


default search action
Journal of Cryptographic Engineering, Volume 12
Volume 12, Number 1, April 2022
- Maria Chiara Molteni

, Vittorio Zaccaria
:
A relation calculus for reasoning about t-probing security. 1-14 - Dusan Bozilov

, Miroslav Knezevic, Ventzislav Nikov:
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications. 15-51 - Andrea Caforio

, Fatih Balli, Subhadeep Banik
:
Melting SNOW-V: improved lightweight architectures. 53-73 - Maamar Ouladj

, Sylvain Guilley
, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. 75-93 - Benjamin Buhrow

, Barry K. Gilbert, Clifton R. Haider:
Parallel modular multiplication using 512-bit advanced vector instructions. 95-105 - Kaushik Nath

, Palash Sarkar:
Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels. 107-121
Volume 12, Number 2, June 2022
- Carlo Brunetta

, Pablo Picazo-Sanchez
:
Modelling cryptographic distinguishers using machine learning. 123-135 - Jori Winderickx

, An Braeken
, Dave Singelée
, Nele Mentens
:
In-depth energy analysis of security algorithms and protocols for the Internet of Things. 137-149 - Liron David

, Avishai Wool
:
Rank estimation with bounded error via exponential sampling. 151-168 - Duc-Phong Le

, Rongxing Lu, Ali A. Ghorbani:
Improved fault analysis on SIMECK ciphers. 169-180 - Mathieu Gross

, Nisha Jacob, Andreas Zankl
, Georg Sigl:
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC. 181-196 - Fanghui Liu

, Waldemar Cruz, Laurent Michel
:
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming. 197-228
Volume 12, Number 3, September 2022
- Susanne Engels

, Max Hoffmann, Christof Paar:
A critical view on the real-world security of logic locking. 229-244 - Jean-Max Dutertre, Amir-Pasha Mirbaha

, David Naccache, Assia Tria:
Photonic power firewalls. 245-254 - Juan Di Mauro

, Eduardo Salazar
, Hugo D. Scolnik:
Design and implementation of a novel cryptographically secure pseudorandom number generator. 255-265 - Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji

, Domenic Forte
:
Physical security in the post-quantum era. 267-303 - Kalikinkar Mandal, Dhiman Saha

, Sumanta Sarkar, Yosuke Todo
:
Sycon: a new milestone in designing ASCON-like permutations. 305-327 - Esra Yeniaras

, Murat Cenk
:
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation. 329-348 - Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez

, Samuel Jaques
, Francisco Rodríguez-Henríquez:
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents. 349-368
Volume 12, Number 4, November 2022
- Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont:

The ASHES 2020 special issue at JCEN. 369-370 - Markku-Juhani O. Saarinen

, G. Richard Newell, Ben Marshall:
Development of the RISC-V entropy source interface. 371-386 - Ulrich Rührmair

:
Secret-free security: a survey and tutorial. 387-412 - Chenglu Jin

, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Programmable access-controlled and generic erasable PUF design and its applications. 413-432 - Amit Jana, Anirban Nath, Goutam Paul

, Dhiman Saha
:
Differential fault analysis of NORX using variants of coupon collector problem. 433-459 - Jacob Fustos, Michael Garrett Bechtel, Heechul Yun:

A framework for leaking secrets to past instructions. 461-473 - Anup Kumar Kundu

, Aikata
, Banashri Karmakar
, Dhiman Saha
:
Fault analysis of the PRINCE family of lightweight ciphers. 475-494 - Rijoy Mukherjee

, Sree Ranjani Rajendran, Rajat Subhra Chakraborty:
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention. 495-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














