default search action
Journal of Cryptographic Engineering, Volume 12
Volume 12, Number 1, April 2022
- Maria Chiara Molteni, Vittorio Zaccaria:
A relation calculus for reasoning about t-probing security. 1-14 - Dusan Bozilov, Miroslav Knezevic, Ventzislav Nikov:
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications. 15-51 - Andrea Caforio, Fatih Balli, Subhadeep Banik:
Melting SNOW-V: improved lightweight architectures. 53-73 - Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. 75-93 - Benjamin Buhrow, Barry K. Gilbert, Clifton R. Haider:
Parallel modular multiplication using 512-bit advanced vector instructions. 95-105 - Kaushik Nath, Palash Sarkar:
Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels. 107-121
Volume 12, Number 2, June 2022
- Carlo Brunetta, Pablo Picazo-Sanchez:
Modelling cryptographic distinguishers using machine learning. 123-135 - Jori Winderickx, An Braeken, Dave Singelée, Nele Mentens:
In-depth energy analysis of security algorithms and protocols for the Internet of Things. 137-149 - Liron David, Avishai Wool:
Rank estimation with bounded error via exponential sampling. 151-168 - Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani:
Improved fault analysis on SIMECK ciphers. 169-180 - Mathieu Gross, Nisha Jacob, Andreas Zankl, Georg Sigl:
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC. 181-196 - Fanghui Liu, Waldemar Cruz, Laurent Michel:
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming. 197-228
Volume 12, Number 3, September 2022
- Susanne Engels, Max Hoffmann, Christof Paar:
A critical view on the real-world security of logic locking. 229-244 - Jean-Max Dutertre, Amir-Pasha Mirbaha, David Naccache, Assia Tria:
Photonic power firewalls. 245-254 - Juan Di Mauro, Eduardo Salazar, Hugo D. Scolnik:
Design and implementation of a novel cryptographically secure pseudorandom number generator. 255-265 - Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte:
Physical security in the post-quantum era. 267-303 - Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: a new milestone in designing ASCON-like permutations. 305-327 - Esra Yeniaras, Murat Cenk:
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation. 329-348 - Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez:
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents. 349-368
Volume 12, Number 4, November 2022
- Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont:
The ASHES 2020 special issue at JCEN. 369-370 - Markku-Juhani O. Saarinen, G. Richard Newell, Ben Marshall:
Development of the RISC-V entropy source interface. 371-386 - Ulrich Rührmair:
Secret-free security: a survey and tutorial. 387-412 - Chenglu Jin, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Programmable access-controlled and generic erasable PUF design and its applications. 413-432 - Amit Jana, Anirban Nath, Goutam Paul, Dhiman Saha:
Differential fault analysis of NORX using variants of coupon collector problem. 433-459 - Jacob Fustos, Michael Garrett Bechtel, Heechul Yun:
A framework for leaking secrets to past instructions. 461-473 - Anup Kumar Kundu, Aikata, Banashri Karmakar, Dhiman Saha:
Fault analysis of the PRINCE family of lightweight ciphers. 475-494 - Rijoy Mukherjee, Sree Ranjani Rajendran, Rajat Subhra Chakraborty:
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention. 495-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.