Search dblp for Publications

export results for "toc:db/journals/jce/jce9.bht:"

 download as .bib file

@article{DBLP:journals/jce/0003RM19,
  author       = {Poulami Das and
                  Debapriya Basu Roy and
                  Debdeep Mukhopadhyay},
  title        = {Automatic generation of HCCA-resistant scalar multiplication algorithm
                  by proper sequencing of field multiplier operands},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {263--275},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00219-1},
  doi          = {10.1007/S13389-019-00219-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/0003RM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BanegasCP19,
  author       = {Gustavo Banegas and
                  Ricardo Felipe Cust{\'{o}}dio and
                  Daniel Panario},
  title        = {A new class of irreducible pentanomials for polynomial-based multipliers
                  in binary fields},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {359--373},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0197-6},
  doi          = {10.1007/S13389-018-0197-6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BanegasCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BanikBR19,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Francesco Regazzoni},
  title        = {Compact circuits for combined {AES} encryption/decryption},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {69--83},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0176-3},
  doi          = {10.1007/S13389-017-0176-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BanikBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BatinaCPST19,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Louiza Papachristodoulou and
                  Peter Schwabe and
                  Michael Tunstall},
  title        = {Online template attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {21--36},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0171-8},
  doi          = {10.1007/S13389-017-0171-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BaumannSD19,
  author       = {Christoph Baumann and
                  Oliver Schwarz and
                  Mads Dam},
  title        = {On the verification of system-level information flow properties for
                  virtualized execution platforms},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {243--261},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00216-4},
  doi          = {10.1007/S13389-019-00216-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BaumannSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarletDGT19,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Polynomial direct sum masking to protect against both {SCA} and {FIA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {303--312},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0194-9},
  doi          = {10.1007/S13389-018-0194-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarletDGT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CianfrigliaGBLP19,
  author       = {Marco Cianfriglia and
                  Stefano Guarino and
                  Massimo Bernaschi and
                  Flavio Lombardi and
                  Marco Pedicini},
  title        = {Kite attack: reshaping the cube attack for a flexible GPU-based maxterm
                  search},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {375--392},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00217-3},
  doi          = {10.1007/S13389-019-00217-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CianfrigliaGBLP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DinuCKPGB19,
  author       = {Daniel Dinu and
                  Yann Le Corre and
                  Dmitry Khovratovich and
                  L{\'{e}}o Perrin and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Alex Biryukov},
  title        = {Triathlon of lightweight block ciphers for the Internet of things},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {283--302},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0193-x},
  doi          = {10.1007/S13389-018-0193-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DinuCKPGB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DiopLOLM19,
  author       = {Ibrahima Diop and
                  Yanis Linge and
                  Thomas Ordas and
                  Pierre{-}Yvan Liardet and
                  Philippe Maurine},
  title        = {From theory to practice: horizontal attacks on protected implementations
                  of modular exponentiations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {37--52},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0181-1},
  doi          = {10.1007/S13389-018-0181-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DiopLOLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DruckerG19,
  author       = {Nir Drucker and
                  Shay Gueron},
  title        = {A toolbox for software optimization of {QC-MDPC} code-based cryptosystems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {341--357},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-00200-4},
  doi          = {10.1007/S13389-018-00200-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DruckerG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GeraudN19,
  author       = {R{\'{e}}mi G{\'{e}}raud and
                  David Naccache},
  title        = {Mixed-radix Naccache-Stern encryption},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {277--282},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0188-7},
  doi          = {10.1007/S13389-018-0188-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GeraudN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HerbertBF19,
  author       = {Vincent Herbert and
                  Bhaskar Biswas and
                  Caroline Fontaine},
  title        = {Design and implementation of low-depth pairing-based homomorphic encryption
                  scheme},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {185--201},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0192-y},
  doi          = {10.1007/S13389-018-0192-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HerbertBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutchinsonK19,
  author       = {Aaron Hutchinson and
                  Koray Karabina},
  title        = {Constructing multidimensional differential addition chains and their
                  applications},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {1--19},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0177-2},
  doi          = {10.1007/S13389-017-0177-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutchinsonK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/HutterT19,
  author       = {Michael Hutter and
                  Michael Tunstall},
  title        = {Constant-time higher-order Boolean-to-arithmetic masking},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {173--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0191-z},
