


default search action
Journal of Cryptographic Engineering, Volume 9
Volume 9, Number 1, April 2019
- Aaron Hutchinson, Koray Karabina:

Constructing multidimensional differential addition chains and their applications. 1-19 - Lejla Batina, Lukasz Chmielewski

, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall
:
Online template attacks. 21-36 - Ibrahima Diop, Yanis Linge, Thomas Ordas, Pierre-Yvan Liardet, Philippe Maurine:

From theory to practice: horizontal attacks on protected implementations of modular exponentiations. 37-52 - Dhiman Saha

, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. 53-67 - Subhadeep Banik

, Andrey Bogdanov
, Francesco Regazzoni
:
Compact circuits for combined AES encryption/decryption. 69-83 - Alan G. Konheim:

Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology. 85-100
Volume 9, Number 2, June 2019
- Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki:

Highly efficient GF(28) inversion circuit based on hybrid GF representations. 101-113 - Jean-Marc Robert

, Christophe Nègre, Thomas Plantard
:
Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding. 115-136 - Thomas Unterluggauer

, Mario Werner, Stefan Mangard
:
MEAS: memory encryption and authentication secure against side-channel attacks. 137-158 - Biagio Peccerillo

, Sandro Bartolini, Çetin Kaya Koç
:
Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs. 159-171 - Michael Hutter, Michael Tunstall

:
Constant-time higher-order Boolean-to-arithmetic masking. 173-184 - Vincent Herbert, Bhaskar Biswas, Caroline Fontaine:

Design and implementation of low-depth pairing-based homomorphic encryption scheme. 185-201
Volume 9, Number 3, September 2019
- Sayandeep Saha

, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
An automated framework for exploitable fault identification in block ciphers. 203-219 - Nils Wisiol

, Marian Margraf:
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs. 221-230 - Inès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz:

Side-channel robustness analysis of masked assembly codes using a symbolic approach. 231-242 - Christoph Baumann

, Oliver Schwarz
, Mads Dam
:
On the verification of system-level information flow properties for virtualized execution platforms. 243-261 - Poulami Das

, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands. 263-275 - Rémi Géraud

, David Naccache:
Mixed-radix Naccache-Stern encryption. 277-282 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov

:
Triathlon of lightweight block ciphers for the Internet of things. 283-302 - Claude Carlet, Abderrahman Daif

, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. 303-312
Volume 9, Number 4, November 2019
- Shinichi Kawamura

, Yuichi Komano
, Hideo Shimizu, Tomoko Yonemura:
RNS Montgomery reduction algorithms using quadratic residuosity. 313-331 - Gökay Saldamli, Yoo-Jin Baek:

Uniform Montgomery multiplier. 333-339 - Nir Drucker

, Shay Gueron:
A toolbox for software optimization of QC-MDPC code-based cryptosystems. 341-357 - Gustavo Banegas

, Ricardo Felipe Custódio, Daniel Panario
:
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields. 359-373 - Marco Cianfriglia

, Stefano Guarino
, Massimo Bernaschi
, Flavio Lombardi
, Marco Pedicini
:
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search. 375-392 - Alla Levina

, Roman Mostovoi, Daria Sleptsova, Lavrentii Tcvetkov:
Physical model of sensitive data leakage from PC-based cryptographic systems. 393-400 - Tao Wu

, Ruomei Wang:
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs. 401-410

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














