Search dblp for Publications

export results for "stream:streams/journals/jce:"

 download as .bib file

@article{DBLP:journals/jce/AdjCR23,
  author       = {Gora Adj and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Karatsuba-based square-root V{\'{e}}lu's formulas applied to
                  two isogeny-based protocols},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {89--106},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00293-y},
  doi          = {10.1007/S13389-022-00293-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AdjCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AlvesOA23,
  author       = {Pedro Geraldo M. R. Alves and
                  Jheyne N. Ortiz and
                  Diego F. Aranha},
  title        = {Performance of hierarchical transforms in homomorphic encryption:
                  a case study on logistic regression inference},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {295--310},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00325-1},
  doi          = {10.1007/S13389-023-00325-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AlvesOA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ArshadPJS23,
  author       = {Hamed Arshad and
                  Pablo Picazo{-}Sanchez and
                  Christian Johansen and
                  Gerardo Schneider},
  title        = {Attribute-based encryption with enforceable obligations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {343--371},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00317-1},
  doi          = {10.1007/S13389-023-00317-1},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ArshadPJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AttiasVD23,
  author       = {Vidal Attias and
                  Luigi Vigneri and
                  Vassil S. Dimitrov},
  title        = {Rethinking modular multi-exponentiation in real-world applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {57--70},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00287-w},
  doi          = {10.1007/S13389-022-00287-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AttiasVD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BajardFPS23,
  author       = {Jean{-}Claude Bajard and
                  Kazuhide Fukushima and
                  Thomas Plantard and
                  Arnaud Sipasseuth},
  title        = {Fast verification and public key storage optimization for unstructured
                  lattice-based signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {373--388},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00309-1},
  doi          = {10.1007/S13389-023-00309-1},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BajardFPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChangKMR23,
  author       = {Chip{-}Hong Chang and
                  Stefan Katzenbeisser and
                  Debdeep Mukhopadhyay and
                  Ulrich R{\"{u}}hrmair},
  title        = {The {ASHES} 2021 special issue at {JCEN}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {389--390},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00338-w},
  doi          = {10.1007/S13389-023-00338-W},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/ChangKMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CicekA23,
  author       = {Ihsan {\c{C}}i{\c{c}}ek and
                  Ahmad Alkhas},
  title        = {A new read-write collision-based {SRAM} {PUF} implemented on Xilinx
                  FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {19--36},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-021-00281-8},
  doi          = {10.1007/S13389-021-00281-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CicekA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CuiXTCQ23,
  author       = {Yaxin Cui and
                  Hong Xu and
                  Lin Tan and
                  Huajin Chen and
                  Wenfeng Qi},
  title        = {Construction of equivalent linear trails and multiple linear attack
                  on reduced-round {GIFT-64}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {223--234},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00298-7},
  doi          = {10.1007/S13389-022-00298-7},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/CuiXTCQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DebnathMSPK23,
  author       = {Sumit Kumar Debnath and
                  Sihem Mesnager and
                  Vikas Srivastava and
                  Saibal Kumar Pal and
                  Nibedita Kundu},
  title        = {Mul-IBS: a multivariate identity-based signature scheme compatible
                  with IoT-based {NDN} architecture},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {187--199},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00308-8},
  doi          = {10.1007/S13389-022-00308-8},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DebnathMSPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DeutschbeinMRKS23,
  author       = {Calvin Deutschbein and
                  Andres Meza and
                  Francesco Restuccia and
                  Ryan Kastner and
                  Cynthia Sturton},
  title        = {Isadora: automated information-flow property generation for hardware
                  security verification},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {391--407},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00306-w},
  doi          = {10.1007/S13389-022-00306-W},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DeutschbeinMRKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GironCR23,
  author       = {Alexandre Augusto Giron and
                  Ricardo Cust{\'{o}}dio and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Post-quantum hybrid key exchange: a systematic mapping study},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {71--88},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00288-9},
  doi          = {10.1007/S13389-022-00288-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GironCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ImranABRP23,
  author       = {Malik Imran and
                  Felipe Almeida and
                  Andrea Basso and
                  Sujoy Sinha Roy and
                  Samuel Pagliarini},
  title        = {High-speed {SABER} key encapsulation mechanism in 65nm {CMOS}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {461--471},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00316-2},
  doi          = {10.1007/S13389-023-00316-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/ImranABRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JoshiM23,
  author       = {Priyanka Joshi and
                  Bodhisatwa Mazumdar},
  title        = {{SPSA:} Semi-Permanent Stuck-At fault analysis of {AES} Rijndael SBox},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {201--222},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00301-1},
  doi          = {10.1007/S13389-022-00301-1},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JoshiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KerkhofWPP23,
  author       = {Maikel Kerkhof and
                  Lichao Wu and
                  Guilherme Perin and
                  Stjepan Picek},
  title        = {No (good) loss no gain: systematic evaluation of loss functions in
                  deep learning-based side-channel analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {311--324},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00320-6},
  doi          = {10.1007/S13389-023-00320-6},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KerkhofWPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KomissarovVW23,
  author       = {Rony Komissarov and
                  Sharon Vaisman and
                  Avishai Wool},
  title        = {Spoofing attacks against vehicular {FMCW} radar},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {473--484},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00321-5},
  doi          = {10.1007/S13389-023-00321-5},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KomissarovVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KosekiIUTH23,
  author       = {Ryusuke Koseki and
                  Akira Ito and
                  Rei Ueno and
                  Mehdi Tibouchi and
                  Naofumi Homma},
  title        = {Homomorphic encryption for stochastic computing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {251--263},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00299-6},
  doi          = {10.1007/S13389-022-00299-6},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KosekiIUTH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Koshelev23,
  author       = {Dmitrii I. Koshelev},
  title        = {Subgroup membership testing on elliptic curves via the Tate pairing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {125--128},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00296-9},
  doi          = {10.1007/S13389-022-00296-9},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/Koshelev23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KrachenfelsST23,
  author       = {Thilo Krachenfels and
                  Jean{-}Pierre Seifert and
                  Shahin Tajik},
  title        = {Trojan awakener: detecting dormant malicious hardware using laser
                  logic state imaging (extended version)},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {485--499},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00323-3},
  doi          = {10.1007/S13389-023-00323-3},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KrachenfelsST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KurodaFYF23,
  author       = {Kunihiro Kuroda and
                  Yuta Fukuda and
                  Kota Yoshida and
                  Takeshi Fujino},
  title        = {Practical aspects on non-profiled deep-learning side-channel attacks
                  against {AES} software implementation with two types of masking countermeasures
                  including {RSM}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {427--442},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00312-6},
  doi          = {10.1007/S13389-023-00312-6},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KurodaFYF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LeGrow23,
  author       = {Jason T. LeGrow},
  title        = {A faster method for fault attack resistance in static/ephemeral {CSIDH}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {283--294},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00318-0},
  doi          = {10.1007/S13389-023-00318-0},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LeGrow23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LuengoOGHH23,
  author       = {Elena Almaraz Luengo and
                  Bittor Ala{\~{n}}a Olivares and
                  Luis Javier Garc{\'{\i}}a{-}Villalba and
                  Julio Hernandez{-}Castro and
                  Darren Hurley{-}Smith},
  title        = {StringENT test suite: {ENT} battery revisited for efficient {P} value
                  computation},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {235--249},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00313-5},
  doi          = {10.1007/S13389-023-00313-5},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LuengoOGHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MasureS23,
  author       = {Lo{\"{\i}}c Masure and
                  R{\'{e}}mi Strullu},
  title        = {Side-channel analysis against ANSSI's protected {AES} implementation
                  on {ARM:} end-to-end attacks with multi-task learning},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {129--147},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00311-7},
  doi          = {10.1007/S13389-023-00311-7},
  timestamp    = {Thu, 01 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MasureS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NadikudaB23,
  author       = {Pradeep Kumar Goud Nadikuda and
                  Lakshmi Boppana},
  title        = {Low area-time complexity point multiplication architecture for {ECC}
                  over GF(2\({}^{\mbox{rmm}}\)) using polynomial basis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {107--123},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00302-0},
  doi          = {10.1007/S13389-022-00302-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NadikudaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NgoDJ23,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Thomas Johansson},
  title        = {A side-channel attack on a masked and shuffled software implementation
                  of Saber},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {443--460},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00315-3},
  doi          = {10.1007/S13389-023-00315-3},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/NgoDJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PengMTYC23,
  author       = {Bo{-}Yuan Peng and
                  Adrian Marotzke and
                  Ming{-}Han Tsai and
                  Bo{-}Yin Yang and
                  Ho{-}Lin Chen},
  title        = {Streamlined {NTRU} Prime on {FPGA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {167--186},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00303-z},
  doi          = {10.1007/S13389-022-00303-Z},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PengMTYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobertV23,
  author       = {Jean{-}Marc Robert and
                  Pascal V{\'{e}}ron},
  title        = {Faster multiplication over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}2[X]{\textdollar}
                  using {AVX512} instruction set and {VPCLMULQDQ} instruction},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {37--55},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-021-00278-3},
  doi          = {10.1007/S13389-021-00278-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RobertV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SalamYPP23,
  author       = {Iftekhar Salam and
                  Wei{-}Chuen Yau and
                  Rapha{\"{e}}l C.{-}W. Phan and
                  Josef Pieprzyk},
  title        = {Differential fault attacks on the lightweight authenticated encryption
                  algorithm {CLX-128}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {265--281},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00326-0},
  doi          = {10.1007/S13389-023-00326-0},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/SalamYPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SalomonL23,
  author       = {Dor Salomon and
                  Itamar Levi},
  title        = {MaskSIMD-lib: on the performance gap of a generic {C} optimized assembly
                  and wide vector extensions for masked software with an Ascon-p test
                  case},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {325--342},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00322-4},
  doi          = {10.1007/S13389-023-00322-4},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SalomonL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/VasselleTM23,
  author       = {Aur{\'{e}}lien Vasselle and
                  Hugues Thiebeauld and
                  Philippe Maurine},
  title        = {Spatial dependency analysis to extract information from side-channel
                  mixtures: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {409--425},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00307-9},
  doi          = {10.1007/S13389-022-00307-9},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/VasselleTM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WernerMP23,
  author       = {Vincent Werner and
                  Laurent Maingault and
                  Marie{-}Laure Potet},
  title        = {An end-to-end approach to identify and exploit multi-fault injection
                  vulnerabilities on microcontrollers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {2},
  pages        = {149--165},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-022-00292-z},
  doi          = {10.1007/S13389-022-00292-Z},
  timestamp    = {Thu, 01 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WernerMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WiemersM23,
  author       = {Andreas Wiemers and
                  Johannes Mittmann},
  title        = {Improving recent side-channel attacks against the {DES} key schedule},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {1},
  pages        = {1--17},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-021-00279-2},
  doi          = {10.1007/S13389-021-00279-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WiemersM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BozilovKN22,
  author       = {Dusan Bozilov and
                  Miroslav Knezevic and
                  Ventzislav Nikov},
  title        = {Optimized threshold implementations: securing cryptographic accelerators
                  for low-energy and low-latency applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {15--51},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00276-5},
  doi          = {10.1007/S13389-021-00276-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BozilovKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BrunettaP22,
  author       = {Carlo Brunetta and
                  Pablo Picazo{-}Sanchez},
  title        = {Modelling cryptographic distinguishers using machine learning},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {123--135},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00262-x},
  doi          = {10.1007/S13389-021-00262-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BrunettaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BuhrowGH22,
  author       = {Benjamin Buhrow and
                  Barry K. Gilbert and
                  Clifton R. Haider},
  title        = {Parallel modular multiplication using 512-bit advanced vector instructions},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {95--105},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00256-9},
  doi          = {10.1007/S13389-021-00256-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BuhrowGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CaforioBB22,
  author       = {Andrea Caforio and
                  Fatih Balli and
                  Subhadeep Banik},
  title        = {Melting {SNOW-V:} improved lightweight architectures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {53--73},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-020-00251-6},
  doi          = {10.1007/S13389-020-00251-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CaforioBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChangKRS22,
  author       = {Chip{-}Hong Chang and
                  Stefan Katzenbeisser and
                  Ulrich R{\"{u}}hrmair and
                  Patrick Schaumont},
  title        = {The {ASHES} 2020 special issue at {JCEN}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {369--370},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00300-2},
  doi          = {10.1007/S13389-022-00300-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChangKRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Chavez-SaabCJR22,
  author       = {Jorge Ch{\'{a}}vez{-}Saab and
                  Jes{\'{u}}s{-}Javier Chi{-}Dom{\'{\i}}nguez and
                  Samuel Jaques and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {The {SQALE} of {CSIDH:} sublinear V{\'{e}}lu quantum-resistant
                  isogeny action with low exponents},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {349--368},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00271-w},