  doi          = {10.1007/S13389-018-0191-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/HutterT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KawamuraKSY19,
  author       = {Shinichi Kawamura and
                  Yuichi Komano and
                  Hideo Shimizu and
                  Tomoko Yonemura},
  title        = {{RNS} Montgomery reduction algorithms using quadratic residuosity},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {313--331},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0195-8},
  doi          = {10.1007/S13389-018-0195-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/KawamuraKSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Konheim19,
  author       = {Alan G. Konheim},
  title        = {Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm
                  that changed cryptology},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {85--100},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0198-5},
  doi          = {10.1007/S13389-018-0198-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Konheim19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LevinaMST19,
  author       = {Alla Levina and
                  Roman Mostovoi and
                  Daria Sleptsova and
                  Lavrentii Tcvetkov},
  title        = {Physical model of sensitive data leakage from PC-based cryptographic
                  systems},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {393--400},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00215-5},
  doi          = {10.1007/S13389-019-00215-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/LevinaMST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OuahmaMHE19,
  author       = {In{\`{e}}s Ben El Ouahma and
                  Quentin L. Meunier and
                  Karine Heydemann and
                  Emmanuelle Encrenaz},
  title        = {Side-channel robustness analysis of masked assembly codes using a
                  symbolic approach},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {231--242},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00205-7},
  doi          = {10.1007/S13389-019-00205-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OuahmaMHE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PeccerilloBK19,
  author       = {Biagio Peccerillo and
                  Sandro Bartolini and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Parallel bitsliced {AES} through {PHAST:} a single-source high-performance
                  library for multi-cores and GPUs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {159--171},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0175-4},
  doi          = {10.1007/S13389-017-0175-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/PeccerilloBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobertNP19,
  author       = {Jean{-}Marc Robert and
                  Christophe N{\`{e}}gre and
                  Thomas Plantard},
  title        = {Efficient Fixed-base exponentiation and scalar multiplication based
                  on a multiplicative splitting exponent recoding},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {115--136},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0196-7},
  doi          = {10.1007/S13389-018-0196-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RobertNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SahaC19,
  author       = {Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  title        = {Internal differential fault analysis of parallelizable ciphers in
                  the counter-mode},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {53--67},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-017-0179-0},
  doi          = {10.1007/S13389-017-0179-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SahaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SahaKMD19,
  author       = {Sayandeep Saha and
                  Ujjawal Kumar and
                  Debdeep Mukhopadhyay and
                  Pallab Dasgupta},
  title        = {An automated framework for exploitable fault identification in block
                  ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {203--219},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00203-9},
  doi          = {10.1007/S13389-019-00203-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SahaKMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SaldamliB19,
  author       = {G{\"{o}}kay Saldamli and
                  Yoo{-}Jin Baek},
  title        = {Uniform Montgomery multiplier},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {333--339},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00213-7},
  doi          = {10.1007/S13389-019-00213-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SaldamliB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UenoHNA19,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Yasuyuki Nogami and
                  Takafumi Aoki},
  title        = {Highly efficient GF(2\({}^{\mbox{8}}\)) inversion circuit based on
                  hybrid {GF} representations},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {101--113},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0187-8},
  doi          = {10.1007/S13389-018-0187-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UenoHNA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/UnterluggauerWM19,
  author       = {Thomas Unterluggauer and
                  Mario Werner and
                  Stefan Mangard},
  title        = {{MEAS:} memory encryption and authentication secure against side-channel
                  attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {2},
  pages        = {137--158},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-018-0180-2},
  doi          = {10.1007/S13389-018-0180-2},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/UnterluggauerWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WisiolM19,
  author       = {Nils Wisiol and
                  Marian Margraf},
  title        = {Why attackers lose: design and security analysis of arbitrarily large
                  {XOR} arbiter PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {221--230},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00204-8},
  doi          = {10.1007/S13389-019-00204-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WisiolM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/WuW19,
  author       = {Tao Wu and
                  Ruomei Wang},
  title        = {Fast unified elliptic curve point multiplication for {NIST} prime
                  curves on FPGAs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {401--410},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13389-019-00211-9},
  doi          = {10.1007/S13389-019-00211-9},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/WuW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics