Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jce/jce9.bht:"
@article{DBLP:journals/jce/0003RM19, author = {Poulami Das and Debapriya Basu Roy and Debdeep Mukhopadhyay}, title = {Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {263--275}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00219-1}, doi = {10.1007/S13389-019-00219-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/0003RM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BanegasCP19, author = {Gustavo Banegas and Ricardo Felipe Cust{\'{o}}dio and Daniel Panario}, title = {A new class of irreducible pentanomials for polynomial-based multipliers in binary fields}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {359--373}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0197-6}, doi = {10.1007/S13389-018-0197-6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BanegasCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BanikBR19, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Compact circuits for combined {AES} encryption/decryption}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {69--83}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0176-3}, doi = {10.1007/S13389-017-0176-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BanikBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaCPST19, author = {Lejla Batina and Lukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall}, title = {Online template attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {21--36}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0171-8}, doi = {10.1007/S13389-017-0171-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaCPST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BaumannSD19, author = {Christoph Baumann and Oliver Schwarz and Mads Dam}, title = {On the verification of system-level information flow properties for virtualized execution platforms}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {243--261}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00216-4}, doi = {10.1007/S13389-019-00216-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BaumannSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarletDGT19, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Polynomial direct sum masking to protect against both {SCA} and {FIA}}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {303--312}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0194-9}, doi = {10.1007/S13389-018-0194-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarletDGT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CianfrigliaGBLP19, author = {Marco Cianfriglia and Stefano Guarino and Massimo Bernaschi and Flavio Lombardi and Marco Pedicini}, title = {Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {375--392}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00217-3}, doi = {10.1007/S13389-019-00217-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CianfrigliaGBLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DinuCKPGB19, author = {Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and L{\'{e}}o Perrin and Johann Gro{\ss}sch{\"{a}}dl and Alex Biryukov}, title = {Triathlon of lightweight block ciphers for the Internet of things}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {283--302}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0193-x}, doi = {10.1007/S13389-018-0193-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DinuCKPGB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DiopLOLM19, author = {Ibrahima Diop and Yanis Linge and Thomas Ordas and Pierre{-}Yvan Liardet and Philippe Maurine}, title = {From theory to practice: horizontal attacks on protected implementations of modular exponentiations}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {37--52}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0181-1}, doi = {10.1007/S13389-018-0181-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DiopLOLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DruckerG19, author = {Nir Drucker and Shay Gueron}, title = {A toolbox for software optimization of {QC-MDPC} code-based cryptosystems}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {341--357}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-00200-4}, doi = {10.1007/S13389-018-00200-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DruckerG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GeraudN19, author = {R{\'{e}}mi G{\'{e}}raud and David Naccache}, title = {Mixed-radix Naccache-Stern encryption}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {277--282}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0188-7}, doi = {10.1007/S13389-018-0188-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GeraudN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HerbertBF19, author = {Vincent Herbert and Bhaskar Biswas and Caroline Fontaine}, title = {Design and implementation of low-depth pairing-based homomorphic encryption scheme}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {185--201}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0192-y}, doi = {10.1007/S13389-018-0192-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HerbertBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutchinsonK19, author = {Aaron Hutchinson and Koray Karabina}, title = {Constructing multidimensional differential addition chains and their applications}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {1--19}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0177-2}, doi = {10.1007/S13389-017-0177-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutchinsonK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HutterT19, author = {Michael Hutter and Michael Tunstall}, title = {Constant-time higher-order Boolean-to-arithmetic masking}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {173--184}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0191-z}, doi = {10.1007/S13389-018-0191-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HutterT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KawamuraKSY19, author = {Shinichi Kawamura and Yuichi Komano and Hideo Shimizu and Tomoko Yonemura}, title = {{RNS} Montgomery reduction algorithms using quadratic residuosity}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {313--331}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0195-8}, doi = {10.1007/S13389-018-0195-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/KawamuraKSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Konheim19, author = {Alan G. Konheim}, title = {Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {85--100}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0198-5}, doi = {10.1007/S13389-018-0198-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Konheim19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LevinaMST19, author = {Alla Levina and Roman Mostovoi and Daria Sleptsova and Lavrentii Tcvetkov}, title = {Physical model of sensitive data leakage from PC-based cryptographic systems}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {393--400}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00215-5}, doi = {10.1007/S13389-019-00215-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/LevinaMST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuahmaMHE19, author = {In{\`{e}}s Ben El Ouahma and Quentin L. Meunier and Karine Heydemann and Emmanuelle Encrenaz}, title = {Side-channel robustness analysis of masked assembly codes using a symbolic approach}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {231--242}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00205-7}, doi = {10.1007/S13389-019-00205-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuahmaMHE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PeccerilloBK19, author = {Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Parallel bitsliced {AES} through {PHAST:} a single-source high-performance library for multi-cores and GPUs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {159--171}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0175-4}, doi = {10.1007/S13389-017-0175-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/PeccerilloBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RobertNP19, author = {Jean{-}Marc Robert and Christophe N{\`{e}}gre and Thomas Plantard}, title = {Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {115--136}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0196-7}, doi = {10.1007/S13389-018-0196-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RobertNP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SahaC19, author = {Dhiman Saha and Dipanwita Roy Chowdhury}, title = {Internal differential fault analysis of parallelizable ciphers in the counter-mode}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {1}, pages = {53--67}, year = {2019}, url = {https://doi.org/10.1007/s13389-017-0179-0}, doi = {10.1007/S13389-017-0179-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SahaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SahaKMD19, author = {Sayandeep Saha and Ujjawal Kumar and Debdeep Mukhopadhyay and Pallab Dasgupta}, title = {An automated framework for exploitable fault identification in block ciphers}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {203--219}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00203-9}, doi = {10.1007/S13389-019-00203-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SahaKMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SaldamliB19, author = {G{\"{o}}kay Saldamli and Yoo{-}Jin Baek}, title = {Uniform Montgomery multiplier}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {333--339}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00213-7}, doi = {10.1007/S13389-019-00213-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SaldamliB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UenoHNA19, author = {Rei Ueno and Naofumi Homma and Yasuyuki Nogami and Takafumi Aoki}, title = {Highly efficient GF(2\({}^{\mbox{8}}\)) inversion circuit based on hybrid {GF} representations}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {101--113}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0187-8}, doi = {10.1007/S13389-018-0187-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UenoHNA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/UnterluggauerWM19, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {{MEAS:} memory encryption and authentication secure against side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {2}, pages = {137--158}, year = {2019}, url = {https://doi.org/10.1007/s13389-018-0180-2}, doi = {10.1007/S13389-018-0180-2}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/UnterluggauerWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WisiolM19, author = {Nils Wisiol and Marian Margraf}, title = {Why attackers lose: design and security analysis of arbitrarily large {XOR} arbiter PUFs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {3}, pages = {221--230}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00204-8}, doi = {10.1007/S13389-019-00204-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WisiolM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WuW19, author = {Tao Wu and Ruomei Wang}, title = {Fast unified elliptic curve point multiplication for {NIST} prime curves on FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {9}, number = {4}, pages = {401--410}, year = {2019}, url = {https://doi.org/10.1007/s13389-019-00211-9}, doi = {10.1007/S13389-019-00211-9}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/WuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.