  doi          = {10.1007/S13389-021-00271-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Chavez-SaabCJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChowdhuryCADGF22,
  author       = {Sreeja Chowdhury and
                  Ana Covic and
                  Rabin Yu Acharya and
                  Spencer Dupee and
                  Fatemeh Ganji and
                  Domenic Forte},
  title        = {Physical security in the post-quantum era},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {267--303},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00255-w},
  doi          = {10.1007/S13389-021-00255-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChowdhuryCADGF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DavidW22,
  author       = {Liron David and
                  Avishai Wool},
  title        = {Rank estimation with bounded error via exponential sampling},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {151--168},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00269-4},
  doi          = {10.1007/S13389-021-00269-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DavidW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DutertreMNT22,
  author       = {Jean{-}Max Dutertre and
                  Amir{-}Pasha Mirbaha and
                  David Naccache and
                  Assia Tria},
  title        = {Photonic power firewalls},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {245--254},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00291-0},
  doi          = {10.1007/S13389-022-00291-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DutertreMNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/EngelsHP22,
  author       = {Susanne Engels and
                  Max Hoffmann and
                  Christof Paar},
  title        = {A critical view on the real-world security of logic locking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {229--244},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00294-x},
  doi          = {10.1007/S13389-022-00294-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/EngelsHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FustosBY22,
  author       = {Jacob Fustos and
                  Michael Garrett Bechtel and
                  Heechul Yun},
  title        = {A framework for leaking secrets to past instructions},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {461--473},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00289-8},
  doi          = {10.1007/S13389-022-00289-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FustosBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossJZS22,
  author       = {Mathieu Gross and
                  Nisha Jacob and
                  Andreas Zankl and
                  Georg Sigl},
  title        = {Breaking TrustZone memory isolation and secure boot through malicious
                  hardware on a modern FPGA-SoC},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {181--196},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00273-8},
  doi          = {10.1007/S13389-021-00273-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GrossJZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JanaNPS22,
  author       = {Amit Jana and
                  Anirban Nath and
                  Goutam Paul and
                  Dhiman Saha},
  title        = {Differential fault analysis of {NORX} using variants of coupon collector
                  problem},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {433--459},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00285-y},
  doi          = {10.1007/S13389-022-00285-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JanaNPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JinBDR22,
  author       = {Chenglu Jin and
                  Wayne P. Burleson and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Programmable access-controlled and generic erasable {PUF} design and
                  its applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {413--432},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00284-z},
  doi          = {10.1007/S13389-022-00284-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JinBDR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KunduAKS22,
  author       = {Anup Kumar Kundu and
                  Aikata and
                  Banashri Karmakar and
                  Dhiman Saha},
  title        = {Fault analysis of the {PRINCE} family of lightweight ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {475--494},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00290-1},
  doi          = {10.1007/S13389-022-00290-1},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KunduAKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LeLG22,
  author       = {Duc{-}Phong Le and
                  Rongxing Lu and
                  Ali A. Ghorbani},
  title        = {Improved fault analysis on {SIMECK} ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {169--180},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00263-w},
  doi          = {10.1007/S13389-021-00263-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LeLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LiuCM22,
  author       = {Fanghui Liu and
                  Waldemar Cruz and
                  Laurent Michel},
  title        = {A comprehensive tolerant algebraic side-channel attack over modern
                  ciphers using constraint programming},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {197--228},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00280-9},
  doi          = {10.1007/S13389-021-00280-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LiuCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MandalSST22,
  author       = {Kalikinkar Mandal and
                  Dhiman Saha and
                  Sumanta Sarkar and
                  Yosuke Todo},
  title        = {Sycon: a new milestone in designing ASCON-like permutations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {305--327},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00272-9},
  doi          = {10.1007/S13389-021-00272-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MandalSST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MauroSS22,
  author       = {Juan Di Mauro and
                  Eduardo Salazar and
                  Hugo D. Scolnik},
  title        = {Design and implementation of a novel cryptographically secure pseudorandom
                  number generator},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {255--265},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00297-8},
  doi          = {10.1007/S13389-022-00297-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MauroSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MolteniZ22,
  author       = {Maria Chiara Molteni and
                  Vittorio Zaccaria},
  title        = {A relation calculus for reasoning about t-probing security},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {1--14},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00286-x},
  doi          = {10.1007/S13389-022-00286-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MolteniZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MukherjeeRC22,
  author       = {Rijoy Mukherjee and
                  Sree Ranjani Rajendran and
                  Rajat Subhra Chakraborty},
  title        = {A comprehensive survey of physical and logic testing techniques for
                  Hardware Trojan detection and prevention},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {495--522},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-022-00295-w},
  doi          = {10.1007/S13389-022-00295-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MukherjeeRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NathS22,
  author       = {Kaushik Nath and
                  Palash Sarkar},
  title        = {Security and efficiency trade-offs for elliptic curve Diffie-Hellman
                  at the 128-bit and 224-bit security levels},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {107--121},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00261-y},
  doi          = {10.1007/S13389-021-00261-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NathS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OuladjGGM22,
  author       = {Maamar Ouladj and
                  Sylvain Guilley and
                  Philippe Guillot and
                  Farid Mokrane},
  title        = {Spectral approach to process the (multivariate) high-order template
                  attack against any masking scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {75--93},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-020-00253-4},
  doi          = {10.1007/S13389-020-00253-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OuladjGGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Ruhrmair22,
  author       = {Ulrich R{\"{u}}hrmair},
  title        = {Secret-free security: a survey and tutorial},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {387--412},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00283-6},
  doi          = {10.1007/S13389-021-00283-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Ruhrmair22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SaarinenNM22,
  author       = {Markku{-}Juhani O. Saarinen and
                  G. Richard Newell and
                  Ben Marshall},
  title        = {Development of the {RISC-V} entropy source interface},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {4},
  pages        = {371--386},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00275-6},
  doi          = {10.1007/S13389-021-00275-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SaarinenNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WinderickxBSM22,
  author       = {Jori Winderickx and
                  An Braeken and
                  Dave Singel{\'{e}}e and
                  Nele Mentens},
  title        = {In-depth energy analysis of security algorithms and protocols for
                  the Internet of Things},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {137--149},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00274-7},
  doi          = {10.1007/S13389-021-00274-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WinderickxBSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YeniarasC22,
  author       = {Esra Yeniaras and
                  Murat Cenk},
  title        = {Faster characteristic three polynomial multiplication and its application
                  to {NTRU} Prime decapsulation},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {3},
  pages        = {329--348},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00282-7},
  doi          = {10.1007/S13389-021-00282-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YeniarasC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AbarzuaCL21,
  author       = {Rodrigo Abarz{\'{u}}a and
                  Claudio Valencia Cordero and
                  Julio L{\'{o}}pez},
  title        = {Survey on performance and security problems of countermeasures for
                  passive side-channel attacks on {ECC}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {71--102},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00257-8},
  doi          = {10.1007/S13389-021-00257-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AbarzuaCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AzrielSAGMP21,
  author       = {Leonid Azriel and
                  Julian Speith and
                  Nils Albartus and
                  Ran Ginosar and
                  Avi Mendelson and
                  Christof Paar},
  title        = {A survey of algorithmic methods in {IC} reverse engineering},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {299--315},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00268-5},
  doi          = {10.1007/S13389-021-00268-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AzrielSAGMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BajardD21,
  author       = {Jean{-}Claude Bajard and
                  Sylvain Duquesne},
  title        = {Montgomery-friendly primes and applications to cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {399--415},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00260-z},
  doi          = {10.1007/S13389-021-00260-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BajardD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BandaraK21,
  author       = {Sahan Bandara and
                  Michel A. Kinsy},
  title        = {Adaptive caches as a defense mechanism against cache side-channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {239--255},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00246-3},
  doi          = {10.1007/S13389-020-00246-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BandaraK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BronchainSS21,
  author       = {Olivier Bronchain and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Reducing risks through simplicity: high side-channel security for
                  lazy engineers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {39--55},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00241-8},
  doi          = {10.1007/S13389-020-00241-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BronchainSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChangHRS21,
  author       = {Chip{-}Hong Chang and
                  Daniel E. Holcomb and
                  Ulrich R{\"{u}}hrmair and
                  Patrick Schaumont},
  title        = {The {ASHES} 2019 special issue at {JCEN}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {199--200},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00270-x},
  doi          = {10.1007/S13389-021-00270-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChangHRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChengCGDG21,
  author       = {Wei Cheng and
                  Claude Carlet and
                  Kouassi Goli and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {Detecting faults in inner product masking scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {119--133},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00227-6},
  doi          = {10.1007/S13389-020-00227-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChengCGDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GanjiTSSTF21,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Pascal Stauss and
                  Jean{-}Pierre Seifert and
                  Mark M. Tehranipoor and
                  Domenic Forte},
  title        = {Rock'n'roll PUFs: crafting provably secure pufs from less secure ones
                  (extended version)},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {105--118},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00226-7},
  doi          = {10.1007/S13389-020-00226-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GanjiTSSTF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GuCLHMO21,
  author       = {Chongyan Gu and
                  Chip{-}Hong Chang and
                  Weiqiang Liu and
                  Neil Hanley and
                  Jack Miskelly and
                  M{\'{a}}ire O'Neill},
  title        = {A large-scale comprehensive evaluation of single-slice ring oscillator
                  and PicoPUF bit cells on 28-nm Xilinx FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {227--238},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00244-5},
  doi          = {10.1007/S13389-020-00244-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GuCLHMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HeydemannL21,
  author       = {Karine Heydemann and
                  Letitia Li},
  title        = {Editorial about {PROOFS} 2019},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {103--104},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00236-5},
  doi          = {10.1007/S13389-020-00236-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HeydemannL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HeydemannL21a,
  author       = {Karine Heydemann and
                  Letitia Li},
  title        = {Correction to: Editorial about {PROOFS} 2019},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {197},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00266-7},
  doi          = {10.1007/S13389-021-00266-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HeydemannL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HoweMOR21,
  author       = {James Howe and
                  Marco Martinoli and
                  Elisabeth Oswald and
                  Francesco Regazzoni},
  title        = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {317--327},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00258-7},
  doi          = {10.1007/S13389-021-00258-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HoweMOR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JacobsonK21,
  author       = {Michael John Jacobson Jr. and
                  Prabhat Kushwaha},
  title        = {Removable weak keys for discrete logarithm-based cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {181--195},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00250-7},
  doi          = {10.1007/S13389-020-00250-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JacobsonK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KamelBBS21,
  author       = {Dina Kamel and
                  Davide Bellizia and
                  Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-channel analysis of a learning parity with physical noise processor},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {171--179},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00238-3},
  doi          = {10.1007/S13389-020-00238-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KamelBBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KerenP21,
  author       = {Osnat Keren and
                  Ilia Polian},
  title        = {{IPM-RED:} combining higher-order masking with robust error detection},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {147--160},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00229-4},
  doi          = {10.1007/S13389-020-00229-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KerenP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LombardiaBB21,
  author       = {Sergio Rold{\'{a}}n Lombard{\'{\i}}a and
                  Fatih Balli and
                  Subhadeep Banik},
  title        = {Six shades lighter: a bit-serial implementation of the {AES} family},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {417--439},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00265-8},
  doi          = {10.1007/S13389-021-00265-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LombardiaBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MittmannS21,
  author       = {Johannes Mittmann and
                  Werner Schindler},
  title        = {Timing attacks and local timing attacks against Barrett's modular
                  multiplication algorithm},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {369--397},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00254-3},
  doi          = {10.1007/S13389-020-00254-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MittmannS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NashimotoSMMMN21,
  author       = {Shoei Nashimoto and
                  Daisuke Suzuki and
                  Noriyuki Miura and
                  Tatsuya Machida and
                  Kohei Matsuda and
                  Makoto Nagata},
  title        = {Low-cost distance-spoofing attack on {FMCW} radar and its feasibility
