


default search action
Journal of Cryptographic Engineering, Volume 14
Volume 14, Number 1, April 2024
- Felix Oberhansl
, Tim Fritzmann, Thomas Pöppelmann, Debapriya Basu Roy, Georg Sigl:
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography. 1-18 - Satyam Kumar
, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. 19-34 - Leonardo A. D. S. Ribeiro
, José Paulo da Silva Lima
, Ruy J. G. B. de Queiroz, Amirton Bezerra Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos:
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures. 35-41 - Shiping Cai, Zhi Hu, Zheng-an Yao, Chang-An Zhao
:
The elliptic net algorithm revisited. 43-55 - Cuiping Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang:
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit. 57-70 - Dúnia Marchiori
, Ricardo Custódio, Daniel Panario, Lucia Moura:
Probabilistic root finding in code-based cryptography. 71-85 - Elif Ozbay Gurler
, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 87-101 - Priyanka Joshi
, Bodhisatwa Mazumdar
:
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN. 103-125 - Dmitrii I. Koshelev
:
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing. 127-128 - Fan Zhang:
Editorial about PROOFS 2021. 129 - Wei Cheng
, Yi Liu, Sylvain Guilley
, Olivier Rioul
:
Toward finding best linear codes for side-channel protections (extended version). 131-145 - Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. 147-164 - Tamon Asano, Takeshi Sugawara
:
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version. 165-180
Volume 14, Number 2, June 2024
- Luis Guillen
:
The Asymmetric five-card trick: working with variable encoding in card-based protocols. 181-192 - Argyrios Sideris
, Theodora Sanida, Minas Dasygenis:
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA. 193-205 - Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand:
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations. 207-221 - Claude Carlet
, Abderrahman Daif
, Sylvain Guilley
, Cédric Tavernier
:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. 223-240 - Furkan Aydin
, Aydin Aysu:
Leaking secrets in homomorphic encryption with side-channel attacks. 241-251 - Vaishnavi Kumar, Padmapriya Pravinkumar:
Quantum random number generator on IBM QX. 253-259 - Muhammed Jassem Al-Muhammed:
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation. 261-279 - Milad Seddigh
, Mahdi Esfahani
, Sarani Bhattacharya
, Mohammad Reza Aref
, Hadi Soleimany
:
Breaking KASLR on mobile devices without any use of cache memory (extended version). 281-294 - Satyanarayana Vollala:
Energy efficient triple-modular exponential techniques for batch verification schemes. 295-309 - Muayad J. Aljafar, Florence Azaïs, Marie-Lise Flottes, Samuel Pagliarini:
Utilizing layout effects for analog logic locking. 311-324 - Ihab Alshaer
, Gijs Burghoorn, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri:
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions. 325-342 - Kwang Ho Kim, Sihem Mesnager, Kyong Il Pak:
Montgomery curve arithmetic revisited. 343-362 - Amit Jana, Goutam Paul:
Differential fault attack on SPN-based sponge and SIV-like AE schemes. 363-381 - Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian elimination hardware for cryptographic purposes. 383-397 - Ronan Lashermes, Hélène Le Bouder:
Generic SCARE: reverse engineering without knowing the algorithm nor the machine. 399-414 - Raziyeh Salarifard, Hadi Soleimany:
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA. 415-426
Volume 14, Number 3, September 2024
- Ngoc-Tuan Do
, Van-Phuc Hoang
, Van-Sang Doan
:
A novel non-profiled side channel attack based on multi-output regression neural network. 427-439 - Oswa M. Amro
, Vishesh Mishra
, Rohit Negi, Urbi Chatterjee:
CPU-Doctor: when a device's heart-beat can be an acoustic side-channel disassembler. 441-462 - Mick G. D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens
:
AutoPOI: automated points of interest selection for side-channel analysis. 463-474 - Marina Krcek, Guilherme Perin:
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis. 475-497 - Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis. 499-511 - Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. 513-535 - Huanyu Wang:
Amplitude-modulated EM side-channel attack on provably secure masked AES. 537-549 - Cecilia Boschini
, Dario Fiore
, Elena Pagnin
, Luca Torresetti
, Andrea Visconti
:
Progressive and efficient verification for digital signatures: extensions and experimental results. 551-575 - Antonio Guimarães, Edson Borin, Diego F. Aranha
:
MOSFHET: Optimized Software for FHE over the Torus. 577-593
Volume 14, Number 4, November 2024
- Ravi Anand, Takanori Isobe, Anup Kumar Kundu, Mostafizar Rahman, Sahiba Suryawanshi:
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers - Rocca, Rocca-S and AEGIS. 595-607 - Azade Rezaeezade, Lejla Batina:
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis. 609-629 - Alexander Wagner
, Felix Oberhansl
, Marc Schink:
Extended version - to be, or not to be stateful: post-quantum secure boot using hash-based signatures. 631-648 - Huimin Li, Guilherme Perin:
A systematic study of data augmentation for protected AES implementations. 649-666

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.