and Wei{-}Chuen Yau and Rapha{\"{e}}l C.{-}W. Phan and Josef Pieprzyk}, title = {Differential fault attacks on the lightweight authenticated encryption algorithm {CLX-128}}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {265--281}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00326-0}, doi = {10.1007/S13389-023-00326-0}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/SalamYPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SalomonL23, author = {Dor Salomon and Itamar Levi}, title = {MaskSIMD-lib: on the performance gap of a generic {C} optimized assembly and wide vector extensions for masked software with an Ascon-p test case}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {325--342}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00322-4}, doi = {10.1007/S13389-023-00322-4}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SalomonL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/VasselleTM23, author = {Aur{\'{e}}lien Vasselle and Hugues Thiebeauld and Philippe Maurine}, title = {Spatial dependency analysis to extract information from side-channel mixtures: extended version}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {409--425}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00307-9}, doi = {10.1007/S13389-022-00307-9}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/VasselleTM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WernerMP23, author = {Vincent Werner and Laurent Maingault and Marie{-}Laure Potet}, title = {An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {2}, pages = {149--165}, year = {2023}, url = {https://doi.org/10.1007/s13389-022-00292-z}, doi = {10.1007/S13389-022-00292-Z}, timestamp = {Thu, 01 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WernerMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WiemersM23, author = {Andreas Wiemers and Johannes Mittmann}, title = {Improving recent side-channel attacks against the {DES} key schedule}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {1}, pages = {1--17}, year = {2023}, url = {https://doi.org/10.1007/s13389-021-00279-2}, doi = {10.1007/S13389-021-00279-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WiemersM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BozilovKN22, author = {Dusan Bozilov and Miroslav Knezevic and Ventzislav Nikov}, title = {Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {15--51}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00276-5}, doi = {10.1007/S13389-021-00276-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BozilovKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BrunettaP22, author = {Carlo Brunetta and Pablo Picazo{-}Sanchez}, title = {Modelling cryptographic distinguishers using machine learning}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {123--135}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00262-x}, doi = {10.1007/S13389-021-00262-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BrunettaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BuhrowGH22, author = {Benjamin Buhrow and Barry K. Gilbert and Clifton R. Haider}, title = {Parallel modular multiplication using 512-bit advanced vector instructions}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {95--105}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00256-9}, doi = {10.1007/S13389-021-00256-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BuhrowGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CaforioBB22, author = {Andrea Caforio and Fatih Balli and Subhadeep Banik}, title = {Melting {SNOW-V:} improved lightweight architectures}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {53--73}, year = {2022}, url = {https://doi.org/10.1007/s13389-020-00251-6}, doi = {10.1007/S13389-020-00251-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CaforioBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChangKRS22, author = {Chip{-}Hong Chang and Stefan Katzenbeisser and Ulrich R{\"{u}}hrmair and Patrick Schaumont}, title = {The {ASHES} 2020 special issue at {JCEN}}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {369--370}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00300-2}, doi = {10.1007/S13389-022-00300-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChangKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Chavez-SaabCJR22, author = {Jorge Ch{\'{a}}vez{-}Saab and Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and Samuel Jaques and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {The {SQALE} of {CSIDH:} sublinear V{\'{e}}lu quantum-resistant isogeny action with low exponents}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {349--368}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00271-w}, doi = {10.1007/S13389-021-00271-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Chavez-SaabCJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChowdhuryCADGF22, author = {Sreeja Chowdhury and Ana Covic and Rabin Yu Acharya and Spencer Dupee and Fatemeh Ganji and Domenic Forte}, title = {Physical security in the post-quantum era}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {267--303}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00255-w}, doi = {10.1007/S13389-021-00255-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChowdhuryCADGF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DavidW22, author = {Liron David and Avishai Wool}, title = {Rank estimation with bounded error via exponential sampling}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {151--168}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00269-4}, doi = {10.1007/S13389-021-00269-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DavidW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DutertreMNT22, author = {Jean{-}Max Dutertre and Amir{-}Pasha Mirbaha and David Naccache and Assia Tria}, title = {Photonic power firewalls}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {245--254}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00291-0}, doi = {10.1007/S13389-022-00291-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DutertreMNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/EngelsHP22, author = {Susanne Engels and Max Hoffmann and Christof Paar}, title = {A critical view on the real-world security of logic locking}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {229--244}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00294-x}, doi = {10.1007/S13389-022-00294-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/EngelsHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FustosBY22, author = {Jacob Fustos and Michael Garrett Bechtel and Heechul Yun}, title = {A framework for leaking secrets to past instructions}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {461--473}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00289-8}, doi = {10.1007/S13389-022-00289-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FustosBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrossJZS22, author = {Mathieu Gross and Nisha Jacob and Andreas Zankl and Georg Sigl}, title = {Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {181--196}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00273-8}, doi = {10.1007/S13389-021-00273-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GrossJZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JanaNPS22, author = {Amit Jana and Anirban Nath and Goutam Paul and Dhiman Saha}, title = {Differential fault analysis of {NORX} using variants of coupon collector problem}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {433--459}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00285-y}, doi = {10.1007/S13389-022-00285-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JanaNPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JinBDR22, author = {Chenglu Jin and Wayne P. Burleson and Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Programmable access-controlled and generic erasable {PUF} design and its applications}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {413--432}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00284-z}, doi = {10.1007/S13389-022-00284-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JinBDR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KunduAKS22, author = {Anup Kumar Kundu and Aikata and Banashri Karmakar and Dhiman Saha}, title = {Fault analysis of the {PRINCE} family of lightweight ciphers}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {475--494}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00290-1}, doi = {10.1007/S13389-022-00290-1}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KunduAKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LeLG22, author = {Duc{-}Phong Le and Rongxing Lu and Ali A. Ghorbani}, title = {Improved fault analysis on {SIMECK} ciphers}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {169--180}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00263-w}, doi = {10.1007/S13389-021-00263-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LeLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LiuCM22, author = {Fanghui Liu and Waldemar Cruz and Laurent Michel}, title = {A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {197--228}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00280-9}, doi = {10.1007/S13389-021-00280-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LiuCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MandalSST22, author = {Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo}, title = {Sycon: a new milestone in designing ASCON-like permutations}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {305--327}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00272-9}, doi = {10.1007/S13389-021-00272-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MandalSST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MauroSS22, author = {Juan Di Mauro and Eduardo Salazar and Hugo D. Scolnik}, title = {Design and implementation of a novel cryptographically secure pseudorandom number generator}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {255--265}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00297-8}, doi = {10.1007/S13389-022-00297-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MauroSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MolteniZ22, author = {Maria Chiara Molteni and Vittorio Zaccaria}, title = {A relation calculus for reasoning about t-probing security}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {1--14}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00286-x}, doi = {10.1007/S13389-022-00286-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MolteniZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MukherjeeRC22, author = {Rijoy Mukherjee and Sree Ranjani Rajendran and Rajat Subhra Chakraborty}, title = {A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {495--522}, year = {2022}, url = {https://doi.org/10.1007/s13389-022-00295-w}, doi = {10.1007/S13389-022-00295-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MukherjeeRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NathS22, author = {Kaushik Nath and Palash Sarkar}, title = {Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {107--121}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00261-y}, doi = {10.1007/S13389-021-00261-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NathS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuladjGGM22, author = {Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane}, title = {Spectral approach to process the (multivariate) high-order template attack against any masking scheme}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {1}, pages = {75--93}, year = {2022}, url = {https://doi.org/10.1007/s13389-020-00253-4}, doi = {10.1007/S13389-020-00253-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuladjGGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Ruhrmair22, author = {Ulrich R{\"{u}}hrmair}, title = {Secret-free security: a survey and tutorial}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {387--412}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00283-6}, doi = {10.1007/S13389-021-00283-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Ruhrmair22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SaarinenNM22, author = {Markku{-}Juhani O. Saarinen and G. Richard Newell and Ben Marshall}, title = {Development of the {RISC-V} entropy source interface}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {4}, pages = {371--386}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00275-6}, doi = {10.1007/S13389-021-00275-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SaarinenNM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WinderickxBSM22, author = {Jori Winderickx and An Braeken and Dave Singel{\'{e}}e and Nele Mentens}, title = {In-depth energy analysis of security algorithms and protocols for the Internet of Things}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {137--149}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00274-7}, doi = {10.1007/S13389-021-00274-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WinderickxBSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YeniarasC22, author = {Esra Yeniaras and Murat Cenk}, title = {Faster characteristic three polynomial multiplication and its application to {NTRU} Prime decapsulation}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {3}, pages = {329--348}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00282-7}, doi = {10.1007/S13389-021-00282-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YeniarasC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AbarzuaCL21, author = {Rodrigo Abarz{\'{u}}a and Claudio Valencia Cordero and Julio L{\'{o}}pez}, title = {Survey on performance and security problems of countermeasures for passive side-channel attacks on {ECC}}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {1}, pages = {71--102}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00257-8}, doi = {10.1007/S13389-021-00257-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AbarzuaCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AzrielSAGMP21, author = {Leonid Azriel and Julian Speith and Nils Albartus and Ran Ginosar and Avi Mendelson and Christof Paar}, title = {A survey of algorithmic methods in {IC} reverse engineering}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {299--315}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00268-5}, doi = {10.1007/S13389-021-00268-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AzrielSAGMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BajardD21, author = {Jean{-}Claude Bajard and Sylvain Duquesne}, title = {Montgomery-friendly primes and applications to cryptography}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {399--415}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00260-z}, doi = {10.1007/S13389-021-00260-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BajardD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BandaraK21, author = {Sahan Bandara and Michel A. Kinsy}, title = {Adaptive caches as a defense mechanism against cache side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {239--255}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00246-3}, doi = {10.1007/S13389-020-00246-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BandaraK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BronchainSS21, author = {Olivier Bronchain and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Reducing risks through simplicity: high side-channel security for lazy engineers}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {1}, pages = {39--55}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00241-8}, doi = {10.1007/S13389-020-00241-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BronchainSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChangHRS21, author = {Chip{-}Hong Chang and Daniel E. Holcomb and Ulrich R{\"{u}}hrmair and Patrick Schaumont}, title = {The {ASHES} 2019 special issue at {JCEN}}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {199--200}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00270-x}, doi = {10.1007/S13389-021-00270-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChangHRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChengCGDG21, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Jean{-}Luc Danger and Sylvain Guilley}, title = {Detecting faults in inner product masking scheme}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {119--133}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00227-6}, doi = {10.1007/S13389-020-00227-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GanjiTSSTF21, author = {Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean{-}Pierre Seifert and Mark M. Tehranipoor and Domenic Forte}, title = {Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version)}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {105--118}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00226-7}, doi = {10.1007/S13389-020-00226-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GanjiTSSTF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GuCLHMO21, author = {Chongyan Gu and Chip{-}Hong Chang and Weiqiang Liu and Neil Hanley and Jack Miskelly and M{\'{a}}ire O'Neill}, title = {A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {227--238}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00244-5}, doi = {10.1007/S13389-020-00244-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GuCLHMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HeydemannL21, author = {Karine Heydemann and Letitia Li}, title = {Editorial about {PROOFS} 2019}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {103--104}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00236-5}, doi = {10.1007/S13389-020-00236-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HeydemannL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HeydemannL21a, author = {Karine Heydemann and Letitia Li}, title = {Correction to: Editorial about {PROOFS} 2019}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {197}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00266-7}, doi = {10.1007/S13389-021-00266-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HeydemannL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HoweMOR21, author = {James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni}, title = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {317--327}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00258-7}, doi = {10.1007/S13389-021-00258-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HoweMOR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JacobsonK21, author = {Michael John Jacobson Jr. and Prabhat Kushwaha}, title = {Removable weak keys for discrete logarithm-based cryptography}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {181--195}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00250-7}, doi = {10.1007/S13389-020-00250-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JacobsonK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KamelBBS21, author = {Dina Kamel and Davide Bellizia and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-channel analysis of a learning parity with physical noise processor}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {171--179}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00238-3}, doi = {10.1007/S13389-020-00238-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KamelBBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KerenP21, author = {Osnat Keren and Ilia Polian}, title = {{IPM-RED:} combining higher-order masking with robust error detection}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {147--160}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00229-4}, doi = {10.1007/S13389-020-00229-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KerenP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LombardiaBB21, author = {Sergio Rold{\'{a}}n Lombard{\'{\i}}a and Fatih Balli and Subhadeep Banik}, title = {Six shades lighter: a bit-serial implementation of the {AES} family}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {417--439}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00265-8}, doi = {10.1007/S13389-021-00265-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LombardiaBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MittmannS21, author = {Johannes Mittmann and Werner Schindler}, title = {Timing attacks and local timing attacks against Barrett's modular multiplication algorithm}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {369--397}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00254-3}, doi = {10.1007/S13389-020-00254-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MittmannS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NashimotoSMMMN21, author = {Shoei Nashimoto and Daisuke Suzuki and Noriyuki Miura and Tatsuya Machida and Kohei Matsuda and Makoto Nagata}, title = {Low-cost distance-spoofing attack on {FMCW} radar and its feasibility study on countermeasure}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {289--298}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00252-5}, doi = {10.1007/S13389-020-00252-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NashimotoSMMMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PereiraDJ21, author = {Geovandro C. C. F. Pereira and Javad Doliskani and David Jao}, title = {x-only point addition formula and faster compressed {SIKE}}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {1}, pages = {57--69}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00245-4}, doi = {10.1007/S13389-020-00245-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PereiraDJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PerianinCDFG21, author = {Thomas Perianin and S{\'{e}}bastien Carr{\'{e}} and Victor Dyseryn and Adrien Facon and Sylvain Guilley}, title = {End-to-end automated cache-timing attack driven by machine learning}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {135--146}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00228-5}, doi = {10.1007/S13389-020-00228-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PerianinCDFG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PerinZCMP21, author = {Lucas Pandolfo Perin and Gustavo Zambonin and Ricardo Felipe Cust{\'{o}}dio and Lucia Moura and Daniel Panario}, title = {Improved constant-sum encodings for hash-based signatures}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {329--351}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00264-9}, doi = {10.1007/S13389-021-00264-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PerinZCMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RamezanpourAD21, author = {Keyvan Ramezanpour and Paul Ampadu and William Diehl}, title = {Fault intensity map analysis with neural network key distinguisher}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {273--288}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00249-0}, doi = {10.1007/S13389-020-00249-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RamezanpourAD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ResendeA21, author = {Amanda Cristina Davi Resende and Diego de Freitas Aranha}, title = {Faster unbalanced Private Set Intersection in the semi-honest setting}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {1}, pages = {21--38}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00242-7}, doi = {10.1007/S13389-020-00242-7}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/ResendeA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ShiozakiF21, author = {Mitsuru Shiozaki and Takeshi Fujino}, title = {Simple electromagnetic analysis attack based on geometric leak on {ASIC} implementation of ring-oscillator {PUF}}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {201--212}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00240-9}, doi = {10.1007/S13389-020-00240-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ShiozakiF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/TrouchkineBELB21, author = {Thomas Trouchkine and S{\'{e}}banjila Kevin Bukasa and Mathieu Escouteloup and Ronan Lashermes and Guillaume Bouffard}, title = {Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {4}, pages = {353--367}, year = {2021}, url = {https://doi.org/10.1007/s13389-021-00259-6}, doi = {10.1007/S13389-021-00259-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/TrouchkineBELB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UenoTHH21, author = {Rei Ueno and Junko Takahashi and Yu{-}ichi Hayashi and Naofumi Homma}, title = {A method for constructing sliding windows leak from noisy cache timing information}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {2}, pages = {161--170}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00230-x}, doi = {10.1007/S13389-020-00230-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UenoTHH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UntersteinJHGH21, author = {Florian Unterstein and Nisha Jacob and Neil Hanley and Chongyan Gu and Johann Heyszl}, title = {{SCA} secure and updatable crypto engines for {FPGA} SoC bitstream decryption: extended version}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {257--272}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00247-2}, doi = {10.1007/S13389-020-00247-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UntersteinJHGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YeoLK21, author = {Sze Ling Yeo and Duc{-}Phong Le and Khoongming Khoo}, title = {Improved algebraic attacks on lightweight block ciphers}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {1}, pages = {1--19}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00237-4}, doi = {10.1007/S13389-020-00237-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YeoLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ZhangJCZG21, author = {Yuqiao Zhang and Ayush Jain and Pinchen Cui and Ziqi Zhou and Ujjwal Guin}, title = {A novel topology-guided attack and its countermeasure towards secure logic locking}, journal = {J. Cryptogr. Eng.}, volume = {11}, number = {3}, pages = {213--226}, year = {2021}, url = {https://doi.org/10.1007/s13389-020-00243-6}, doi = {10.1007/S13389-020-00243-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ZhangJCZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AbarzuaMMT20, author = {Rodrigo Abarz{\'{u}}a and Santi Mart{\'{\i}}nez and Valeria Mendoza and Nicolas Th{\'{e}}riault}, title = {Same value analysis on Edwards curves}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {27--48}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00206-6}, doi = {10.1007/S13389-019-00206-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AbarzuaMMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AlamMKLS20, author = {Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen Kadiyala and Siew{-}Kei Lam and Thambipillai Srikanthan}, title = {Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {289--303}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00232-9}, doi = {10.1007/S13389-020-00232-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AlamMKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BaksiSS20, author = {Anubhab Baksi and Dhiman Saha and Sumanta Sarkar}, title = {To infect or not to infect: a critical analysis of infective countermeasures in fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {355--374}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00224-9}, doi = {10.1007/S13389-020-00224-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BaksiSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BartheBDFGSS20, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {17--26}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00202-2}, doi = {10.1007/S13389-018-00202-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BartheBDFGSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaM20, author = {Lejla Batina and Nele Mentens}, title = {{PROOFS} 2018 Editorial}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {287}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00248-1}, doi = {10.1007/S13389-020-00248-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BenadjilaPSCD20, author = {Ryad Benadjila and Emmanuel Prouff and R{\'{e}}mi Strullu and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Deep learning for side-channel analysis and introduction to {ASCAD} database}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {163--188}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00220-8}, doi = {10.1007/S13389-019-00220-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BenadjilaPSCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BosF20, author = {Joppe W. Bos and Simon Friedberger}, title = {Faster modular arithmetic for isogeny-based crypto on embedded devices}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {97--109}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00214-6}, doi = {10.1007/S13389-019-00214-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BosF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CruzGA20, author = {Rafael J. Cruz and Antonio Guimar{\~{a}}es and Diego F. Aranha}, title = {Efficient and secure software implementations of Fantomas}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {211--228}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00218-2}, doi = {10.1007/S13389-019-00218-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CruzGA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DidierDV20, author = {Laurent{-}St{\'{e}}phane Didier and Fangan{-}Yssouf Dosso and Pascal V{\'{e}}ron}, title = {Efficient modular operations using the adapted modular number system}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {111--133}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00221-7}, doi = {10.1007/S13389-019-00221-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DidierDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GayKKP20, author = {Mael Gay and Batya Karp and Osnat Keren and