


default search action
Journal of Cryptographic Engineering, Volume 11
Volume 11, Number 1, April 2021
- Sze Ling Yeo, Duc-Phong Le

, Khoongming Khoo:
Improved algebraic attacks on lightweight block ciphers. 1-19 - Amanda Cristina Davi Resende

, Diego de Freitas Aranha
:
Faster unbalanced Private Set Intersection in the semi-honest setting. 21-38 - Olivier Bronchain

, Tobias Schneider, François-Xavier Standaert
:
Reducing risks through simplicity: high side-channel security for lazy engineers. 39-55 - Geovandro C. C. F. Pereira

, Javad Doliskani, David Jao
:
x-only point addition formula and faster compressed SIKE. 57-69 - Rodrigo Abarzúa

, Claudio Valencia Cordero
, Julio López:
Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC. 71-102
Volume 11, Number 2, June 2021
- Karine Heydemann, Letitia Li:

Editorial about PROOFS 2019. 103-104 - Fatemeh Ganji, Shahin Tajik, Pascal Stauss, Jean-Pierre Seifert, Mark Tehranipoor, Domenic Forte

:
Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version). 105-118 - Wei Cheng

, Claude Carlet, Kouassi Goli, Jean-Luc Danger, Sylvain Guilley:
Detecting faults in inner product masking scheme. 119-133 - Thomas Perianin

, Sébastien Carré, Victor Dyseryn, Adrien Facon, Sylvain Guilley:
End-to-end automated cache-timing attack driven by machine learning. 135-146 - Osnat Keren, Ilia Polian:

IPM-RED: combining higher-order masking with robust error detection. 147-160 - Rei Ueno

, Junko Takahashi, Yu-ichi Hayashi, Naofumi Homma:
A method for constructing sliding windows leak from noisy cache timing information. 161-170 - Dina Kamel

, Davide Bellizia
, Olivier Bronchain, François-Xavier Standaert
:
Side-channel analysis of a learning parity with physical noise processor. 171-179 - Michael John Jacobson Jr., Prabhat Kushwaha

:
Removable weak keys for discrete logarithm-based cryptography. 181-195 - Karine Heydemann, Letitia Li:

Correction to: Editorial about PROOFS 2019. 197
Volume 11, Number 3, September 2021
- Chip-Hong Chang, Daniel E. Holcomb, Ulrich Rührmair

, Patrick Schaumont:
The ASHES 2019 special issue at JCEN. 199-200 - Mitsuru Shiozaki

, Takeshi Fujino:
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF. 201-212 - Yuqiao Zhang, Ayush Jain, Pinchen Cui, Ziqi Zhou, Ujjwal Guin:

A novel topology-guided attack and its countermeasure towards secure logic locking. 213-226 - Chongyan Gu

, Chip-Hong Chang, Weiqiang Liu, Neil Hanley, Jack Miskelly
, Máire O'Neill:
A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs. 227-238 - Sahan Bandara

, Michel A. Kinsy
:
Adaptive caches as a defense mechanism against cache side-channel attacks. 239-255 - Florian Unterstein

, Nisha Jacob
, Neil Hanley, Chongyan Gu, Johann Heyszl:
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version. 257-272 - Keyvan Ramezanpour

, Paul Ampadu, William Diehl
:
Fault intensity map analysis with neural network key distinguisher. 273-288 - Shoei Nashimoto

, Daisuke Suzuki, Noriyuki Miura, Tatsuya Machida, Kohei Matsuda, Makoto Nagata
:
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure. 289-298 - Leonid Azriel

, Julian Speith
, Nils Albartus
, Ran Ginosar, Avi Mendelson, Christof Paar:
A survey of algorithmic methods in IC reverse engineering. 299-315
Volume 11, Number 4, November 2021
- James Howe

, Marco Martinoli, Elisabeth Oswald, Francesco Regazzoni
:
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware. 317-327 - Lucas Pandolfo Perin

, Gustavo Zambonin
, Ricardo Felipe Custódio, Lucia Moura, Daniel Panario
:
Improved constant-sum encodings for hash-based signatures. 329-351 - Thomas Trouchkine, Sébanjila Kevin Bukasa, Mathieu Escouteloup, Ronan Lashermes, Guillaume Bouffard

:
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models. 353-367 - Johannes Mittmann, Werner Schindler

:
Timing attacks and local timing attacks against Barrett's modular multiplication algorithm. 369-397 - Jean-Claude Bajard

, Sylvain Duquesne:
Montgomery-friendly primes and applications to cryptography. 399-415 - Sergio Roldán Lombardía, Fatih Balli, Subhadeep Banik

:
Six shades lighter: a bit-serial implementation of the AES family. 417-439

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