                  study on countermeasure},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {289--298},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00252-5},
  doi          = {10.1007/S13389-020-00252-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NashimotoSMMMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PereiraDJ21,
  author       = {Geovandro C. C. F. Pereira and
                  Javad Doliskani and
                  David Jao},
  title        = {x-only point addition formula and faster compressed {SIKE}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {57--69},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00245-4},
  doi          = {10.1007/S13389-020-00245-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PereiraDJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PerianinCDFG21,
  author       = {Thomas Perianin and
                  S{\'{e}}bastien Carr{\'{e}} and
                  Victor Dyseryn and
                  Adrien Facon and
                  Sylvain Guilley},
  title        = {End-to-end automated cache-timing attack driven by machine learning},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {135--146},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00228-5},
  doi          = {10.1007/S13389-020-00228-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PerianinCDFG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PerinZCMP21,
  author       = {Lucas Pandolfo Perin and
                  Gustavo Zambonin and
                  Ricardo Felipe Cust{\'{o}}dio and
                  Lucia Moura and
                  Daniel Panario},
  title        = {Improved constant-sum encodings for hash-based signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {329--351},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00264-9},
  doi          = {10.1007/S13389-021-00264-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PerinZCMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RamezanpourAD21,
  author       = {Keyvan Ramezanpour and
                  Paul Ampadu and
                  William Diehl},
  title        = {Fault intensity map analysis with neural network key distinguisher},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {273--288},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00249-0},
  doi          = {10.1007/S13389-020-00249-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RamezanpourAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ResendeA21,
  author       = {Amanda Cristina Davi Resende and
                  Diego de Freitas Aranha},
  title        = {Faster unbalanced Private Set Intersection in the semi-honest setting},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {21--38},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00242-7},
  doi          = {10.1007/S13389-020-00242-7},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/ResendeA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ShiozakiF21,
  author       = {Mitsuru Shiozaki and
                  Takeshi Fujino},
  title        = {Simple electromagnetic analysis attack based on geometric leak on
                  {ASIC} implementation of ring-oscillator {PUF}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {201--212},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00240-9},
  doi          = {10.1007/S13389-020-00240-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ShiozakiF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/TrouchkineBELB21,
  author       = {Thomas Trouchkine and
                  S{\'{e}}banjila Kevin Bukasa and
                  Mathieu Escouteloup and
                  Ronan Lashermes and
                  Guillaume Bouffard},
  title        = {Electromagnetic fault injection against a complex CPU, toward new
                  micro-architectural fault models},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {4},
  pages        = {353--367},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-021-00259-6},
  doi          = {10.1007/S13389-021-00259-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/TrouchkineBELB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UenoTHH21,
  author       = {Rei Ueno and
                  Junko Takahashi and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma},
  title        = {A method for constructing sliding windows leak from noisy cache timing
                  information},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {161--170},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00230-x},
  doi          = {10.1007/S13389-020-00230-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UenoTHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UntersteinJHGH21,
  author       = {Florian Unterstein and
                  Nisha Jacob and
                  Neil Hanley and
                  Chongyan Gu and
                  Johann Heyszl},
  title        = {{SCA} secure and updatable crypto engines for {FPGA} SoC bitstream
                  decryption: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {257--272},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00247-2},
  doi          = {10.1007/S13389-020-00247-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UntersteinJHGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YeoLK21,
  author       = {Sze Ling Yeo and
                  Duc{-}Phong Le and
                  Khoongming Khoo},
  title        = {Improved algebraic attacks on lightweight block ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {1--19},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00237-4},
  doi          = {10.1007/S13389-020-00237-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YeoLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ZhangJCZG21,
  author       = {Yuqiao Zhang and
                  Ayush Jain and
                  Pinchen Cui and
                  Ziqi Zhou and
                  Ujjwal Guin},
  title        = {A novel topology-guided attack and its countermeasure towards secure
                  logic locking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {11},
  number       = {3},
  pages        = {213--226},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13389-020-00243-6},
  doi          = {10.1007/S13389-020-00243-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ZhangJCZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AbarzuaMMT20,
  author       = {Rodrigo Abarz{\'{u}}a and
                  Santi Mart{\'{\i}}nez and
                  Valeria Mendoza and
                  Nicolas Th{\'{e}}riault},
  title        = {Same value analysis on Edwards curves},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {27--48},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00206-6},
  doi          = {10.1007/S13389-019-00206-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/AbarzuaMMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AlamMKLS20,
  author       = {Manaar Alam and
                  Debdeep Mukhopadhyay and
                  Sai Praveen Kadiyala and
                  Siew{-}Kei Lam and
                  Thambipillai Srikanthan},
  title        = {Improving accuracy of HPC-based malware classification for embedded
                  platforms using gradient descent optimization},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {289--303},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00232-9},
  doi          = {10.1007/S13389-020-00232-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AlamMKLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BaksiSS20,
  author       = {Anubhab Baksi and
                  Dhiman Saha and
                  Sumanta Sarkar},
  title        = {To infect or not to infect: a critical analysis of infective countermeasures
                  in fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {355--374},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00224-9},
  doi          = {10.1007/S13389-020-00224-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BaksiSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BartheBDFGSS20,
  author       = {Gilles Barthe and
                  Sonia Bela{\"{\i}}d and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Pierre{-}Yves Strub},
  title        = {Improved parallel mask refreshing algorithms: generic solutions with
                  parametrized non-interference and automated optimizations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {17--26},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-018-00202-2},
  doi          = {10.1007/S13389-018-00202-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BartheBDFGSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaM20,
  author       = {Lejla Batina and
                  Nele Mentens},
  title        = {{PROOFS} 2018 Editorial},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {287},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00248-1},
  doi          = {10.1007/S13389-020-00248-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BenadjilaPSCD20,
  author       = {Ryad Benadjila and
                  Emmanuel Prouff and
                  R{\'{e}}mi Strullu and
                  Eleonora Cagli and
                  C{\'{e}}cile Dumas},
  title        = {Deep learning for side-channel analysis and introduction to {ASCAD}
                  database},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {163--188},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00220-8},
  doi          = {10.1007/S13389-019-00220-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BenadjilaPSCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BosF20,
  author       = {Joppe W. Bos and
                  Simon Friedberger},
  title        = {Faster modular arithmetic for isogeny-based crypto on embedded devices},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {97--109},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00214-6},
  doi          = {10.1007/S13389-019-00214-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BosF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CruzGA20,
  author       = {Rafael J. Cruz and
                  Antonio Guimar{\~{a}}es and
                  Diego F. Aranha},
  title        = {Efficient and secure software implementations of Fantomas},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {211--228},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00218-2},
  doi          = {10.1007/S13389-019-00218-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CruzGA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DidierDV20,
  author       = {Laurent{-}St{\'{e}}phane Didier and
                  Fangan{-}Yssouf Dosso and
                  Pascal V{\'{e}}ron},
  title        = {Efficient modular operations using the adapted modular number system},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {111--133},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00221-7},
  doi          = {10.1007/S13389-019-00221-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DidierDV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GayKKP20,
  author       = {Mael Gay and
                  Batya Karp and
                  Osnat Keren and
                  Ilia Polian},
  title        = {Error control scheme for malicious and natural faults in cryptographic
                  modules},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {321--336},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00234-7},
  doi          = {10.1007/S13389-020-00234-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GayKKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoubinPRW20,
  author       = {Louis Goubin and
                  Pascal Paillier and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {How to reveal the secrets of an obscure white-box implementation},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {49--66},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00207-5},
  doi          = {10.1007/S13389-019-00207-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HettwerGG20,
  author       = {Benjamin Hettwer and
                  Stefan Gehrer and
                  Tim G{\"{u}}neysu},
  title        = {Applications of machine learning techniques in side-channel attacks:
                  a survey},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {135--162},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00212-8},
  doi          = {10.1007/S13389-019-00212-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HettwerGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HillerKS20,
  author       = {Matthias Hiller and
                  Ludwig K{\"{u}}rzinger and
                  Georg Sigl},
  title        = {Review of error correction for PUFs and evaluation on state-of-the-art
                  FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {229--247},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00223-w},
  doi          = {10.1007/S13389-020-00223-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HillerKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JauvartMFG20,
  author       = {Damien Jauvart and
                  Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  title        = {Improving side-channel attacks against pairing-based cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {1--16},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-018-00201-3},
  doi          = {10.1007/S13389-018-00201-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OrumiehchihaRSP20,
  author       = {Mohammad Ali Orumiehchiha and
                  Saeed Rostami and
                  Elham Shakour and
                  Josef Pieprzyk},
  title        = {A differential fault attack on the {WG} family of stream ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {2},
  pages        = {189--195},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00222-x},
  doi          = {10.1007/S13389-020-00222-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OrumiehchihaRSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OuladjMGGM20,
  author       = {Maamar Ouladj and
                  Nadia El Mrabet and
                  Sylvain Guilley and
                  Philippe Guillot and
                  Gilles Mill{\'{e}}rioux},
  title        = {On the power of template attacks in highly multivariate context},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {337--354},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00239-2},
  doi          = {10.1007/S13389-020-00239-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OuladjMGGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PiccoliVR20,
  author       = {Alessandro De Piccoli and
                  Andrea Visconti and
                  Ottavio Giulio Rizzo},
  title        = {Polynomial multiplication over binary finite fields: new upper bounds},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {197--210},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00210-w},
  doi          = {10.1007/S13389-019-00210-W},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/PiccoliVR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RichterM20,
  author       = {Bastian Richter and
                  Amir Moradi},
  title        = {Template attacks on nano-scale {CMOS} devices},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {275--285},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00225-8},
  doi          = {10.1007/S13389-020-00225-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RichterM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Schoinianakis20,
  author       = {Dimitrios Schoinianakis},
  title        = {Residue arithmetic systems in cryptography: a survey on modern security
                  applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {249--267},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00231-w},
  doi          = {10.1007/S13389-020-00231-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Schoinianakis20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SijacicBYGV20,
  author       = {Danilo Sijacic and
                  Josep Balasch and
                  Bohan Yang and
                  Santosh Ghosh and
                  Ingrid Verbauwhede},
  title        = {Towards efficient and automated side-channel evaluations at design
                  time},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {4},
  pages        = {305--319},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00233-8},
  doi          = {10.1007/S13389-020-00233-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SijacicBYGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Wiemers20,
  author       = {Andreas Wiemers},
  title        = {A remark on a success rate model for side-channel attack analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {269--274},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-020-00235-6},
  doi          = {10.1007/S13389-020-00235-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Wiemers20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WillersHGSD20,
  author       = {Oliver Willers and
                  Christopher Huth and
                  Jorge Guajardo and
                  Helmut Seidel and
                  Peter W. Deutsch},
  title        = {On the feasibility of deriving cryptographic keys from {MEMS} sensors},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {67--83},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00208-4},
  doi          = {10.1007/S13389-019-00208-4},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/WillersHGSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ZhouS20,
  author       = {Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Deep learning mitigates but does not annihilate the need of aligned
                  traces and a generalized ResNet model for side-channel attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {10},
  number       = {1},
  pages        = {85--95},
  year         = {2020},
  url          = {https://doi.org/10.1007/s13389-019-00209-3},
  doi          = {10.1007/S13389-019-00209-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ZhouS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/0003RM19,
  author       = {Poulami Das and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay},
  title        = {Automatic generation of HCCA-resistant scalar multiplication algorithm
                  by proper sequencing of field multiplier operands},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {263--275},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00219-1},
  doi          = {10.1007/S13389-019-00219-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/0003RM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BanegasCP19,
  author       = {Gustavo Banegas and
                  Ricardo Felipe Cust{\'{o}}dio and
                  Daniel Panario},
  title        = {A new class of irreducible pentanomials for polynomial-based multipliers
                  in binary fields},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {359--373},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0197-6},
  doi          = {10.1007/S13389-018-0197-6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BanegasCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BanikBR19,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Francesco Regazzoni},
  title        = {Compact circuits for combined {AES} encryption/decryption},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {69--83},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0176-3},
  doi          = {10.1007/S13389-017-0176-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BanikBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaCPST19,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Michael Tunstall},