Ilia Polian}, title = {Error control scheme for malicious and natural faults in cryptographic modules}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {321--336}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00234-7}, doi = {10.1007/S13389-020-00234-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GayKKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoubinPRW20, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to reveal the secrets of an obscure white-box implementation}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {49--66}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00207-5}, doi = {10.1007/S13389-019-00207-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HettwerGG20, author = {Benjamin Hettwer and Stefan Gehrer and Tim G{\"{u}}neysu}, title = {Applications of machine learning techniques in side-channel attacks: a survey}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {135--162}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00212-8}, doi = {10.1007/S13389-019-00212-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HettwerGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HillerKS20, author = {Matthias Hiller and Ludwig K{\"{u}}rzinger and Georg Sigl}, title = {Review of error correction for PUFs and evaluation on state-of-the-art FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {229--247}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00223-w}, doi = {10.1007/S13389-020-00223-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HillerKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JauvartMFG20, author = {Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, title = {Improving side-channel attacks against pairing-based cryptography}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00201-3}, doi = {10.1007/S13389-018-00201-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OrumiehchihaRSP20, author = {Mohammad Ali Orumiehchiha and Saeed Rostami and Elham Shakour and Josef Pieprzyk}, title = {A differential fault attack on the {WG} family of stream ciphers}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {189--195}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00222-x}, doi = {10.1007/S13389-020-00222-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OrumiehchihaRSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuladjMGGM20, author = {Maamar Ouladj and Nadia El Mrabet and Sylvain Guilley and Philippe Guillot and Gilles Mill{\'{e}}rioux}, title = {On the power of template attacks in highly multivariate context}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {337--354}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00239-2}, doi = {10.1007/S13389-020-00239-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuladjMGGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PiccoliVR20, author = {Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo}, title = {Polynomial multiplication over binary finite fields: new upper bounds}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {197--210}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00210-w}, doi = {10.1007/S13389-019-00210-W}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/PiccoliVR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RichterM20, author = {Bastian Richter and Amir Moradi}, title = {Template attacks on nano-scale {CMOS} devices}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {275--285}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00225-8}, doi = {10.1007/S13389-020-00225-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RichterM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Schoinianakis20, author = {Dimitrios Schoinianakis}, title = {Residue arithmetic systems in cryptography: a survey on modern security applications}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {249--267}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00231-w}, doi = {10.1007/S13389-020-00231-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Schoinianakis20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SijacicBYGV20, author = {Danilo Sijacic and Josep Balasch and Bohan Yang and Santosh Ghosh and Ingrid Verbauwhede}, title = {Towards efficient and automated side-channel evaluations at design time}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {305--319}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00233-8}, doi = {10.1007/S13389-020-00233-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SijacicBYGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Wiemers20, author = {Andreas Wiemers}, title = {A remark on a success rate model for side-channel attack analysis}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {269--274}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00235-6}, doi = {10.1007/S13389-020-00235-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Wiemers20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WillersHGSD20, author = {Oliver Willers and Christopher Huth and Jorge Guajardo and Helmut Seidel and Peter W. Deutsch}, title = {On the feasibility of deriving cryptographic keys from {MEMS} sensors}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {67--83}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00208-4}, doi = {10.1007/S13389-019-00208-4}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/WillersHGSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ZhouS20, author = {Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {85--95}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00209-3}, doi = {10.1007/S13389-019-00209-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ZhouS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/0003RM19, author = {Poulami Das and Debapriya Basu Roy and Debdeep Mukhopadhyay}, title = {Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {263--275}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00219-1}, doi = {10.1007/S13389-019-00219-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/0003RM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BanegasCP19, author = {Gustavo Banegas and Ricardo Felipe Cust{\'{o}}dio and Daniel Panario}, title = {A new class of irreducible pentanomials for polynomial-based multipliers in binary fields}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {359--373}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0197-6}, doi = {10.1007/S13389-018-0197-6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BanegasCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BanikBR19, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Compact circuits for combined {AES} encryption/decryption}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {69--83}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0176-3}, doi = {10.1007/S13389-017-0176-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BanikBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaCPST19, author = {Lejla Batina and Lukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall}, title = {Online template attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {21--36}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0171-8}, doi = {10.1007/S13389-017-0171-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BaumannSD19, author = {Christoph Baumann and Oliver Schwarz and Mads Dam}, title = {On the verification of system-level information flow properties for virtualized execution platforms}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {243--261}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00216-4}, doi = {10.1007/S13389-019-00216-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BaumannSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGT19, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {303--312}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0194-9}, doi = {10.1007/S13389-018-0194-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CianfrigliaGBLP19, author = {Marco Cianfriglia and Stefano Guarino and Massimo Bernaschi and Flavio Lombardi and Marco Pedicini}, title = {Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {375--392}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00217-3}, doi = {10.1007/S13389-019-00217-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CianfrigliaGBLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DinuCKPGB19, author = {Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and L{\'{e}}o Perrin and Johann Gro{\ss}sch{\"{a}}dl and Alex Biryukov}, title = {Triathlon of lightweight block ciphers for the Internet of things}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {283--302}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0193-x}, doi = {10.1007/S13389-018-0193-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DinuCKPGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DiopLOLM19, author = {Ibrahima Diop and Yanis Linge and Thomas Ordas and Pierre{-}Yvan Liardet and Philippe Maurine}, title = {From theory to practice: horizontal attacks on protected implementations of modular exponentiations}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {37--52}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0181-1}, doi = {10.1007/S13389-018-0181-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DiopLOLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DruckerG19, author = {Nir Drucker and Shay Gueron}, title = {A toolbox for software optimization of {QC-MDPC} code-based cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {341--357}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-00200-4}, doi = {10.1007/S13389-018-00200-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DruckerG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GeraudN19, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Mixed-radix Naccache-Stern encryption}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {277--282}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0188-7}, doi = {10.1007/S13389-018-0188-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GeraudN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HerbertBF19, author = {Vincent Herbert and Bhaskar Biswas and Caroline Fontaine}, title = {Design and implementation of low-depth pairing-based homomorphic encryption scheme}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {185--201}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0192-y}, doi = {10.1007/S13389-018-0192-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HerbertBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutchinsonK19, author = {Aaron Hutchinson and Koray Karabina}, title = {Constructing multidimensional differential addition chains and their applications}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {1--19}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0177-2}, doi = {10.1007/S13389-017-0177-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutchinsonK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutterT19, author = {Michael Hutter and Michael Tunstall}, title = {Constant-time higher-order Boolean-to-arithmetic masking}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {173--184}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0191-z}, doi = {10.1007/S13389-018-0191-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KawamuraKSY19, author = {Shinichi Kawamura and Yuichi Komano and Hideo Shimizu and Tomoko Yonemura}, title = {{RNS} Montgomery reduction algorithms using quadratic residuosity}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {313--331}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0195-8}, doi = {10.1007/S13389-018-0195-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KawamuraKSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Konheim19, author = {Alan G. Konheim}, title = {Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {85--100}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0198-5}, doi = {10.1007/S13389-018-0198-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Konheim19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LevinaMST19, author = {Alla Levina and Roman Mostovoi and Daria Sleptsova and Lavrentii Tcvetkov}, title = {Physical model of sensitive data leakage from PC-based cryptographic systems}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {393--400}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00215-5}, doi = {10.1007/S13389-019-00215-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LevinaMST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuahmaMHE19, author = {In{\`{e}}s Ben El Ouahma and Quentin L. Meunier and Karine Heydemann and Emmanuelle Encrenaz}, title = {Side-channel robustness analysis of masked assembly codes using a symbolic approach}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {231--242}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00205-7}, doi = {10.1007/S13389-019-00205-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuahmaMHE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PeccerilloBK19, author = {Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel bitsliced {AES} through {PHAST:} a single-source high-performance library for multi-cores and GPUs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {159--171}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0175-4}, doi = {10.1007/S13389-017-0175-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/PeccerilloBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RobertNP19, author = {Jean{-}Marc Robert and Christophe N{\`{e}}gre and Thomas Plantard}, title = {Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {115--136}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0196-7}, doi = {10.1007/S13389-018-0196-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RobertNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SahaC19, author = {Dhiman Saha and Dipanwita Roy Chowdhury}, title = {Internal differential fault analysis of parallelizable ciphers in the counter-mode}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {53--67}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0179-0}, doi = {10.1007/S13389-017-0179-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SahaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SahaKMD19, author = {Sayandeep Saha and Ujjawal Kumar and Debdeep Mukhopadhyay and Pallab Dasgupta}, title = {An automated framework for exploitable fault identification in block ciphers}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {203--219}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00203-9}, doi = {10.1007/S13389-019-00203-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SahaKMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SaldamliB19, author = {G{\"{o}}kay Saldamli and Yoo{-}Jin Baek}, title = {Uniform Montgomery multiplier}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {333--339}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00213-7}, doi = {10.1007/S13389-019-00213-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SaldamliB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UenoHNA19, author = {Rei Ueno and Naofumi Homma and Yasuyuki Nogami and Takafumi Aoki}, title = {Highly efficient GF(2\({}^{\mbox{8}}\)) inversion circuit based on hybrid {GF} representations}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {101--113}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0187-8}, doi = {10.1007/S13389-018-0187-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UenoHNA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UnterluggauerWM19, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {{MEAS:} memory encryption and authentication secure against side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {137--158}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0180-2}, doi = {10.1007/S13389-018-0180-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UnterluggauerWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WisiolM19, author = {Nils Wisiol and Marian Margraf}, title = {Why attackers lose: design and security analysis of arbitrarily large {XOR} arbiter PUFs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {221--230}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00204-8}, doi = {10.1007/S13389-019-00204-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WisiolM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WuW19, author = {Tao Wu and Ruomei Wang}, title = {Fast unified elliptic curve point multiplication for {NIST} prime curves on FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {401--410}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00211-9}, doi = {10.1007/S13389-019-00211-9}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BajardEM18, author = {Jean{-}Claude Bajard and Julien Eynard and Nabil Merkiche}, title = {Montgomery reduction within the context of residue number system arithmetic}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {189--200}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0154-9}, doi = {10.1007/S13389-017-0154-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BajardEM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Cenk18, author = {Murat Cenk}, title = {Karatsuba-like formulae and their associated techniques}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {259--269}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0155-8}, doi = {10.1007/S13389-017-0155-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/Cenk18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChakrabortiCHN18, author = {Avik Chakraborti and Anupam Chattopadhyay and Muhammad Hassan and Mridul Nandi}, title = {TriviA and uTriviA: two fast and secure authenticated encryption schemes}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {1}, pages = {29--48}, year = {2018}, url = {https://doi.org/10.1007/s13389-016-0137-2}, doi = {10.1007/S13389-016-0137-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChakrabortiCHN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChakrabortyMS18, author = {Debrup Chakraborty and Cuauhtemoc Mancillas L{\'{o}}pez and Palash Sarkar}, title = {Disk encryption: do we need to preserve length?}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {1}, pages = {49--69}, year = {2018}, url = {https://doi.org/10.1007/s13389-016-0147-0}, doi = {10.1007/S13389-016-0147-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChakrabortyMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Chou18, author = {Tung Chou}, title = {McBits revisited: toward a fast constant-time code-based {KEM}}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {2}, pages = {95--107}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0186-9}, doi = {10.1007/S13389-018-0186-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Chou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CostelloS18, author = {Craig Costello and Benjamin Smith}, title = {Montgomery curves and their arithmetic - The case of large characteristic fields}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {227--240}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0157-6}, doi = {10.1007/S13389-017-0157-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CostelloS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DaiC18, author = {Wangchen Dai and Ray C. C. Cheung}, title = {Spectral arithmetic in Montgomery modular multiplication}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {211--226}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0151-z}, doi = {10.1007/S13389-017-0151-Z}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DaiC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DeValeRR18, author = {John DeVale and Ryan N. Rakvic and Kevin Rudd}, title = {Another dimension in integrated circuit trust}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {315--326}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0164-7}, doi = {10.1007/S13389-017-0164-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DeValeRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DossoHMV18, author = {Fangan{-}Yssouf Dosso and Fabien Herbaut and Nicolas M{\'{e}}loni and Pascal V{\'{e}}ron}, title = {Euclidean addition chains scalar multiplication on curves with efficient endomorphism}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {351--367}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0190-0}, doi = {10.1007/S13389-018-0190-0}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DossoHMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FariasAB18, author = {Luckas A. Farias and Bruno C. Albertini and Paulo S. L. M. Barreto}, title = {A class of safe and efficient binary Edwards curves}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {271--283}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0174-5}, doi = {10.1007/S13389-017-0174-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FariasAB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FerradiGMNW18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Amaury de Wargny}, title = {Regulating the pace of von Neumann correctors}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {1}, pages = {85--91}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0153-x}, doi = {10.1007/S13389-017-0153-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FerradiGMNW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FischerH18, author = {Wieland Fischer and Naofumi Homma}, title = {Introduction to the {CHES} 2017 special issue}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {2}, pages = {93--94}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0189-6}, doi = {10.1007/S13389-018-0189-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FischerH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GeYCH18, author = {Qian Ge and Yuval Yarom and David A. Cock and Gernot Heiser}, title = {A survey of microarchitectural timing attacks and countermeasures on contemporary hardware}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {1}, pages = {1--27}, year = {2018}, url = {https://doi.org/10.1007/s13389-016-0141-6}, doi = {10.1007/S13389-016-0141-6}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/GeYCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrossM18, author = {Hannes Gro{\ss} and Stefan Mangard}, title = {A unified masking approach}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {2}, pages = {109--124}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0184-y}, doi = {10.1007/S13389-018-0184-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GrossM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HatzivasilisFPM18, author = {George Hatzivasilis and Konstantinos Fysarakis and Ioannis Papaefstathiou and Charalampos Manifavas}, title = {A review of lightweight block ciphers}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {2}, pages = {141--184}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0160-y}, doi = {10.1007/S13389-017-0160-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HatzivasilisFPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ImmlerSU18, author = {Vincent Immler and Robert Specht and Florian Unterstein}, title = {Your rails cannot hide from localized {EM:} how dual-rail logic fails on FPGAs - extended version}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {2}, pages = {125--139}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0185-x}, doi = {10.1007/S13389-018-0185-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ImmlerSU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JarvinenRV18, author = {Kimmo J{\"{a}}rvinen and Sujoy Sinha Roy and Ingrid Verbauwhede}, title = {Arithmetic of {\textdollar}{\textdollar}{\textbackslash}tau {\textdollar}{\textdollar} {\(\tau\)} -adic expansions for lightweight Koblitz curve cryptography}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {285--300}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0182-0}, doi = {10.1007/S13389-018-0182-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JarvinenRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KarmakarC18, author = {Sandip Karmakar and Dipanwita Roy Chowdhury}, title = {Scan-based side channel attack on stream ciphers and its prevention}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {327--340}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0178-1}, doi = {10.1007/S13389-017-0178-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KarmakarC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LermanPMS18, author = {Liran Lerman and Romain Poussier and Olivier Markowitch and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {301--313}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0162-9}, doi = {10.1007/S13389-017-0162-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LermanPMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OliveiraLR18, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {The Montgomery ladder on binary elliptic curves}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {241--258}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0163-8}, doi = {10.1007/S13389-017-0163-8}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OliveiraLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Rodriguez-Henriquez18, author = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Erkay Savas}, title = {Special issue in honor of Peter Lawrence Montgomery}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {185--187}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0168-3}, doi = {10.1007/S13389-017-0168-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Rodriguez-Henriquez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Saarinen18, author = {Markku{-}Juhani O. Saarinen}, title = {Arithmetic coding and blinding countermeasures for lattice signatures - Engineering a side-channel resistant post-quantum signature scheme with compact signatures}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {1}, pages = {71--84}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0149-6}, doi = {10.1007/S13389-017-0149-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Saarinen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SavasK18, author = {Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Montgomery inversion}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {3}, pages = {201--210}, year = {2018}, url = {https://doi.org/10.1007/s13389-017-0161-x}, doi = {10.1007/S13389-017-0161-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/SavasK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Skoric18, author = {Boris Skoric}, title = {A trivial debiasing scheme for Helper Data Systems}, journal = {J. Cryptogr. Eng.}, volume = {8}, number = {4}, pages = {341--349}, year = {2018}, url = {https://doi.org/10.1007/s13389-018-0183-z}, doi = {10.1007/S13389-018-0183-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Skoric18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AldayaSS17, author = {Alejandro Cabrera Aldaya and Alejandro Cabrera Sarmiento and Santiago S{\'{a}}nchez{-}Solano}, title = {{SPA} vulnerabilities of the binary extended Euclidean algorithm}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {273--285}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0135-4}, doi = {10.1007/S13389-016-0135-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AldayaSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AzziBCV17, author = {Sabine Azzi and Bruno Barras and Maria Christofi and David Vigilant}, title = {Using linear codes as a fault countermeasure for nonlinear operations: application to {AES} and formal verification}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {75--85}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0138-1}, doi = {10.1007/S13389-016-0138-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AzziBCV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BhattacharyaM17, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {299--310}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0165-6}, doi = {10.1007/S13389-017-0165-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhattacharyaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BossGGL0017, author = {Erik Boss and Vincent Grosso and Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi and Tobias Schneider}, title = {Strong 8-bit Sboxes with efficient masking in hardware extended version}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {149--165}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0156-7}, doi = {10.1007/S13389-017-0156-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BossGGL0017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BottinelliB17, author = {Paul Bottinelli and Joppe W. Bos}, title = {Computational aspects of correlation power analysis}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {167--181}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0122-9}, doi = {10.1007/S13389-016-0122-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BottinelliB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BreierJB17, author = {Jakub Breier and Dirmanto Jap and Shivam Bhasin}, title = {A study on analyzing side-channel resistant encoding schemes with respect to fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {311--320}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0166-5}, doi = {10.1007/S13389-017-0166-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BreierJB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BruneauGHMR17, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Optimal side-channel attacks for multivariate leakages and multiple models}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {331--341}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0170-9}, doi = {10.1007/S13389-017-0170-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarboneTDM17, author = {Mathieu Carbone and Yannick Teglia and Gilles R. Ducharme and Philippe Maurine}, title = {Mutual information analysis: higher-order statistical moments, efficiency and efficacy}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {1--17}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0123-8}, doi = {10.1007/S13389-016-0123-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarboneTDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DugardinGMNR17, author = {Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy}, title = {Using modular extension to provably protect Edwards curves against fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {321--330}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0167-4}, doi = {10.1007/S13389-017-0167-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DurvauxSP17, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Santos Merino Del Pozo}, title = {Towards easy leakage certification: extended version}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {129--147}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0150-0}, doi = {10.1007/S13389-017-0150-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DurvauxSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GanjiTFS17, author = {Fatemeh Ganji and Shahin Tajik and Fabian F{\"{a}}{\ss}ler and Jean{-}Pierre Seifert}, title = {Having no mathematical model may not secure PUFs}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {113--128}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0159-4}, doi = {10.1007/S13389-017-0159-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GanjiTFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GierlichsP17, author = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Introduction to the {CHES} 2016 special issue}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {97--98}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0158-5}, doi = {10.1007/S13389-017-0158-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GierlichsP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Guilley17, author = {Sylvain Guilley}, title = {Editorial about {PROOFS} 2015}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {19--20}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0140-7}, doi = {10.1007/S13389-016-0140-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Guilley17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Homma17, author = {Naofumi Homma}, title = {Introduction to the {PROOFS} 2016 special section}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {297--298}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0173-6}, doi = {10.1007/S13389-017-0173-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Homma17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/IdrissiBLH17, author = {Noreddine El Janati El Idrissi and Guillaume Bouffard and Jean{-}Louis Lanet and Said El Hajji}, title = {Trust can be misplaced}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {21--34}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0142-5}, doi = {10.1007/S13389-016-0142-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/IdrissiBLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LugouAF17, author = {Florian Lugou and Ludovic Apvrille and Aur{\'{e}}lien Francillon}, title = {{SMASHUP:} a toolchain for unified verification of hardware/software co-designs}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {63--74}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0145-2}, doi = {10.1007/S13389-016-0145-2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/LugouAF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MayhewM17, author = {Matthew Mayhew and Radu Muresan}, title = {An overview of hardware-level statistical power analysis attack countermeasures}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {213--244}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0133-6}, doi = {10.1007/S13389-016-0133-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MayhewM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NashimotoHHTFA17, author = {Shoei Nashimoto and Naofumi Homma and Yu{-}ichi Hayashi and Junko Takahashi and Hitoshi Fuji and Takafumi Aoki}, title = {Buffer overflow attack with multiple fault injection and a proven countermeasure}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {35--46}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0136-3}, doi = {10.1007/S13389-016-0136-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NashimotoHHTFA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NegreP17, author = {Christophe N{\`{e}}gre and Thomas Plantard}, title = {Efficient regular modular exponentiation using multiplicative half-size splitting}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {245--253}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0134-5}, doi = {10.1007/S13389-016-0134-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NegreP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OrdasGM17, author = {S{\'{e}}bastien Ordas and Ludovic Guillaume{-}Sage and Philippe Maurine}, title = {Electromagnetic fault injection: the curse of flip-flops}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {183--197}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0128-3}, doi = {10.1007/S13389-016-0128-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OrdasGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PasalicCZ17, author = {Enes Pasalic and Anupam Chattopadhyay and WeiGuo Zhang}, title = {Efficient implementation of generalized Maiorana-McFarland class of cryptographic functions}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {287--295}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0139-0}, doi = {10.1007/S13389-016-0139-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PasalicCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template attack versus Bayes classifier}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {343--351}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0172-7}, doi = {10.1007/S13389-017-0172-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RobissonASHWBP17, author = {Bruno Robisson and Michel Agoyan and Patrick Soquet and S{\'{e}}bastien Le Henaff and Franck Wajsb{\"{u}}rt and Pirouz Bazargan{-}Sabet and Guillaume Phan}, title = {Smart security management in secure devices}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {47--61}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0143-4}, doi = {10.1007/S13389-016-0143-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RobissonASHWBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SauvageGP17, author = {Laurent Sauvage and Tarik Graba and Thibault Porteboeuf}, title = {Multi-level formal verification - {A} new approach against fault injection attack}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {87--95}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0144-3}, doi = {10.1007/S13389-016-0144-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SauvageGP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchindlerW17, author = {Werner Schindler and Andreas Wiemers}, title = {Generic power attacks on {RSA} with {CRT} and exponent blinding: new results}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {255--272}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0146-1}, doi = {10.1007/S13389-016-0146-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchindlerW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SwierczynskiFKM17, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar}, title = {Interdiction in practice - Hardware Trojan against a high-security {USB} flash drive}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {199--211}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0132-7}, doi = {10.1007/S13389-016-0132-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SwierczynskiFKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YaromGH17, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {99--112}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0152-y}, doi = {10.1007/S13389-017-0152-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YaromGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BayonBAF16, author = {Pierre Bayon and Lilian Bossuet and Alain Aubert and Viktor Fischer}, title = {Fault model of electromagnetic attacks targeting ring oscillator-based true random number generators}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {1}, pages = {61--74}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0113-2}, doi = {10.1007/S13389-015-0113-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BayonBAF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BosCLN16, author = {Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig}, title = {Selecting elliptic curves for cryptography: an efficiency and security analysis}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {4}, pages = {259--286}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0097-y}, doi = {10.1007/S13389-015-0097-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BosCLN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CoiselS16, author = {Iwen Coisel and Ignacio Sanchez}, title = {Improved cryptanalysis of the {DECT} standard cipher}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {155--169}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0127-4}, doi = {10.1007/S13389-016-0127-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CoiselS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FerradiGNT16, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and David Naccache and Assia Tria}, title = {When organized crime applies academic results: a forensic analysis of an in-card listening device}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {1}, pages = {49--59}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0112-3}, doi = {10.1007/S13389-015-0112-3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/FerradiGNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GalindoG0VV16, author = {David Galindo and Johann Gro{\ss}sch{\"{a}}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek}, title = {Implementation of a leakage-resilient ElGamal key encapsulation mechanism}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {229--238}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0121-x}, doi = {10.1007/S13389-016-0121-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/GalindoG0VV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GanjiTS16, author = {Fatemeh Ganji and Shahin Tajik and Jean{-}Pierre Seifert}, title = {{PAC} learning of arbiter PUFs}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {249--258}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0119-4}, doi = {10.1007/S13389-016-0119-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GanjiTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GhafarA16, author = {Amir Hamzah Abd Ghafar and Muhammad Rezal Kamel Ariffin}, title = {{SPA} on Rabin variant with public key N=p\({}^{\mbox{2}}\)q}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {4}, pages = {339--346}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0118-5}, doi = {10.1007/S13389-016-0118-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GhafarA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoundarJ16, author = {Raveen R. Goundar and Marc Joye}, title = {Inversion-free arithmetic on elliptic curves through isomorphisms}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {187--199}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0131-8}, doi = {10.1007/S13389-016-0131-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoundarJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GuneysuH16, author = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Introduction to the {CHES} 2015 special issue}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {83--84}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0130-9}, doi = {10.1007/S13389-016-0130-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GuneysuH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KhalidHPC16, author = {Ayesha Khalid and Muhammad Hassan and Goutam Paul and Anupam Chattopadhyay}, title = {RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {4}, pages = {299--323}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0116-7}, doi = {10.1007/S13389-016-0116-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KhalidHPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Konheim16, author = {Alan G. Konheim}, title = {Automated teller machines: their history and authentication protocols}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {1}, pages = {1--29}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0104-3}, doi = {10.1007/S13389-015-0104-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Konheim16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LemireK16, author = {Daniel Lemire and Owen Kaser}, title = {Faster 64-bit universal hashing using carry-less multiplications}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {171--185}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0110-5}, doi = {10.1007/S13389-015-0110-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LemireK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MaesLSW16, author = {Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans M. J. Willems}, title = {Secure key generation from biased PUFs: extended version}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {121--137}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0125-6}, doi = {10.1007/S13389-016-0125-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MaesLSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MoeinGG16, author = {Samer Moein and Fayez Gebali and T. Aaron Gulliver}, title = {Hardware attacks: an algebraic approach}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {4}, pages = {325--337}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0117-6}, doi = {10.1007/S13389-016-0117-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MoeinGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NgoNBGD16, author = {Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Sylvain Guilley and Jean{-}Luc Danger}, title = {Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {239--247}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0129-2}, doi = {10.1007/S13389-016-0129-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RauzyGN16, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally proved security of assembly code against power analysis - {A} case study on balanced logic}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {201--216}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0105-2}, doi = {10.1007/S13389-015-0105-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RauzyGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ReparazRCVV16, author = {Oscar Reparaz and Sujoy Sinha Roy and Ruan de Clercq and Frederik Vercauteren and Ingrid Verbauwhede}, title = {Masking ring-LWE}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {139--153}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0126-5}, doi = {10.1007/S13389-016-0126-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ReparazRCVV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RobissonB16, author = {Bruno Robisson and H{\'{e}}l{\`{e}}ne Le Bouder}, title = {Physical functions: the common factor of side-channel and fault attacks?}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {3}, pages = {217--227}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0111-4}, doi = {10.1007/S13389-015-0111-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RobissonB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Saarinen16, author = {Markku{-}Juhani O. Saarinen}, title = {The {BRUTUS} automatic cryptanalytic framework - Testing {CAESAR} authenticated encryption candidates for weaknesses}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {1}, pages = {75--82}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0114-1}, doi = {10.1007/S13389-015-0114-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Saarinen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SarmientoSS16, author = {Alejandro Cabrera Aldaya and Alejandro Cabrera Sarmiento and Santiago S{\'{a}}nchez{-}Solano}, title = {{AES} T-Box tampering attack}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {1}, pages = {31--48}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0103-4}, doi = {10.1007/S13389-015-0103-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SarmientoSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Schindler16, author = {Werner Schindler}, title = {Exclusive exponent blinding is not enough to prevent any timing attack on {RSA}}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {101--119}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0124-7}, doi = {10.1007/S13389-016-0124-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Schindler16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchneiderM16, author = {Tobias Schneider and Amir Moradi}, title = {Leakage assessment methodology - Extended version}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {2}, pages = {85--99}, year = {2016}, url = {https://doi.org/10.1007/s13389-016-0120-y}, doi = {10.1007/S13389-016-0120-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchneiderM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WengerW16, author = {Erich Wenger and Paul Wolfger}, title = {Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {6}, number = {4}, pages = {287--297}, year = {2016}, url = {https://doi.org/10.1007/s13389-015-0108-z}, doi = {10.1007/S13389-015-0108-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WengerW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BanikMS15, author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar}, title = {Improved differential fault attack on {MICKEY} 2.0}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {1}, pages = {13--29}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0083-9}, doi = {10.1007/S13389-014-0083-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BanikMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaR15, author = {Lejla Batina and Matthew J. B. Robshaw}, title = {Introduction to the {CHES} 2014 special issue}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {71--72}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0098-x}, doi = {10.1007/S13389-015-0098-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BluhmG15, author = {Manuel Bluhm and Shay Gueron}, title = {Fast software implementation of binary elliptic curve cryptography}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {215--226}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0094-1}, doi = {10.1007/S13389-015-0094-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BluhmG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BongiovanniCST15, author = {Simone Bongiovanni and Francesco Centurelli and Giuseppe Scotti and Alessandro Trifiletti}, title = {Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {4}, pages = {269--288}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0096-z}, doi = {10.1007/S13389-015-0096-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BongiovanniCST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CenkH15, author = {Murat Cenk and M. Anwar Hasan}, title = {Some new results on binary polynomial multiplication}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {4}, pages = {289--303}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0101-6}, doi = {10.1007/S13389-015-0101-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/CenkH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Coron0V15, author = {Jean{-}S{\'{e}}bastien Coron and Arnab Roy and Srinivas Vivek}, title = {Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {73--83}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0099-9}, doi = {10.1007/S13389-015-0099-9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/Coron0V15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Faz-HernandezLS15, author = {Armando Faz{-}Hern{\'{a}}ndez and Patrick Longa and Ana Helena S{\'{a}}nchez}, title = {Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on {GLV-GLS} curves (extended version)}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {1}, pages = {31--52}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0085-7}, doi = {10.1007/S13389-014-0085-7}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Faz-HernandezLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FeiDLZ15, author = {Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang}, title = {A statistics-based success rate model for {DPA} and {CPA}}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {4}, pages = {227--243}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0107-0}, doi = {10.1007/S13389-015-0107-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FeiDLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GenkinPT15, author = {Daniel Genkin and Itamar Pipman and Eran Tromer}, title = {Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {95--112}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0100-7}, doi = {10.1007/S13389-015-0100-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GenkinPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GueronK15, author = {Shay Gueron and Vlad Krasnov}, title = {Fast prime field elliptic-curve cryptography with 256-bit primes}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {141--151}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0090-x}, doi = {10.1007/S13389-014-0090-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GueronK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GuoMJK15, author = {Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin and Ramesh Karri}, title = {Security analysis of concurrent error detection against differential fault analysis}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {153--169}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0092-8}, doi = {10.1007/S13389-014-0092-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GuoMJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HamletB15, author = {Jason R. Hamlet and Robert W. Brocato}, title = {Throughput-optimized implementations of {QUAD}}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {4}, pages = {245--254}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0109-y}, doi = {10.1007/S13389-015-0109-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HamletB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutterS15, author = {Michael Hutter and Peter Schwabe}, title = {Multiprecision multiplication on {AVR} revisited}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {201--214}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0093-2}, doi = {10.1007/S13389-015-0093-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutterS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LermanBM15, author = {Liran Lerman and Gianluca Bontempi and Olivier Markowitch}, title = {A machine learning approach against a masked {AES} - Reaching the limit of side-channel attacks with a learning model}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {123--139}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0089-3}, doi = {10.1007/S13389-014-0089-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LermanBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LermanBM15a, author = {Liran Lerman and Gianluca Bontempi and Olivier Markowitch}, title = {The bias-variance decomposition in profiled attacks}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {4}, pages = {255--267}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0106-1}, doi = {10.1007/S13389-015-0106-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LermanBM15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OFlynnC15, author = {Colin O'Flynn and Zhizhang Chen}, title = {Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {1}, pages = {53--69}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0087-5}, doi = {10.1007/S13389-014-0087-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OFlynnC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PerinIMT15, author = {Guilherme Perin and Laurent Imbert and Philippe Maurine and Lionel Torres}, title = {Vertical and horizontal correlation attacks on RNS-based exponentiations}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {171--185}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0095-0}, doi = {10.1007/S13389-015-0095-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PerinIMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SugawaraSFTHSF15, author = {Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino}, title = {Reversing stealthy dopant-level circuits}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {85--94}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0102-5}, doi = {10.1007/S13389-015-0102-5}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SugawaraSFTHSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/TemplinH15, author = {Joshua Templin and Jason R. Hamlet}, title = {A new power-aware {FPGA} design metric}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {1}, pages = {1--11}, year = {2015}, url = {https://doi.org/10.1007/s13389-013-0060-8}, doi = {10.1007/S13389-013-0060-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/TemplinH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/VliegenMKSV15, author = {Jo Vliegen and Nele Mentens and Dirk Koch and Dries Schellekens and Ingrid Verbauwhede}, title = {Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware {IP} cores in Xilinx FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {113--122}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0088-4}, doi = {10.1007/S13389-014-0088-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/VliegenMKSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YamamotoSIOTIT15, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh and Naoya Torii}, title = {A new method for enhancing variety and maintaining reliability of {PUF} responses and its evaluation on ASICs}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {187--199}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0091-9}, doi = {10.1007/S13389-014-0091-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YamamotoSIOTIT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AlmeidaABJ14, author = {Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simpl{\'{\i}}cio Jr.}, title = {Lyra: password-based key derivation with tunable memory and processing costs}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {75--89}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0063-5}, doi = {10.1007/S13389-013-0063-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AlmeidaABJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BeckerRPB14, author = {Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson}, title = {Stealthy dopant-level hardware Trojans: extended version}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {19--31}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0068-0}, doi = {10.1007/S13389-013-0068-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BelaidSHMMSST14, author = {Sonia Bela{\"{\i}}d and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and J{\"{o}}rn{-}Marc Schmidt and Fran{\c{c}}ois{-}Xavier Standaert and Stefan Tillich}, title = {Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {157--171}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0079-5}, doi = {10.1007/S13389-014-0079-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BelaidSHMMSST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BertoniC14, author = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Introduction to the {CHES} 2013 special issue}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {1}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0076-8}, doi = {10.1007/S13389-014-0076-8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BertoniC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BiasiBMR14, author = {Felipe P. Biasi and Paulo S. L. M. Barreto and Rafael Misoczki and Wilson Vicente Ruggiero}, title = {Scaling efficient code-based cryptosystems for embedded platforms}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {123--134}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0070-1}, doi = {10.1007/S13389-014-0070-1}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BiasiBMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Bos14, author = {Joppe W. Bos}, title = {Constant time modular inversion}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {275--281}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0084-8}, doi = {10.1007/S13389-014-0084-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Bos14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGMP14, author = {Claude Carlet and Jean{-}Luc Danger and Sylvain Guilley and Houssem Maghrebi and Emmanuel Prouff}, title = {Achieving side-channel high-order correlation immunity with leakage squeezing}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {107--121}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0067-1}, doi = {10.1007/S13389-013-0067-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrossoSF14, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, title = {Masking vs. multiparty computation: how large is the gap for AES?