


default search action
Journal of Cryptographic Engineering, Volume 3
Volume 3, Number 1, April 2013
- Emmanuel Prouff, Patrick Schaumont

:
Introduction to the CHES 2012 special issue. 1 - Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert:

Simple photonic emission analysis of AES. 3-15 - Ulrich Rührmair, Marten van Dijk

:
On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. 17-28 - Stefan Heyse, Tim Güneysu

:
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance. 29-43 - Benoît Gérard, François-Xavier Standaert

:
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version. 45-58 - Pierre-Alain Fouque

, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
Attacking RSA-CRT signatures with faults on montgomery multiplication. 59-72
Volume 3, Number 2, June 2013
- Subidh Ali

, Debdeep Mukhopadhyay, Michael Tunstall
:
Differential fault analysis of AES: towards reaching its limits. 73-97 - David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Eric D. Laspe:

Improving cross-device attacks using zero-mean unit-variance normalization. 99-110 - Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, Aviel D. Rubin:

Charm: a framework for rapidly prototyping cryptosystems. 111-128 - Michael T. Kurdziel, Marcin Lukowiak, Michael A. Sanfilippo:

Minimizing performance overhead in memory encryption. 129-138
Volume 3, Number 3, September 2013
- Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter

, Johannes Buchmann:
Improved algebraic side-channel attack on AES. 139-156 - Maria Christofi, Boutheina Chetali, Louis Goubin, David Vigilant:

Formal verification of a CRT-RSA implementation against fault attacks. 157-167 - Sébastien Briais, Jean-Luc Danger, Sylvain Guilley:

A formal study of two physical countermeasures against side channel attacks. 169-180 - Mark Brown:

Toward a taxonomy of communications security models. 181-195
Volume 3, Number 4, November 2013
- Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh:

Variety enhancement of PUF responses using the locations of random outputting RS latches. 197-211 - Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger:

From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. 213-225 - Abdel Alim Kamal, Amr M. Youssef:

Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks. 227-240 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:

A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards. 241-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














