


default search action
Journal of Cryptographic Engineering, Volume 10
Volume 10, Number 1, April 2020
- Damien Jauvart, Nadia El Mrabet

, Jacques J. A. Fournier, Louis Goubin:
Improving side-channel attacks against pairing-based cryptography. 1-16 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque

, Benjamin Grégoire, François-Xavier Standaert
, Pierre-Yves Strub:
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations. 17-26 - Rodrigo Abarzúa

, Santi Martínez
, Valeria Mendoza, Nicolas Thériault
:
Same value analysis on Edwards curves. 27-48 - Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang

:
How to reveal the secrets of an obscure white-box implementation. 49-66 - Oliver Willers

, Christopher Huth, Jorge Guajardo, Helmut Seidel, Peter W. Deutsch
:
On the feasibility of deriving cryptographic keys from MEMS sensors. 67-83 - Yuanyuan Zhou

, François-Xavier Standaert
:
Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks. 85-95
Volume 10, Number 2, June 2020
- Joppe W. Bos

, Simon Friedberger:
Faster modular arithmetic for isogeny-based crypto on embedded devices. 97-109 - Laurent-Stéphane Didier, Fangan-Yssouf Dosso, Pascal Véron

:
Efficient modular operations using the adapted modular number system. 111-133 - Benjamin Hettwer

, Stefan Gehrer, Tim Güneysu
:
Applications of machine learning techniques in side-channel attacks: a survey. 135-162 - Ryad Benadjila, Emmanuel Prouff

, Rémi Strullu, Eleonora Cagli, Cécile Dumas
:
Deep learning for side-channel analysis and introduction to ASCAD database. 163-188 - Mohammad Ali Orumiehchiha, Saeed Rostami

, Elham Shakour, Josef Pieprzyk
:
A differential fault attack on the WG family of stream ciphers. 189-195
Volume 10, Number 3, September 2020
- Alessandro De Piccoli

, Andrea Visconti
, Ottavio Giulio Rizzo:
Polynomial multiplication over binary finite fields: new upper bounds. 197-210 - Rafael J. Cruz, Antonio Guimarães

, Diego F. Aranha
:
Efficient and secure software implementations of Fantomas. 211-228 - Matthias Hiller

, Ludwig Kürzinger
, Georg Sigl:
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs. 229-247 - Dimitrios Schoinianakis

:
Residue arithmetic systems in cryptography: a survey on modern security applications. 249-267 - Andreas Wiemers

:
A remark on a success rate model for side-channel attack analysis. 269-274 - Bastian Richter

, Amir Moradi
:
Template attacks on nano-scale CMOS devices. 275-285
Volume 10, Number 4, November 2020
- Lejla Batina, Nele Mentens

:
PROOFS 2018 Editorial. 287 - Manaar Alam

, Debdeep Mukhopadhyay, Sai Praveen Kadiyala, Siew-Kei Lam, Thambipillai Srikanthan:
Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization. 289-303 - Danilo Sijacic

, Josep Balasch
, Bohan Yang, Santosh Ghosh, Ingrid Verbauwhede
:
Towards efficient and automated side-channel evaluations at design time. 305-319 - Mael Gay, Batya Karp, Osnat Keren, Ilia Polian

:
Error control scheme for malicious and natural faults in cryptographic modules. 321-336 - Maamar Ouladj

, Nadia El Mrabet, Sylvain Guilley, Philippe Guillot, Gilles Millérioux:
On the power of template attacks in highly multivariate context. 337-354 - Anubhab Baksi, Dhiman Saha

, Sumanta Sarkar:
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. 355-374

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