  title        = {Online template attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {21--36},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0171-8},
  doi          = {10.1007/S13389-017-0171-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BaumannSD19,
  author       = {Christoph Baumann and
                  Oliver Schwarz and
                  Mads Dam},
  title        = {On the verification of system-level information flow properties for
                  virtualized execution platforms},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {243--261},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00216-4},
  doi          = {10.1007/S13389-019-00216-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BaumannSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGT19,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {303--312},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0194-9},
  doi          = {10.1007/S13389-018-0194-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CianfrigliaGBLP19,
  author       = {Marco Cianfriglia and
                  Stefano Guarino and
                  Massimo Bernaschi and
                  Flavio Lombardi and
                  Marco Pedicini},
  title        = {Kite attack: reshaping the cube attack for a flexible GPU-based maxterm
                  search},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {375--392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00217-3},
  doi          = {10.1007/S13389-019-00217-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CianfrigliaGBLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DinuCKPGB19,
  author       = {Daniel Dinu and
                  Yann Le Corre and
                  Dmitry Khovratovich and
                  L{\'{e}}o Perrin and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Alex Biryukov},
  title        = {Triathlon of lightweight block ciphers for the Internet of things},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {283--302},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0193-x},
  doi          = {10.1007/S13389-018-0193-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DinuCKPGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DiopLOLM19,
  author       = {Ibrahima Diop and
                  Yanis Linge and
                  Thomas Ordas and
                  Pierre{-}Yvan Liardet and
                  Philippe Maurine},
  title        = {From theory to practice: horizontal attacks on protected implementations
                  of modular exponentiations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {37--52},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0181-1},
  doi          = {10.1007/S13389-018-0181-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DiopLOLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DruckerG19,
  author       = {Nir Drucker and
                  Shay Gueron},
  title        = {A toolbox for software optimization of {QC-MDPC} code-based cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {341--357},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-00200-4},
  doi          = {10.1007/S13389-018-00200-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DruckerG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GeraudN19,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Mixed-radix Naccache-Stern encryption},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {277--282},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0188-7},
  doi          = {10.1007/S13389-018-0188-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GeraudN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HerbertBF19,
  author       = {Vincent Herbert and
                  Bhaskar Biswas and
                  Caroline Fontaine},
  title        = {Design and implementation of low-depth pairing-based homomorphic encryption
                  scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {185--201},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0192-y},
  doi          = {10.1007/S13389-018-0192-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HerbertBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutchinsonK19,
  author       = {Aaron Hutchinson and
                  Koray Karabina},
  title        = {Constructing multidimensional differential addition chains and their
                  applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {1--19},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0177-2},
  doi          = {10.1007/S13389-017-0177-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutchinsonK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutterT19,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-time higher-order Boolean-to-arithmetic masking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {173--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0191-z},
  doi          = {10.1007/S13389-018-0191-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KawamuraKSY19,
  author       = {Shinichi Kawamura and
                  Yuichi Komano and
                  Hideo Shimizu and
                  Tomoko Yonemura},
  title        = {{RNS} Montgomery reduction algorithms using quadratic residuosity},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {313--331},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0195-8},
  doi          = {10.1007/S13389-018-0195-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KawamuraKSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Konheim19,
  author       = {Alan G. Konheim},
  title        = {Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm
                  that changed cryptology},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {85--100},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0198-5},
  doi          = {10.1007/S13389-018-0198-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Konheim19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LevinaMST19,
  author       = {Alla Levina and
                  Roman Mostovoi and
                  Daria Sleptsova and
                  Lavrentii Tcvetkov},
  title        = {Physical model of sensitive data leakage from PC-based cryptographic
                  systems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {393--400},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00215-5},
  doi          = {10.1007/S13389-019-00215-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LevinaMST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OuahmaMHE19,
  author       = {In{\`{e}}s Ben El Ouahma and
                  Quentin L. Meunier and
                  Karine Heydemann and
                  Emmanuelle Encrenaz},
  title        = {Side-channel robustness analysis of masked assembly codes using a
                  symbolic approach},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {231--242},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00205-7},
  doi          = {10.1007/S13389-019-00205-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OuahmaMHE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PeccerilloBK19,
  author       = {Biagio Peccerillo and
                  Sandro Bartolini and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel bitsliced {AES} through {PHAST:} a single-source high-performance
                  library for multi-cores and GPUs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {159--171},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0175-4},
  doi          = {10.1007/S13389-017-0175-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/PeccerilloBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobertNP19,
  author       = {Jean{-}Marc Robert and
                  Christophe N{\`{e}}gre and
                  Thomas Plantard},
  title        = {Efficient Fixed-base exponentiation and scalar multiplication based
                  on a multiplicative splitting exponent recoding},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {115--136},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0196-7},
  doi          = {10.1007/S13389-018-0196-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RobertNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SahaC19,
  author       = {Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  title        = {Internal differential fault analysis of parallelizable ciphers in
                  the counter-mode},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {53--67},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0179-0},
  doi          = {10.1007/S13389-017-0179-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SahaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SahaKMD19,
  author       = {Sayandeep Saha and
                  Ujjawal Kumar and
                  Debdeep Mukhopadhyay and
                  Pallab Dasgupta},
  title        = {An automated framework for exploitable fault identification in block
                  ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {203--219},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00203-9},
  doi          = {10.1007/S13389-019-00203-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SahaKMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SaldamliB19,
  author       = {G{\"{o}}kay Saldamli and
                  Yoo{-}Jin Baek},
  title        = {Uniform Montgomery multiplier},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {333--339},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00213-7},
  doi          = {10.1007/S13389-019-00213-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SaldamliB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UenoHNA19,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Yasuyuki Nogami and
                  Takafumi Aoki},
  title        = {Highly efficient GF(2\({}^{\mbox{8}}\)) inversion circuit based on
                  hybrid {GF} representations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {101--113},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0187-8},
  doi          = {10.1007/S13389-018-0187-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UenoHNA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UnterluggauerWM19,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  title        = {{MEAS:} memory encryption and authentication secure against side-channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {137--158},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0180-2},
  doi          = {10.1007/S13389-018-0180-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UnterluggauerWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WisiolM19,
  author       = {Nils Wisiol and
                  Marian Margraf},
  title        = {Why attackers lose: design and security analysis of arbitrarily large
                  {XOR} arbiter PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {221--230},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00204-8},
  doi          = {10.1007/S13389-019-00204-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WisiolM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WuW19,
  author       = {Tao Wu and
                  Ruomei Wang},
  title        = {Fast unified elliptic curve point multiplication for {NIST} prime
                  curves on FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {401--410},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00211-9},
  doi          = {10.1007/S13389-019-00211-9},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WuW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BajardEM18,
  author       = {Jean{-}Claude Bajard and
                  Julien Eynard and
                  Nabil Merkiche},
  title        = {Montgomery reduction within the context of residue number system arithmetic},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {189--200},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0154-9},
  doi          = {10.1007/S13389-017-0154-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BajardEM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Cenk18,
  author       = {Murat Cenk},
  title        = {Karatsuba-like formulae and their associated techniques},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {259--269},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0155-8},
  doi          = {10.1007/S13389-017-0155-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/Cenk18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChakrabortiCHN18,
  author       = {Avik Chakraborti and
                  Anupam Chattopadhyay and
                  Muhammad Hassan and
                  Mridul Nandi},
  title        = {TriviA and uTriviA: two fast and secure authenticated encryption schemes},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {29--48},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-016-0137-2},
  doi          = {10.1007/S13389-016-0137-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChakrabortiCHN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChakrabortyMS18,
  author       = {Debrup Chakraborty and
                  Cuauhtemoc Mancillas L{\'{o}}pez and
                  Palash Sarkar},
  title        = {Disk encryption: do we need to preserve length?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {49--69},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-016-0147-0},
  doi          = {10.1007/S13389-016-0147-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChakrabortyMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Chou18,
  author       = {Tung Chou},
  title        = {McBits revisited: toward a fast constant-time code-based {KEM}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {95--107},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0186-9},
  doi          = {10.1007/S13389-018-0186-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Chou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CostelloS18,
  author       = {Craig Costello and
                  Benjamin Smith},
  title        = {Montgomery curves and their arithmetic - The case of large characteristic
                  fields},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {227--240},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0157-6},
  doi          = {10.1007/S13389-017-0157-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CostelloS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DaiC18,
  author       = {Wangchen Dai and
                  Ray C. C. Cheung},
  title        = {Spectral arithmetic in Montgomery modular multiplication},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {211--226},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0151-z},
  doi          = {10.1007/S13389-017-0151-Z},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DaiC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DeValeRR18,
  author       = {John DeVale and
                  Ryan N. Rakvic and
                  Kevin Rudd},
  title        = {Another dimension in integrated circuit trust},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {315--326},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0164-7},
  doi          = {10.1007/S13389-017-0164-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DeValeRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DossoHMV18,
  author       = {Fangan{-}Yssouf Dosso and
                  Fabien Herbaut and
                  Nicolas M{\'{e}}loni and
                  Pascal V{\'{e}}ron},
  title        = {Euclidean addition chains scalar multiplication on curves with efficient
                  endomorphism},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {351--367},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0190-0},
  doi          = {10.1007/S13389-018-0190-0},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DossoHMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FariasAB18,
  author       = {Luckas A. Farias and
                  Bruno C. Albertini and
                  Paulo S. L. M. Barreto},
  title        = {A class of safe and efficient binary Edwards curves},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {271--283},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0174-5},
  doi          = {10.1007/S13389-017-0174-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FariasAB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FerradiGMNW18,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  Diana Maimut and
                  David Naccache and
                  Amaury de Wargny},
  title        = {Regulating the pace of von Neumann correctors},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {85--91},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0153-x},
  doi          = {10.1007/S13389-017-0153-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FerradiGMNW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FischerH18,
  author       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Introduction to the {CHES} 2017 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {93--94},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0189-6},
  doi          = {10.1007/S13389-018-0189-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FischerH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GeYCH18,
  author       = {Qian Ge and
                  Yuval Yarom and
                  David A. Cock and
                  Gernot Heiser},
  title        = {A survey of microarchitectural timing attacks and countermeasures
                  on contemporary hardware},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {1--27},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-016-0141-6},
  doi          = {10.1007/S13389-016-0141-6},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/GeYCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossM18,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard},
  title        = {A unified masking approach},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {109--124},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0184-y},
  doi          = {10.1007/S13389-018-0184-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GrossM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HatzivasilisFPM18,
  author       = {George Hatzivasilis and
                  Konstantinos Fysarakis and
                  Ioannis Papaefstathiou and
                  Charalampos Manifavas},
  title        = {A review of lightweight block ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {141--184},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0160-y},
  doi          = {10.1007/S13389-017-0160-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HatzivasilisFPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ImmlerSU18,
  author       = {Vincent Immler and
                  Robert Specht and
                  Florian Unterstein},
  title        = {Your rails cannot hide from localized {EM:} how dual-rail logic fails
                  on FPGAs - extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {125--139},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0185-x},
  doi          = {10.1007/S13389-018-0185-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ImmlerSU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/JarvinenRV18,
  author       = {Kimmo J{\"{a}}rvinen and
                  Sujoy Sinha Roy and
                  Ingrid Verbauwhede},
  title        = {Arithmetic of {\textdollar}{\textdollar}{\textbackslash}tau {\textdollar}{\textdollar}
                  {\(\tau\)} -adic expansions for lightweight Koblitz curve cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {285--300},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0182-0},
  doi          = {10.1007/S13389-018-0182-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/JarvinenRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KarmakarC18,
  author       = {Sandip Karmakar and
                  Dipanwita Roy Chowdhury},
  title        = {Scan-based side channel attack on stream ciphers and its prevention},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {327--340},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0178-1},
  doi          = {10.1007/S13389-017-0178-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KarmakarC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LermanPMS18,
  author       = {Liran Lerman and
                  Romain Poussier and
                  Olivier Markowitch and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Template attacks versus machine learning revisited and the curse of
                  dimensionality in side-channel analysis: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {301--313},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0162-9},
  doi          = {10.1007/S13389-017-0162-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LermanPMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OliveiraLR18,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {The Montgomery ladder on binary elliptic curves},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {241--258},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0163-8},
  doi          = {10.1007/S13389-017-0163-8},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OliveiraLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Rodriguez-Henriquez18,
  author       = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Erkay Savas},
  title        = {Special issue in honor of Peter Lawrence Montgomery},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {185--187},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0168-3},
  doi          = {10.1007/S13389-017-0168-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Rodriguez-Henriquez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Saarinen18,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {Arithmetic coding and blinding countermeasures for lattice signatures
                  - Engineering a side-channel resistant post-quantum signature scheme
                  with compact signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {71--84},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0149-6},
  doi          = {10.1007/S13389-017-0149-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Saarinen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SavasK18,
  author       = {Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Montgomery inversion},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {201--210},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-017-0161-x},
  doi          = {10.1007/S13389-017-0161-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/SavasK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Skoric18,
  author       = {Boris Skoric},
  title        = {A trivial debiasing scheme for Helper Data Systems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {8},
  number       = {4},
  pages        = {341--349},
  year         = {2018},
  url          = {https://doi.org/10.1007/s13389-018-0183-z},
  doi          = {10.1007/S13389-018-0183-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Skoric18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AldayaSS17,
  author       = {Alejandro Cabrera Aldaya and
                  Alejandro Cabrera Sarmiento and
                  Santiago S{\'{a}}nchez{-}Solano},
  title        = {{SPA} vulnerabilities of the binary extended Euclidean algorithm},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {273--285},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0135-4},
  doi          = {10.1007/S13389-016-0135-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AldayaSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AzziBCV17,
  author       = {Sabine Azzi and
                  Bruno Barras and
                  Maria Christofi and
                  David Vigilant},
  title        = {Using linear codes as a fault countermeasure for nonlinear operations:
                  application to {AES} and formal verification},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {75--85},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0138-1},
  doi          = {10.1007/S13389-016-0138-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AzziBCV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BhattacharyaM17,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  title        = {Formal fault analysis of branch predictors: attacking countermeasures
                  of asymmetric key ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {299--310},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0165-6},
  doi          = {10.1007/S13389-017-0165-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BhattacharyaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BossGGL0017,
  author       = {Erik Boss and
                  Vincent Grosso and
                  Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi and
                  Tobias Schneider},
  title        = {Strong 8-bit Sboxes with efficient masking in hardware extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {149--165},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0156-7},
  doi          = {10.1007/S13389-017-0156-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BossGGL0017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BottinelliB17,
  author       = {Paul Bottinelli and
                  Joppe W. Bos},
  title        = {Computational aspects of correlation power analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {167--181},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0122-9},
  doi          = {10.1007/S13389-016-0122-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BottinelliB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BreierJB17,
  author       = {Jakub Breier and
                  Dirmanto Jap and
                  Shivam Bhasin},
  title        = {A study on analyzing side-channel resistant encoding schemes with
                  respect to fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {311--320},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0166-5},
  doi          = {10.1007/S13389-017-0166-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BreierJB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BruneauGHMR17,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Optimal side-channel attacks for multivariate leakages and multiple
                  models},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {331--341},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0170-9},
  doi          = {10.1007/S13389-017-0170-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarboneTDM17,
  author       = {Mathieu Carbone and
                  Yannick Teglia and
                  Gilles R. Ducharme and
                  Philippe Maurine},
  title        = {Mutual information analysis: higher-order statistical moments, efficiency
                  and efficacy},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {1--17},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0123-8},
  doi          = {10.1007/S13389-016-0123-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarboneTDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DugardinGMNR17,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Martin Moreau and
                  Zakaria Najm and
                  Pablo Rauzy},
  title        = {Using modular extension to provably protect Edwards curves against
                  fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {321--330},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0167-4},
  doi          = {10.1007/S13389-017-0167-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DurvauxSP17,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Santos Merino Del Pozo},
  title        = {Towards easy leakage certification: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {129--147},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0150-0},
  doi          = {10.1007/S13389-017-0150-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DurvauxSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GanjiTFS17,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Fabian F{\"{a}}{\ss}ler and
                  Jean{-}Pierre Seifert},
  title        = {Having no mathematical model may not secure PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {113--128},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0159-4},
  doi          = {10.1007/S13389-017-0159-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GanjiTFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GierlichsP17,
  author       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Introduction to the {CHES} 2016 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {97--98},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0158-5},
  doi          = {10.1007/S13389-017-0158-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GierlichsP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Guilley17,
  author       = {Sylvain Guilley},
  title        = {Editorial about {PROOFS} 2015},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {19--20},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0140-7},
  doi          = {10.1007/S13389-016-0140-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Guilley17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Homma17,
  author       = {Naofumi Homma},
  title        = {Introduction to the {PROOFS} 2016 special section},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {297--298},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0173-6},
  doi          = {10.1007/S13389-017-0173-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Homma17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/IdrissiBLH17,
  author       = {Noreddine El Janati El Idrissi and
                  Guillaume Bouffard and
                  Jean{-}Louis Lanet and
                  Said El Hajji},
  title        = {Trust can be misplaced},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {21--34},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0142-5},
  doi          = {10.1007/S13389-016-0142-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/IdrissiBLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LugouAF17,
  author       = {Florian Lugou and
                  Ludovic Apvrille and
                  Aur{\'{e}}lien Francillon},
  title        = {{SMASHUP:} a toolchain for unified verification of hardware/software
                  co-designs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {63--74},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0145-2},
  doi          = {10.1007/S13389-016-0145-2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/LugouAF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MayhewM17,
  author       = {Matthew Mayhew and
                  Radu Muresan},
  title        = {An overview of hardware-level statistical power analysis attack countermeasures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {213--244},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0133-6},
  doi          = {10.1007/S13389-016-0133-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MayhewM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NashimotoHHTFA17,
  author       = {Shoei Nashimoto and
                  Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Junko Takahashi and
                  Hitoshi Fuji and
                  Takafumi Aoki},
  title        = {Buffer overflow attack with multiple fault injection and a proven
                  countermeasure},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {35--46},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0136-3},
  doi          = {10.1007/S13389-016-0136-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NashimotoHHTFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NegreP17,
  author       = {Christophe N{\`{e}}gre and
                  Thomas Plantard},
  title        = {Efficient regular modular exponentiation using multiplicative half-size
                  splitting},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {245--253},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0134-5},
  doi          = {10.1007/S13389-016-0134-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NegreP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OrdasGM17,
  author       = {S{\'{e}}bastien Ordas and
                  Ludovic Guillaume{-}Sage and
                  Philippe Maurine},
  title        = {Electromagnetic fault injection: the curse of flip-flops},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {183--197},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0128-3},
  doi          = {10.1007/S13389-016-0128-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OrdasGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PasalicCZ17,
  author       = {Enes Pasalic and
                  Anupam Chattopadhyay and
                  WeiGuo Zhang},
  title        = {Efficient implementation of generalized Maiorana-McFarland class of
                  cryptographic functions},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {287--295},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0139-0},
  doi          = {10.1007/S13389-016-0139-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PasalicCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template attack versus Bayes classifier},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {343--351},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0172-7},
  doi          = {10.1007/S13389-017-0172-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobissonASHWBP17,
  author       = {Bruno Robisson and
                  Michel Agoyan and
                  Patrick Soquet and
                  S{\'{e}}bastien Le Henaff and
                  Franck Wajsb{\"{u}}rt and
                  Pirouz Bazargan{-}Sabet and
                  Guillaume Phan},
  title        = {Smart security management in secure devices},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {47--61},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0143-4},
  doi          = {10.1007/S13389-016-0143-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RobissonASHWBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SauvageGP17,
  author       = {Laurent Sauvage and
                  Tarik Graba and
                  Thibault Porteboeuf},
  title        = {Multi-level formal verification - {A} new approach against fault injection
                  attack},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {87--95},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0144-3},
  doi          = {10.1007/S13389-016-0144-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SauvageGP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchindlerW17,
  author       = {Werner Schindler and
                  Andreas Wiemers},
  title        = {Generic power attacks on {RSA} with {CRT} and exponent blinding: new
                  results},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {255--272},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0146-1},
  doi          = {10.1007/S13389-016-0146-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchindlerW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SwierczynskiFKM17,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Amir Moradi and
                  Christof Paar},
  title        = {Interdiction in practice - Hardware Trojan against a high-security
                  {USB} flash drive},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {199--211},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0132-7},
  doi          = {10.1007/S13389-016-0132-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SwierczynskiFKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YaromGH17,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  title        = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {99--112},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0152-y},
  doi          = {10.1007/S13389-017-0152-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YaromGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BayonBAF16,
  author       = {Pierre Bayon and
                  Lilian Bossuet and
                  Alain Aubert and
                  Viktor Fischer},
  title        = {Fault model of electromagnetic attacks targeting ring oscillator-based
                  true random number generators},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {1},
  pages        = {61--74},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0113-2},
  doi          = {10.1007/S13389-015-0113-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BayonBAF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BosCLN16,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  Patrick Longa and
                  Michael Naehrig},
  title        = {Selecting elliptic curves for cryptography: an efficiency and security
                  analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {259--286},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0097-y},
  doi          = {10.1007/S13389-015-0097-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BosCLN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CoiselS16,
  author       = {Iwen Coisel and
                  Ignacio Sanchez},
  title        = {Improved cryptanalysis of the {DECT} standard cipher},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {155--169},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0127-4},
  doi          = {10.1007/S13389-016-0127-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CoiselS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FerradiGNT16,
  author       = {Houda Ferradi and
                  R{\'{e}}mi G{\'{e}}raud and
                  David Naccache and
                  Assia Tria},
  title        = {When organized crime applies academic results: a forensic analysis
                  of an in-card listening device},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {1},
  pages        = {49--59},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0112-3},
  doi          = {10.1007/S13389-015-0112-3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/FerradiGNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GalindoG0VV16,
  author       = {David Galindo and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Zhe Liu and
                  Praveen Kumar Vadnala and
                  Srinivas Vivek},
  title        = {Implementation of a leakage-resilient ElGamal key encapsulation mechanism},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {229--238},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0121-x},
  doi          = {10.1007/S13389-016-0121-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/GalindoG0VV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GanjiTS16,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Jean{-}Pierre Seifert},
  title        = {{PAC} learning of arbiter PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {249--258},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0119-4},
  doi          = {10.1007/S13389-016-0119-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GanjiTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GhafarA16,
  author       = {Amir Hamzah Abd Ghafar and
                  Muhammad Rezal Kamel Ariffin},
  title        = {{SPA} on Rabin variant with public key N=p\({}^{\mbox{2}}\)q},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {339--346},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0118-5},