}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {47--57}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0073-y}, doi = {10.1007/S13389-014-0073-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GrossoSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KamelRFS14, author = {Dina Kamel and Mathieu Renauld and Denis Flandre and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Understanding the limitations and improving the relevance of {SPICE} simulations in side-channel security evaluations}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {187--195}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0080-z}, doi = {10.1007/S13389-014-0080-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KamelRFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KaratiDCBBI14, author = {Sabyasachi Karati and Abhijit Das and Dipanwita Roy Chowdhury and Bhargav Bellur and Debojyoti Bhattacharya and Aravind Iyer}, title = {New algorithms for batch verification of standard {ECDSA} signatures}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {237--258}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0082-x}, doi = {10.1007/S13389-014-0082-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KaratiDCBBI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MoroHER14, author = {Nicolas Moro and Karine Heydemann and Emmanuelle Encrenaz and Bruno Robisson}, title = {Formal verification of a software countermeasure against instruction skip attacks}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {145--156}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0077-7}, doi = {10.1007/S13389-014-0077-7}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/MoroHER14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MulderHMP14, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, title = {Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit {ECDSA:} extended version}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {33--45}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0072-z}, doi = {10.1007/S13389-014-0072-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MulderHMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Negre14, author = {Christophe N{\`{e}}gre}, title = {Efficient binary polynomial multiplication based on optimized Karatsuba reconstruction}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {91--106}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0066-2}, doi = {10.1007/S13389-013-0066-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Negre14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OliveiraLAR14, author = {Thomaz Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and Diego F. Aranha and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Two is the fastest prime: lambda coordinates for binary elliptic curves}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {3--17}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0069-z}, doi = {10.1007/S13389-013-0069-Z}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OliveiraLAR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PaulC14, author = {Goutam Paul and Anupam Chattopadhyay}, title = {Designing stream ciphers with scalable data-widths: a case study with {HC-128}}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {2}, pages = {135--143}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0071-0}, doi = {10.1007/S13389-014-0071-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PaulC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RauzyG14, author = {Pablo Rauzy and Sylvain Guilley}, title = {A formal proof of countermeasures against fault injection attacks on {CRT-RSA}}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {173--185}, year = {2014}, url = {https://doi.org/10.1007/s13389-013-0065-3}, doi = {10.1007/S13389-013-0065-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RauzyG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchindlerW14, author = {Werner Schindler and Andreas Wiemers}, title = {Power attacks in the presence of exponent blinding}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {213--236}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0081-y}, doi = {10.1007/S13389-014-0081-Y}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchindlerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SugawaraSSSF14, author = {Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino}, title = {On measurable side-channel leaks inside {ASIC} design primitives}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {1}, pages = {59--73}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0078-6}, doi = {10.1007/S13389-014-0078-6}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SugawaraSSSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/TiranOTAM14, author = {S{\'{e}}bastien Tiran and S{\'{e}}bastien Ordas and Yannick Teglia and Michel Agoyan and Philippe Maurine}, title = {A model of the leakage in the frequency domain and its application to {CPA} and {DPA}}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {3}, pages = {197--212}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0074-x}, doi = {10.1007/S13389-014-0074-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/TiranOTAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AkinyeleGMPR0R13, author = {Joseph A. Akinyele and Christina Garman and Ian Miers and Matthew W. Pagano and Michael Rushanan and Matthew Green and Aviel D. Rubin}, title = {Charm: a framework for rapidly prototyping cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {2}, pages = {111--128}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0057-3}, doi = {10.1007/S13389-013-0057-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AkinyeleGMPR0R13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AliMT13, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential fault analysis of {AES:} towards reaching its limits}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {2}, pages = {73--97}, year = {2013}, url = {https://doi.org/10.1007/s13389-012-0046-y}, doi = {10.1007/S13389-012-0046-Y}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AliMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BhasinGHD13, author = {Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Jean{-}Luc Danger}, title = {From cryptography to hardware: analyzing and protecting embedded Xilinx {BRAM} for cryptographic applications}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {213--225}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0048-4}, doi = {10.1007/S13389-013-0048-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BriaisDG13, author = {S{\'{e}}bastien Briais and Jean{-}Luc Danger and Sylvain Guilley}, title = {A formal study of two physical countermeasures against side channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {169--180}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0054-6}, doi = {10.1007/S13389-013-0054-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BriaisDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Brown13, author = {Mark Brown}, title = {Toward a taxonomy of communications security models}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {181--195}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0058-2}, doi = {10.1007/S13389-013-0058-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Brown13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ChristofiCGV13, author = {Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant}, title = {Formal verification of a {CRT-RSA} implementation against fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {157--167}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0049-3}, doi = {10.1007/S13389-013-0049-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ChristofiCGV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DangerGHMN13, author = {Jean{-}Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'{e}}dric Murdica and David Naccache}, title = {A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {241--265}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0062-6}, doi = {10.1007/S13389-013-0062-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/FouqueGLTZ13, author = {Pierre{-}Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean{-}Christophe Zapalowicz}, title = {Attacking {RSA-CRT} signatures with faults on montgomery multiplication}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {59--72}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0050-x}, doi = {10.1007/S13389-013-0050-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/FouqueGLTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GerardS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {45--58}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0051-9}, doi = {10.1007/S13389-013-0051-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GerardS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HeyseG13, author = {Stefan Heyse and Tim G{\"{u}}neysu}, title = {Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {29--43}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0056-4}, doi = {10.1007/S13389-013-0056-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HeyseG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KamalY13, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {227--240}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0061-7}, doi = {10.1007/S13389-013-0061-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KamalY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KurdzielLS13, author = {Michael T. Kurdziel and Marcin Lukowiak and Michael A. Sanfilippo}, title = {Minimizing performance overhead in memory encryption}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {2}, pages = {129--138}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0047-5}, doi = {10.1007/S13389-013-0047-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KurdzielLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MohamedBZHWB13, author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter and Johannes Buchmann}, title = {Improved algebraic side-channel attack on {AES}}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {3}, pages = {139--156}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0059-1}, doi = {10.1007/S13389-013-0059-1}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/MohamedBZHWB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MontminyBTL13, author = {David P. Montminy and Rusty O. Baldwin and Michael A. Temple and Eric D. Laspe}, title = {Improving cross-device attacks using zero-mean unit-variance normalization}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {2}, pages = {99--110}, year = {2013}, url = {https://doi.org/10.1007/s13389-012-0038-y}, doi = {10.1007/S13389-012-0038-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MontminyBTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ProuffS13, author = {Emmanuel Prouff and Patrick Schaumont}, title = {Introduction to the {CHES} 2012 special issue}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0055-5}, doi = {10.1007/S13389-013-0055-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ProuffS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RuhrmairD13, author = {Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {17--28}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0052-8}, doi = {10.1007/S13389-013-0052-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RuhrmairD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchlosserNKOS13, author = {Alexander Schl{\"{o}}sser and Dmitry Nedospasov and Juliane Kr{\"{a}}mer and Susanna Orlic and Jean{-}Pierre Seifert}, title = {Simple photonic emission analysis of {AES}}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {1}, pages = {3--15}, year = {2013}, url = {https://doi.org/10.1007/s13389-013-0053-7}, doi = {10.1007/S13389-013-0053-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchlosserNKOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YamamotoSIOTI13, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh}, title = {Variety enhancement of {PUF} responses using the locations of random outputting {RS} latches}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {197--211}, year = {2013}, url = {https://doi.org/10.1007/s13389-012-0044-0}, doi = {10.1007/S13389-012-0044-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YamamotoSIOTI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AvanziHPT12, author = {Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall}, title = {Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {75}, year = {2012}, url = {https://doi.org/10.1007/s13389-011-0026-7}, doi = {10.1007/S13389-011-0026-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AvanziHPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BaldwinGHM12, author = {Brian Baldwin and Raveen R. Goundar and Mark Hamilton and William P. Marnane}, title = {Co-Z {ECC} scalar multiplications for hardware, software and hardware-software co-design on embedded systems}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {4}, pages = {221--240}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0042-2}, doi = {10.1007/S13389-012-0042-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BaldwinGHM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BernsteinDLSY12, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, title = {High-speed high-security signatures}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {77--89}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0027-1}, doi = {10.1007/S13389-012-0027-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BernsteinDLSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BringerCL12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Thanh{-}Ha Le}, title = {Protecting {AES} against side-channel analysis using wire-tap codes}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {129--141}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0034-2}, doi = {10.1007/S13389-012-0034-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BringerCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletFGR12, author = {Claude Carlet and Jean{-}Charles Faug{\`{e}}re and Christopher Goyet and Gu{\'{e}}na{\"{e}}l Renault}, title = {Analysis of the algebraic side channel attack}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {45--62}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0028-0}, doi = {10.1007/S13389-012-0028-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletFGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DaRoltDGNFRV12, author = {Jean DaRolt and Amitabh Das and Santosh Ghosh and Giorgio Di Natale and Marie{-}Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede}, title = {Scan attacks on side-channel and fault attack resistant public-key implementations}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {4}, pages = {207--219}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0045-z}, doi = {10.1007/S13389-012-0045-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DaRoltDGNFRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ElaabidG12, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Portability of templates}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {63--74}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0030-6}, doi = {10.1007/S13389-012-0030-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ElaabidG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GouveaOL12, author = {Conrado Porto Lopes Gouv{\^{e}}a and Leonardo B. Oliveira and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, title = {Efficient software implementation of public-key cryptography on sensor networks using the {MSP430X} microcontroller}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {19--29}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0029-z}, doi = {10.1007/S13389-012-0029-Z}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GouveaOL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GrabherGHJPTW12, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Simon Hoerder and Kimmo J{\"{a}}rvinen and Daniel Page and Stefan Tillich and Marcin W{\'{o}}jcik}, title = {An exploration of mechanisms for dynamic cryptographic instruction set extension}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1007/s13389-011-0025-8}, doi = {10.1007/S13389-011-0025-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/GrabherGHJPTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Gueron12, author = {Shay Gueron}, title = {Efficient software implementations of modular exponentiation}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {1}, pages = {31--43}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0031-5}, doi = {10.1007/S13389-012-0031-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Gueron12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GueronK12, author = {Shay Gueron and Vlad Krasnov}, title = {Parallelizing message schedules to accelerate the computations of hash functions}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {4}, pages = {241--253}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0037-z}, doi = {10.1007/S13389-012-0037-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GueronK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HasanN12, author = {M. Anwar Hasan and Christophe N{\`{e}}gre}, title = {Sequential multiplier with sub-linear gate complexity}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {91--97}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0035-1}, doi = {10.1007/S13389-012-0035-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HasanN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KasperMBMGPB12, author = {Markus Kasper and Amir Moradi and Georg T. Becker and Oliver Mischke and Tim G{\"{u}}neysu and Christof Paar and Wayne P. Burleson}, title = {Side channels as building blocks}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {143--159}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0040-4}, doi = {10.1007/S13389-012-0040-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KasperMBMGPB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KoeberlLMRVWW12, author = {Patrick Koeberl and Jiangtao Li and Roel Maes and Anand Rajan and Claire Vishik and Marcin W{\'{o}}jcik and Wei Wu}, title = {A practical device authentication scheme using {SRAM} PUFs}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {4}, pages = {255--269}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0043-1}, doi = {10.1007/S13389-012-0043-1}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KoeberlLMRVWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MatherO12, author = {Luke Mather and Elisabeth Oswald}, title = {Pinpointing side-channel information leaks in web applications}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {161--177}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0036-0}, doi = {10.1007/S13389-012-0036-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MatherO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RocheP12, author = {Thomas Roche and Emmanuel Prouff}, title = {Higher-order glitch free implementation of the {AES} using Secure Multi-Party Computation protocols - Extended version}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {111--127}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0033-3}, doi = {10.1007/S13389-012-0033-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RocheP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ShariatiSJM12, author = {Saloomeh Shariati and Fran{\c{c}}ois{-}Xavier Standaert and Laurent Jacques and Beno{\^{\i}}t Macq}, title = {Analysis and experimental evaluation of image-based PUFs}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {189--206}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0041-3}, doi = {10.1007/S13389-012-0041-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ShariatiSJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Trujillo-OlayaSK12, author = {Vladimir Trujillo{-}Olaya and Timothy Sherwood and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {3}, pages = {179--188}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0039-x}, doi = {10.1007/S13389-012-0039-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Trujillo-OlayaSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YenCM12, author = {Sung{-}Ming Yen and Chien{-}Ning Chen and Sang{-}Jae Moon}, title = {Multi-exponentiation algorithm based on binary {GCD} computation and its application to side-channel countermeasure}, journal = {J. Cryptogr. Eng.}, volume = {2}, number = {2}, pages = {99--110}, year = {2012}, url = {https://doi.org/10.1007/s13389-012-0032-4}, doi = {10.1007/S13389-012-0032-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YenCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AvanziHPT11, author = {Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall}, title = {Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {271--281}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0024-9}, doi = {10.1007/S13389-011-0024-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AvanziHPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BeuchatOY11, author = {Jean{-}Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A low-area unified hardware architecture for the {AES} and the cryptographic hash function {ECHO}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {101--121}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0009-8}, doi = {10.1007/S13389-011-0009-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/BeuchatOY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BrierNNT11, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, title = {Modulus fault attacks against {RSA-CRT} signatures}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {243--253}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0015-x}, doi = {10.1007/S13389-011-0015-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BrierNNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Dichtl11, author = {Markus Dichtl}, title = {A new method of black box power analysis and a fast algorithm for optimal key search}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {255--264}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0019-6}, doi = {10.1007/S13389-011-0019-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Dichtl11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DogetPRS11, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Univariate side channel attacks and leakage modeling}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {123--144}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0010-2}, doi = {10.1007/S13389-011-0010-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DogetPRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Dominguez-OviedoH11, author = {Agustin Dominguez{-}Oviedo and M. Anwar Hasan}, title = {Algorithm-level error detection for Montgomery ladder-based {ECSM}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {57--69}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0003-1}, doi = {10.1007/S13389-011-0003-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Dominguez-OviedoH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/EndoSHAS11, author = {Sho Endo and Takeshi Sugawara and Naofumi Homma and Takafumi Aoki and Akashi Satoh}, title = {An on-chip glitchy-clock generator for testing fault injection attacks}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {265--270}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0022-y}, doi = {10.1007/S13389-011-0022-Y}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/EndoSHAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoundarJMRV11, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji and Matthieu Rivain and Alexandre Venelli}, title = {Scalar multiplication on Weierstra{\ss} elliptic curves from Co-\emph{Z} arithmetic}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {161--176}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0012-0}, doi = {10.1007/S13389-011-0012-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoundarJMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Guneysu11, author = {Tim G{\"{u}}neysu}, title = {Utilizing hard cores of modern {FPGA} devices for high-performance cryptography}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {37--55}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0002-2}, doi = {10.1007/S13389-011-0002-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Guneysu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HocquetKRLFBS11, author = {C{\'{e}}dric Hocquet and Dina Kamel and Francesco Regazzoni and Jean{-}Didier Legat and Denis Flandre and David Bol and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm {AES} coprocessor for passive {RFID} tags}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {79--86}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0005-z}, doi = {10.1007/S13389-011-0005-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HocquetKRLFBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HospodarGMVV11, author = {Gabriel Hospodar and Benedikt Gierlichs and Elke De Mulder and Ingrid Verbauwhede and Joos Vandewalle}, title = {Machine learning in side-channel analysis: a first study}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {293--302}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0023-x}, doi = {10.1007/S13389-011-0023-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HospodarGMVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KatzenbeisserKLSSW11, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vincent van der Leest and Ahmad{-}Reza Sadeghi and Geert Jan Schrijen and Christian Wachsmann}, title = {Recyclable PUFs: logically reconfigurable PUFs}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {177--186}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0016-9}, doi = {10.1007/S13389-011-0016-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KatzenbeisserKLSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Koc11, author = {{\c{C}}etin Kaya Ko{\c{c}}}, title = {Introduction to the \emph{Journal of Cryptographic Engineering}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0007-x}, doi = {10.1007/S13389-011-0007-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/Koc11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KocherJJR11, author = {Paul C. Kocher and Joshua Jaffe and Benjamin Jun and Pankaj Rohatgi}, title = {Introduction to differential power analysis}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {5--27}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0006-y}, doi = {10.1007/S13389-011-0006-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KocherJJR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LuxS11, author = {Alexander Lux and Artem Starostin}, title = {A tool for static detection of timing channels in Java}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {303--313}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0021-z}, doi = {10.1007/S13389-011-0021-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LuxS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MedwedS11, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Extractors against side-channel attacks: weak or strong?}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {231--241}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0014-y}, doi = {10.1007/S13389-011-0014-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MedwedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MeloniNH11, author = {Nicolas M{\'{e}}loni and Christophe N{\`{e}}gre and M. Anwar Hasan}, title = {High performance {GHASH} and impacts of a class of unconventional bases}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {201--218}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0013-z}, doi = {10.1007/S13389-011-0013-Z}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/MeloniNH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MolterSSS11, author = {H. Gregor Molter and Marc St{\"{o}}ttinger and Abdulhadi Shoufan and Falko Strenzke}, title = {A simple power analysis attack on a McEliece cryptoprocessor}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {29--36}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0001-3}, doi = {10.1007/S13389-011-0001-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MolterSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MorenoH11, author = {Carlos Moreno and M. Anwar Hasan}, title = {SPA-resistant binary exponentiation with optimal execution time}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {87--99}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0008-9}, doi = {10.1007/S13389-011-0008-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MorenoH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Skorobogatov11, author = {Sergei Skorobogatov}, title = {Synchronization method for {SCA} and fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {1}, pages = {71--77}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0004-0}, doi = {10.1007/S13389-011-0004-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Skorobogatov11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Strenzke11, author = {Falko Strenzke}, title = {Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {4}, pages = {283--292}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0020-0}, doi = {10.1007/S13389-011-0020-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Strenzke11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/TaverneFARHL11, author = {Jonathan Taverne and Armando Faz{-}Hern{\'{a}}ndez and Diego F. Aranha and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Darrel Hankerson and Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez}, title = {Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {187--199}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0017-8}, doi = {10.1007/S13389-011-0017-8}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/TaverneFARHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Tunstall11, author = {Michael Tunstall}, title = {Practical complexity differential cryptanalysis and fault analysis of {AES}}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {3}, pages = {219--230}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0018-7}, doi = {10.1007/S13389-011-0018-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Tunstall11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WhitnallO11, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A fair evaluation framework for comparing side-channel distinguishers}, journal = {J. Cryptogr. Eng.}, volume = {1}, number = {2}, pages = {145--160}, year = {2011}, url = {https://doi.org/10.1007/s13389-011-0011-1}, doi = {10.1007/S13389-011-0011-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WhitnallO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.