  doi          = {10.1007/S13389-016-0118-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GhafarA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoundarJ16,
  author       = {Raveen R. Goundar and
                  Marc Joye},
  title        = {Inversion-free arithmetic on elliptic curves through isomorphisms},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {187--199},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0131-8},
  doi          = {10.1007/S13389-016-0131-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoundarJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GuneysuH16,
  author       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Introduction to the {CHES} 2015 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {83--84},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0130-9},
  doi          = {10.1007/S13389-016-0130-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GuneysuH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KhalidHPC16,
  author       = {Ayesha Khalid and
                  Muhammad Hassan and
                  Goutam Paul and
                  Anupam Chattopadhyay},
  title        = {RunFein: a rapid prototyping framework for Feistel and SPN-based block
                  ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {299--323},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0116-7},
  doi          = {10.1007/S13389-016-0116-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KhalidHPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Konheim16,
  author       = {Alan G. Konheim},
  title        = {Automated teller machines: their history and authentication protocols},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {1},
  pages        = {1--29},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0104-3},
  doi          = {10.1007/S13389-015-0104-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Konheim16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LemireK16,
  author       = {Daniel Lemire and
                  Owen Kaser},
  title        = {Faster 64-bit universal hashing using carry-less multiplications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {171--185},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0110-5},
  doi          = {10.1007/S13389-015-0110-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LemireK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MaesLSW16,
  author       = {Roel Maes and
                  Vincent van der Leest and
                  Erik van der Sluis and
                  Frans M. J. Willems},
  title        = {Secure key generation from biased PUFs: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {121--137},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0125-6},
  doi          = {10.1007/S13389-016-0125-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MaesLSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MoeinGG16,
  author       = {Samer Moein and
                  Fayez Gebali and
                  T. Aaron Gulliver},
  title        = {Hardware attacks: an algebraic approach},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {325--337},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0117-6},
  doi          = {10.1007/S13389-016-0117-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MoeinGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NgoNBGD16,
  author       = {Xuan Thuy Ngo and
                  Zakaria Najm and
                  Shivam Bhasin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  title        = {Method taking into account process dispersion to detect hardware Trojan
                  Horse by side-channel analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {239--247},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0129-2},
  doi          = {10.1007/S13389-016-0129-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NgoNBGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RauzyGN16,
  author       = {Pablo Rauzy and
                  Sylvain Guilley and
                  Zakaria Najm},
  title        = {Formally proved security of assembly code against power analysis -
                  {A} case study on balanced logic},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {201--216},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0105-2},
  doi          = {10.1007/S13389-015-0105-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RauzyGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ReparazRCVV16,
  author       = {Oscar Reparaz and
                  Sujoy Sinha Roy and
                  Ruan de Clercq and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  title        = {Masking ring-LWE},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {139--153},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0126-5},
  doi          = {10.1007/S13389-016-0126-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ReparazRCVV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobissonB16,
  author       = {Bruno Robisson and
                  H{\'{e}}l{\`{e}}ne Le Bouder},
  title        = {Physical functions: the common factor of side-channel and fault attacks?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {3},
  pages        = {217--227},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0111-4},
  doi          = {10.1007/S13389-015-0111-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RobissonB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Saarinen16,
  author       = {Markku{-}Juhani O. Saarinen},
  title        = {The {BRUTUS} automatic cryptanalytic framework - Testing {CAESAR}
                  authenticated encryption candidates for weaknesses},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {1},
  pages        = {75--82},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0114-1},
  doi          = {10.1007/S13389-015-0114-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Saarinen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SarmientoSS16,
  author       = {Alejandro Cabrera Aldaya and
                  Alejandro Cabrera Sarmiento and
                  Santiago S{\'{a}}nchez{-}Solano},
  title        = {{AES} T-Box tampering attack},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {1},
  pages        = {31--48},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0103-4},
  doi          = {10.1007/S13389-015-0103-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SarmientoSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Schindler16,
  author       = {Werner Schindler},
  title        = {Exclusive exponent blinding is not enough to prevent any timing attack
                  on {RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {101--119},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0124-7},
  doi          = {10.1007/S13389-016-0124-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Schindler16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchneiderM16,
  author       = {Tobias Schneider and
                  Amir Moradi},
  title        = {Leakage assessment methodology - Extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {2},
  pages        = {85--99},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-016-0120-y},
  doi          = {10.1007/S13389-016-0120-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchneiderM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WengerW16,
  author       = {Erich Wenger and
                  Paul Wolfger},
  title        = {Harder, better, faster, stronger: elliptic curve discrete logarithm
                  computations on FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {6},
  number       = {4},
  pages        = {287--297},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13389-015-0108-z},
  doi          = {10.1007/S13389-015-0108-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WengerW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BanikMS15,
  author       = {Subhadeep Banik and
                  Subhamoy Maitra and
                  Santanu Sarkar},
  title        = {Improved differential fault attack on {MICKEY} 2.0},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {13--29},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0083-9},
  doi          = {10.1007/S13389-014-0083-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BanikMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaR15,
  author       = {Lejla Batina and
                  Matthew J. B. Robshaw},
  title        = {Introduction to the {CHES} 2014 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {71--72},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0098-x},
  doi          = {10.1007/S13389-015-0098-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BluhmG15,
  author       = {Manuel Bluhm and
                  Shay Gueron},
  title        = {Fast software implementation of binary elliptic curve cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {215--226},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0094-1},
  doi          = {10.1007/S13389-015-0094-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BluhmG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BongiovanniCST15,
  author       = {Simone Bongiovanni and
                  Francesco Centurelli and
                  Giuseppe Scotti and
                  Alessandro Trifiletti},
  title        = {Design and validation through a frequency-based metric of a new countermeasure
                  to protect nanometer ICs from side-channel attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {269--288},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0096-z},
  doi          = {10.1007/S13389-015-0096-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BongiovanniCST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CenkH15,
  author       = {Murat Cenk and
                  M. Anwar Hasan},
  title        = {Some new results on binary polynomial multiplication},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {289--303},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0101-6},
  doi          = {10.1007/S13389-015-0101-6},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/CenkH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Coron0V15,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Arnab Roy and
                  Srinivas Vivek},
  title        = {Fast evaluation of polynomials over binary finite fields and application
                  to side-channel countermeasures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {73--83},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0099-9},
  doi          = {10.1007/S13389-015-0099-9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/Coron0V15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Faz-HernandezLS15,
  author       = {Armando Faz{-}Hern{\'{a}}ndez and
                  Patrick Longa and
                  Ana Helena S{\'{a}}nchez},
  title        = {Efficient and secure algorithms for GLV-based scalar multiplication
                  and their implementation on {GLV-GLS} curves (extended version)},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {31--52},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0085-7},
  doi          = {10.1007/S13389-014-0085-7},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Faz-HernandezLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FeiDLZ15,
  author       = {Yunsi Fei and
                  A. Adam Ding and
                  Jian Lao and
                  Liwei Zhang},
  title        = {A statistics-based success rate model for {DPA} and {CPA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {227--243},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0107-0},
  doi          = {10.1007/S13389-015-0107-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FeiDLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GenkinPT15,
  author       = {Daniel Genkin and
                  Itamar Pipman and
                  Eran Tromer},
  title        = {Get your hands off my laptop: physical side-channel key-extraction
                  attacks on PCs - Extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {95--112},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0100-7},
  doi          = {10.1007/S13389-015-0100-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GenkinPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GueronK15,
  author       = {Shay Gueron and
                  Vlad Krasnov},
  title        = {Fast prime field elliptic-curve cryptography with 256-bit primes},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {141--151},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0090-x},
  doi          = {10.1007/S13389-014-0090-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GueronK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GuoMJK15,
  author       = {Xiaofei Guo and
                  Debdeep Mukhopadhyay and
                  Chenglu Jin and
                  Ramesh Karri},
  title        = {Security analysis of concurrent error detection against differential
                  fault analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {153--169},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0092-8},
  doi          = {10.1007/S13389-014-0092-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GuoMJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HamletB15,
  author       = {Jason R. Hamlet and
                  Robert W. Brocato},
  title        = {Throughput-optimized implementations of {QUAD}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {245--254},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0109-y},
  doi          = {10.1007/S13389-015-0109-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HamletB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutterS15,
  author       = {Michael Hutter and
                  Peter Schwabe},
  title        = {Multiprecision multiplication on {AVR} revisited},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {201--214},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0093-2},
  doi          = {10.1007/S13389-015-0093-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutterS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LermanBM15,
  author       = {Liran Lerman and
                  Gianluca Bontempi and
                  Olivier Markowitch},
  title        = {A machine learning approach against a masked {AES} - Reaching the
                  limit of side-channel attacks with a learning model},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {123--139},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0089-3},
  doi          = {10.1007/S13389-014-0089-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LermanBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LermanBM15a,
  author       = {Liran Lerman and
                  Gianluca Bontempi and
                  Olivier Markowitch},
  title        = {The bias-variance decomposition in profiled attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {255--267},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0106-1},
  doi          = {10.1007/S13389-015-0106-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LermanBM15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OFlynnC15,
  author       = {Colin O'Flynn and
                  Zhizhang Chen},
  title        = {Synchronous sampling and clock recovery of internal oscillators for
                  side channel analysis and fault injection},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {53--69},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0087-5},
  doi          = {10.1007/S13389-014-0087-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OFlynnC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PerinIMT15,
  author       = {Guilherme Perin and
                  Laurent Imbert and
                  Philippe Maurine and
                  Lionel Torres},
  title        = {Vertical and horizontal correlation attacks on RNS-based exponentiations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {171--185},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0095-0},
  doi          = {10.1007/S13389-015-0095-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PerinIMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SugawaraSFTHSF15,
  author       = {Takeshi Sugawara and
                  Daisuke Suzuki and
                  Ryoichi Fujii and
                  Shigeaki Tawa and
                  Ryohei Hori and
                  Mitsuru Shiozaki and
                  Takeshi Fujino},
  title        = {Reversing stealthy dopant-level circuits},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {85--94},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-015-0102-5},
  doi          = {10.1007/S13389-015-0102-5},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SugawaraSFTHSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/TemplinH15,
  author       = {Joshua Templin and
                  Jason R. Hamlet},
  title        = {A new power-aware {FPGA} design metric},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {1--11},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-013-0060-8},
  doi          = {10.1007/S13389-013-0060-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/TemplinH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/VliegenMKSV15,
  author       = {Jo Vliegen and
                  Nele Mentens and
                  Dirk Koch and
                  Dries Schellekens and
                  Ingrid Verbauwhede},
  title        = {Practical feasibility evaluation and improvement of a pay-per-use
                  licensing scheme for hardware {IP} cores in Xilinx FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {113--122},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0088-4},
  doi          = {10.1007/S13389-014-0088-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/VliegenMKSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YamamotoSIOTIT15,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Kouichi Itoh and
                  Naoya Torii},
  title        = {A new method for enhancing variety and maintaining reliability of
                  {PUF} responses and its evaluation on ASICs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {187--199},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0091-9},
  doi          = {10.1007/S13389-014-0091-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YamamotoSIOTIT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AlmeidaABJ14,
  author       = {Leonardo C. Almeida and
                  Ewerton R. Andrade and
                  Paulo S. L. M. Barreto and
                  Marcos A. Simpl{\'{\i}}cio Jr.},
  title        = {Lyra: password-based key derivation with tunable memory and processing
                  costs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {75--89},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0063-5},
  doi          = {10.1007/S13389-013-0063-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AlmeidaABJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BeckerRPB14,
  author       = {Georg T. Becker and
                  Francesco Regazzoni and
                  Christof Paar and
                  Wayne P. Burleson},
  title        = {Stealthy dopant-level hardware Trojans: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {19--31},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0068-0},
  doi          = {10.1007/S13389-013-0068-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BeckerRPB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BelaidSHMMSST14,
  author       = {Sonia Bela{\"{\i}}d and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Stefan Mangard and
                  Marcel Medwed and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Stefan Tillich},
  title        = {Towards fresh re-keying with leakage-resilient PRFs: cipher design
                  principles and analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {157--171},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0079-5},
  doi          = {10.1007/S13389-014-0079-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BelaidSHMMSST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BertoniC14,
  author       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Introduction to the {CHES} 2013 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {1},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0076-8},
  doi          = {10.1007/S13389-014-0076-8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BertoniC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BiasiBMR14,
  author       = {Felipe P. Biasi and
                  Paulo S. L. M. Barreto and
                  Rafael Misoczki and
                  Wilson Vicente Ruggiero},
  title        = {Scaling efficient code-based cryptosystems for embedded platforms},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {123--134},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0070-1},
  doi          = {10.1007/S13389-014-0070-1},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BiasiBMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Bos14,
  author       = {Joppe W. Bos},
  title        = {Constant time modular inversion},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {275--281},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0084-8},
  doi          = {10.1007/S13389-014-0084-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Bos14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGMP14,
  author       = {Claude Carlet and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Achieving side-channel high-order correlation immunity with leakage
                  squeezing},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {107--121},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0067-1},
  doi          = {10.1007/S13389-013-0067-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrossoSF14,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  title        = {Masking vs. multiparty computation: how large is the gap for AES?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {47--57},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0073-y},
  doi          = {10.1007/S13389-014-0073-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GrossoSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KamelRFS14,
  author       = {Dina Kamel and
                  Mathieu Renauld and
                  Denis Flandre and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Understanding the limitations and improving the relevance of {SPICE}
                  simulations in side-channel security evaluations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {187--195},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0080-z},
  doi          = {10.1007/S13389-014-0080-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KamelRFS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KaratiDCBBI14,
  author       = {Sabyasachi Karati and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury and
                  Bhargav Bellur and
                  Debojyoti Bhattacharya and
                  Aravind Iyer},
  title        = {New algorithms for batch verification of standard {ECDSA} signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {237--258},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0082-x},
  doi          = {10.1007/S13389-014-0082-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KaratiDCBBI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MoroHER14,
  author       = {Nicolas Moro and
                  Karine Heydemann and
                  Emmanuelle Encrenaz and
                  Bruno Robisson},
  title        = {Formal verification of a software countermeasure against instruction
                  skip attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {145--156},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0077-7},
  doi          = {10.1007/S13389-014-0077-7},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/MoroHER14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MulderHMP14,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  title        = {Using Bleichenbacher's solution to the hidden number problem to attack
                  nonce leaks in 384-bit {ECDSA:} extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {33--45},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0072-z},
  doi          = {10.1007/S13389-014-0072-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MulderHMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Negre14,
  author       = {Christophe N{\`{e}}gre},
  title        = {Efficient binary polynomial multiplication based on optimized Karatsuba
                  reconstruction},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {91--106},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0066-2},
  doi          = {10.1007/S13389-013-0066-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Negre14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OliveiraLAR14,
  author       = {Thomaz Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez and
                  Diego F. Aranha and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Two is the fastest prime: lambda coordinates for binary elliptic curves},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {3--17},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0069-z},
  doi          = {10.1007/S13389-013-0069-Z},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OliveiraLAR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PaulC14,
  author       = {Goutam Paul and
                  Anupam Chattopadhyay},
  title        = {Designing stream ciphers with scalable data-widths: a case study with
                  {HC-128}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {135--143},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0071-0},
  doi          = {10.1007/S13389-014-0071-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PaulC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RauzyG14,
  author       = {Pablo Rauzy and
                  Sylvain Guilley},
  title        = {A formal proof of countermeasures against fault injection attacks
                  on {CRT-RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {173--185},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-013-0065-3},
  doi          = {10.1007/S13389-013-0065-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RauzyG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchindlerW14,
  author       = {Werner Schindler and
                  Andreas Wiemers},
  title        = {Power attacks in the presence of exponent blinding},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {213--236},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0081-y},
  doi          = {10.1007/S13389-014-0081-Y},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchindlerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SugawaraSSSF14,
  author       = {Takeshi Sugawara and
                  Daisuke Suzuki and
                  Minoru Saeki and
                  Mitsuru Shiozaki and
                  Takeshi Fujino},
  title        = {On measurable side-channel leaks inside {ASIC} design primitives},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {59--73},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0078-6},
  doi          = {10.1007/S13389-014-0078-6},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SugawaraSSSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/TiranOTAM14,
  author       = {S{\'{e}}bastien Tiran and
                  S{\'{e}}bastien Ordas and
                  Yannick Teglia and
                  Michel Agoyan and
                  Philippe Maurine},
  title        = {A model of the leakage in the frequency domain and its application
                  to {CPA} and {DPA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {197--212},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0074-x},
  doi          = {10.1007/S13389-014-0074-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/TiranOTAM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AkinyeleGMPR0R13,
  author       = {Joseph A. Akinyele and
                  Christina Garman and
                  Ian Miers and
                  Matthew W. Pagano and
                  Michael Rushanan and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Charm: a framework for rapidly prototyping cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {111--128},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0057-3},
  doi          = {10.1007/S13389-013-0057-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AkinyeleGMPR0R13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AliMT13,
  author       = {Subidh Ali and
                  Debdeep Mukhopadhyay and
                  Michael Tunstall},
  title        = {Differential fault analysis of {AES:} towards reaching its limits},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {73--97},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-012-0046-y},
  doi          = {10.1007/S13389-012-0046-Y},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/AliMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BhasinGHD13,
  author       = {Shivam Bhasin and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Jean{-}Luc Danger},
  title        = {From cryptography to hardware: analyzing and protecting embedded Xilinx
                  {BRAM} for cryptographic applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {213--225},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0048-4},
  doi          = {10.1007/S13389-013-0048-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BhasinGHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BriaisDG13,
  author       = {S{\'{e}}bastien Briais and
                  Jean{-}Luc Danger and
                  Sylvain Guilley},
  title        = {A formal study of two physical countermeasures against side channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {169--180},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0054-6},
  doi          = {10.1007/S13389-013-0054-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BriaisDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Brown13,
  author       = {Mark Brown},
  title        = {Toward a taxonomy of communications security models},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {181--195},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0058-2},
  doi          = {10.1007/S13389-013-0058-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Brown13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ChristofiCGV13,
  author       = {Maria Christofi and
                  Boutheina Chetali and
                  Louis Goubin and
                  David Vigilant},
  title        = {Formal verification of a {CRT-RSA} implementation against fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {157--167},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0049-3},
  doi          = {10.1007/S13389-013-0049-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ChristofiCGV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DangerGHMN13,
  author       = {Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Philippe Hoogvorst and
                  C{\'{e}}dric Murdica and
                  David Naccache},
  title        = {A synthesis of side-channel attacks on elliptic curve cryptography
                  in smart-cards},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {241--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0062-6},
  doi          = {10.1007/S13389-013-0062-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DangerGHMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/FouqueGLTZ13,
  author       = {Pierre{-}Alain Fouque and
                  Nicolas Guillermin and
                  Delphine Leresteux and
                  Mehdi Tibouchi and
                  Jean{-}Christophe Zapalowicz},
  title        = {Attacking {RSA-CRT} signatures with faults on montgomery multiplication},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {59--72},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0050-x},
  doi          = {10.1007/S13389-013-0050-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/FouqueGLTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GerardS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Unified and optimized linear collision attacks and their application
                  in a non-profiled setting: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {45--58},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0051-9},
  doi          = {10.1007/S13389-013-0051-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GerardS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HeyseG13,
  author       = {Stefan Heyse and
                  Tim G{\"{u}}neysu},
  title        = {Code-based cryptography on reconfigurable hardware: tweaking Niederreiter
                  encryption for performance},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {29--43},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0056-4},
  doi          = {10.1007/S13389-013-0056-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HeyseG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KamalY13,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Strengthening hardware implementations of NTRUEncrypt against fault
                  analysis attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {227--240},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0061-7},
  doi          = {10.1007/S13389-013-0061-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KamalY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KurdzielLS13,
  author       = {Michael T. Kurdziel and
                  Marcin Lukowiak and
                  Michael A. Sanfilippo},
  title        = {Minimizing performance overhead in memory encryption},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {129--138},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0047-5},
  doi          = {10.1007/S13389-013-0047-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KurdzielLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MohamedBZHWB13,
  author       = {Mohamed Saied Emam Mohamed and
                  Stanislav Bulygin and
                  Michael Zohner and
                  Annelie Heuser and
                  Michael Walter and
                  Johannes Buchmann},
  title        = {Improved algebraic side-channel attack on {AES}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {139--156},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0059-1},
  doi          = {10.1007/S13389-013-0059-1},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/MohamedBZHWB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MontminyBTL13,
  author       = {David P. Montminy and
                  Rusty O. Baldwin and
                  Michael A. Temple and
                  Eric D. Laspe},
  title        = {Improving cross-device attacks using zero-mean unit-variance normalization},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {99--110},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-012-0038-y},
  doi          = {10.1007/S13389-012-0038-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MontminyBTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ProuffS13,
  author       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Introduction to the {CHES} 2012 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0055-5},
  doi          = {10.1007/S13389-013-0055-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ProuffS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RuhrmairD13,
  author       = {Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {On the practical use of physical unclonable functions in oblivious
                  transfer and bit commitment protocols},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {17--28},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0052-8},
  doi          = {10.1007/S13389-013-0052-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RuhrmairD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchlosserNKOS13,
  author       = {Alexander Schl{\"{o}}sser and
                  Dmitry Nedospasov and
                  Juliane Kr{\"{a}}mer and
                  Susanna Orlic and
                  Jean{-}Pierre Seifert},
  title        = {Simple photonic emission analysis of {AES}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {1},
  pages        = {3--15},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-013-0053-7},
  doi          = {10.1007/S13389-013-0053-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchlosserNKOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YamamotoSIOTI13,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  title        = {Variety enhancement of {PUF} responses using the locations of random
                  outputting {RS} latches},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {197--211},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-012-0044-0},
  doi          = {10.1007/S13389-012-0044-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YamamotoSIOTI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AvanziHPT12,
  author       = {Roberto Avanzi and
                  Simon Hoerder and
                  Dan Page and
                  Michael Tunstall},
  title        = {Erratum to: Side-channel attacks on the McEliece and Niederreiter
                  public-key cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {75},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-011-0026-7},
  doi          = {10.1007/S13389-011-0026-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AvanziHPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BaldwinGHM12,
  author       = {Brian Baldwin and
                  Raveen R. Goundar and
                  Mark Hamilton and
                  William P. Marnane},
  title        = {Co-Z {ECC} scalar multiplications for hardware, software and hardware-software
                  co-design on embedded systems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {4},
  pages        = {221--240},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0042-2},
  doi          = {10.1007/S13389-012-0042-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BaldwinGHM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BernsteinDLSY12,
  author       = {Daniel J. Bernstein and
                  Niels Duif and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  title        = {High-speed high-security signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {77--89},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0027-1},
  doi          = {10.1007/S13389-012-0027-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BernsteinDLSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BringerCL12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Thanh{-}Ha Le},
  title        = {Protecting {AES} against side-channel analysis using wire-tap codes},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {129--141},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0034-2},
  doi          = {10.1007/S13389-012-0034-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BringerCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletFGR12,
  author       = {Claude Carlet and
                  Jean{-}Charles Faug{\`{e}}re and
                  Christopher Goyet and
                  Gu{\'{e}}na{\"{e}}l Renault},
  title        = {Analysis of the algebraic side channel attack},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {45--62},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0028-0},
  doi          = {10.1007/S13389-012-0028-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletFGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DaRoltDGNFRV12,
  author       = {Jean DaRolt and
                  Amitabh Das and
                  Santosh Ghosh and
                  Giorgio Di Natale and
                  Marie{-}Lise Flottes and
                  Bruno Rouzeyre and
                  Ingrid Verbauwhede},
  title        = {Scan attacks on side-channel and fault attack resistant public-key
                  implementations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {4},
  pages        = {207--219},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0045-z},
  doi          = {10.1007/S13389-012-0045-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DaRoltDGNFRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ElaabidG12,
  author       = {M. Abdelaziz Elaabid and
                  Sylvain Guilley},
  title        = {Portability of templates},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {63--74},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0030-6},
  doi          = {10.1007/S13389-012-0030-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ElaabidG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GouveaOL12,
  author       = {Conrado Porto Lopes Gouv{\^{e}}a and
                  Leonardo B. Oliveira and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  title        = {Efficient software implementation of public-key cryptography on sensor
                  networks using the {MSP430X} microcontroller},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {19--29},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0029-z},
  doi          = {10.1007/S13389-012-0029-Z},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GouveaOL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GrabherGHJPTW12,
  author       = {Philipp Grabher and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Daniel Page and
                  Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  title        = {An exploration of mechanisms for dynamic cryptographic instruction
                  set extension},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-011-0025-8},
  doi          = {10.1007/S13389-011-0025-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/GrabherGHJPTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Gueron12,
  author       = {Shay Gueron},
  title        = {Efficient software implementations of modular exponentiation},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {1},
  pages        = {31--43},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0031-5},
  doi          = {10.1007/S13389-012-0031-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Gueron12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GueronK12,
  author       = {Shay Gueron and
                  Vlad Krasnov},
  title        = {Parallelizing message schedules to accelerate the computations of
                  hash functions},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {4},
  pages        = {241--253},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0037-z},
  doi          = {10.1007/S13389-012-0037-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GueronK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HasanN12,
  author       = {M. Anwar Hasan and
                  Christophe N{\`{e}}gre},
  title        = {Sequential multiplier with sub-linear gate complexity},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {91--97},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0035-1},
  doi          = {10.1007/S13389-012-0035-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HasanN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KasperMBMGPB12,
  author       = {Markus Kasper and
                  Amir Moradi and
                  Georg T. Becker and
                  Oliver Mischke and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Wayne P. Burleson},
  title        = {Side channels as building blocks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {143--159},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0040-4},
  doi          = {10.1007/S13389-012-0040-4},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KasperMBMGPB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KoeberlLMRVWW12,
  author       = {Patrick Koeberl and
                  Jiangtao Li and
                  Roel Maes and
                  Anand Rajan and
                  Claire Vishik and
                  Marcin W{\'{o}}jcik and
                  Wei Wu},
  title        = {A practical device authentication scheme using {SRAM} PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {4},
  pages        = {255--269},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0043-1},
  doi          = {10.1007/S13389-012-0043-1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KoeberlLMRVWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MatherO12,
  author       = {Luke Mather and
                  Elisabeth Oswald},
  title        = {Pinpointing side-channel information leaks in web applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {161--177},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0036-0},
  doi          = {10.1007/S13389-012-0036-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MatherO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RocheP12,
  author       = {Thomas Roche and
                  Emmanuel Prouff},
  title        = {Higher-order glitch free implementation of the {AES} using Secure
                  Multi-Party Computation protocols - Extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {111--127},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0033-3},
  doi          = {10.1007/S13389-012-0033-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RocheP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ShariatiSJM12,
  author       = {Saloomeh Shariati and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Laurent Jacques and
                  Beno{\^{\i}}t Macq},
  title        = {Analysis and experimental evaluation of image-based PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {189--206},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0041-3},
  doi          = {10.1007/S13389-012-0041-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ShariatiSJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Trujillo-OlayaSK12,
  author       = {Vladimir Trujillo{-}Olaya and
                  Timothy Sherwood and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Analysis of performance versus security in hardware realizations of
                  small elliptic curves for lightweight applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {179--188},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0039-x},
  doi          = {10.1007/S13389-012-0039-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Trujillo-OlayaSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YenCM12,
  author       = {Sung{-}Ming Yen and
                  Chien{-}Ning Chen and
                  Sang{-}Jae Moon},
  title        = {Multi-exponentiation algorithm based on binary {GCD} computation and
                  its application to side-channel countermeasure},
  journal      = {J. Cryptogr. Eng.},
  volume       = {2},
  number       = {2},
  pages        = {99--110},
  year         = {2012},
  url          = {https://doi.org/10.1007/s13389-012-0032-4},
  doi          = {10.1007/S13389-012-0032-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YenCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AvanziHPT11,
  author       = {Roberto Avanzi and
                  Simon Hoerder and
                  Dan Page and
                  Michael Tunstall},
  title        = {Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {271--281},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0024-9},
  doi          = {10.1007/S13389-011-0024-9},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/AvanziHPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BeuchatOY11,
  author       = {Jean{-}Luc Beuchat and
                  Eiji Okamoto and
                  Teppei Yamazaki},
  title        = {A low-area unified hardware architecture for the {AES} and the cryptographic
                  hash function {ECHO}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {101--121},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0009-8},
  doi          = {10.1007/S13389-011-0009-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/BeuchatOY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BrierNNT11,
  author       = {Eric Brier and
                  David Naccache and
                  Phong Q. Nguyen and
                  Mehdi Tibouchi},
  title        = {Modulus fault attacks against {RSA-CRT} signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {243--253},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0015-x},
  doi          = {10.1007/S13389-011-0015-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BrierNNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Dichtl11,
  author       = {Markus Dichtl},
  title        = {A new method of black box power analysis and a fast algorithm for
                  optimal key search},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {255--264},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0019-6},
  doi          = {10.1007/S13389-011-0019-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Dichtl11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DogetPRS11,
  author       = {Julien Doget and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Univariate side channel attacks and leakage modeling},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {123--144},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0010-2},
  doi          = {10.1007/S13389-011-0010-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DogetPRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Dominguez-OviedoH11,
  author       = {Agustin Dominguez{-}Oviedo and
                  M. Anwar Hasan},
  title        = {Algorithm-level error detection for Montgomery ladder-based {ECSM}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {57--69},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0003-1},
  doi          = {10.1007/S13389-011-0003-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Dominguez-OviedoH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/EndoSHAS11,
  author       = {Sho Endo and
                  Takeshi Sugawara and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Akashi Satoh},
  title        = {An on-chip glitchy-clock generator for testing fault injection attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {265--270},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0022-y},
  doi          = {10.1007/S13389-011-0022-Y},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/EndoSHAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GoundarJMRV11,
  author       = {Raveen R. Goundar and
                  Marc Joye and
                  Atsuko Miyaji and
                  Matthieu Rivain and
                  Alexandre Venelli},
  title        = {Scalar multiplication on Weierstra{\ss} elliptic curves from Co-\emph{Z}
                  arithmetic},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {161--176},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0012-0},
  doi          = {10.1007/S13389-011-0012-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GoundarJMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Guneysu11,
  author       = {Tim G{\"{u}}neysu},
  title        = {Utilizing hard cores of modern {FPGA} devices for high-performance
                  cryptography},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {37--55},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0002-2},
  doi          = {10.1007/S13389-011-0002-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Guneysu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HocquetKRLFBS11,
  author       = {C{\'{e}}dric Hocquet and
                  Dina Kamel and
                  Francesco Regazzoni and
                  Jean{-}Didier Legat and
                  Denis Flandre and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Harvesting the potential of nano-CMOS for lightweight cryptography:
                  an ultra-low-voltage 65 nm {AES} coprocessor for passive {RFID} tags},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {79--86},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0005-z},
  doi          = {10.1007/S13389-011-0005-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HocquetKRLFBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HospodarGMVV11,
  author       = {Gabriel Hospodar and
                  Benedikt Gierlichs and
                  Elke De Mulder and
                  Ingrid Verbauwhede and
                  Joos Vandewalle},
  title        = {Machine learning in side-channel analysis: a first study},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {293--302},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0023-x},
  doi          = {10.1007/S13389-011-0023-X},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HospodarGMVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KatzenbeisserKLSSW11,
  author       = {Stefan Katzenbeisser and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Vincent van der Leest and
                  Ahmad{-}Reza Sadeghi and
                  Geert Jan Schrijen and
                  Christian Wachsmann},
  title        = {Recyclable PUFs: logically reconfigurable PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {177--186},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0016-9},
  doi          = {10.1007/S13389-011-0016-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KatzenbeisserKLSSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Koc11,
  author       = {{\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Introduction to the \emph{Journal of Cryptographic Engineering}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0007-x},
  doi          = {10.1007/S13389-011-0007-X},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/Koc11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KocherJJR11,
  author       = {Paul C. Kocher and
                  Joshua Jaffe and
                  Benjamin Jun and
                  Pankaj Rohatgi},
  title        = {Introduction to differential power analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {5--27},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0006-y},
  doi          = {10.1007/S13389-011-0006-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KocherJJR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LuxS11,
  author       = {Alexander Lux and
                  Artem Starostin},
  title        = {A tool for static detection of timing channels in Java},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {303--313},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0021-z},
  doi          = {10.1007/S13389-011-0021-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LuxS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MedwedS11,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Extractors against side-channel attacks: weak or strong?},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {231--241},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0014-y},
  doi          = {10.1007/S13389-011-0014-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MedwedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MeloniNH11,
  author       = {Nicolas M{\'{e}}loni and
                  Christophe N{\`{e}}gre and
                  M. Anwar Hasan},
  title        = {High performance {GHASH} and impacts of a class of unconventional
                  bases},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {201--218},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0013-z},
  doi          = {10.1007/S13389-011-0013-Z},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/MeloniNH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MolterSSS11,
  author       = {H. Gregor Molter and
                  Marc St{\"{o}}ttinger and
                  Abdulhadi Shoufan and
                  Falko Strenzke},
  title        = {A simple power analysis attack on a McEliece cryptoprocessor},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {29--36},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0001-3},
  doi          = {10.1007/S13389-011-0001-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MolterSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MorenoH11,
  author       = {Carlos Moreno and
                  M. Anwar Hasan},
  title        = {SPA-resistant binary exponentiation with optimal execution time},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {87--99},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0008-9},
  doi          = {10.1007/S13389-011-0008-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MorenoH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Skorobogatov11,
  author       = {Sergei Skorobogatov},
  title        = {Synchronization method for {SCA} and fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {71--77},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0004-0},
  doi          = {10.1007/S13389-011-0004-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Skorobogatov11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Strenzke11,
  author       = {Falko Strenzke},
  title        = {Message-aimed side channel and fault attacks against public key cryptosystems
                  with homomorphic properties},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {283--292},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0020-0},
  doi          = {10.1007/S13389-011-0020-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Strenzke11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/TaverneFARHL11,
  author       = {Jonathan Taverne and
                  Armando Faz{-}Hern{\'{a}}ndez and
                  Diego F. Aranha and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Darrel Hankerson and
                  Julio C{\'{e}}sar L{\'{o}}pez{-}Hern{\'{a}}ndez},
  title        = {Speeding scalar multiplication over binary elliptic curves using the
                  new carry-less multiplication instruction},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {187--199},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0017-8},
  doi          = {10.1007/S13389-011-0017-8},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/TaverneFARHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Tunstall11,
  author       = {Michael Tunstall},
  title        = {Practical complexity differential cryptanalysis and fault analysis
                  of {AES}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {219--230},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0018-7},
  doi          = {10.1007/S13389-011-0018-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Tunstall11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WhitnallO11,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  title        = {A fair evaluation framework for comparing side-channel distinguishers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {145--160},
  year         = {2011},
  url          = {https://doi.org/10.1007/s13389-011-0011-1},
  doi          = {10.1007/S13389-011-0011-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WhitnallO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics