default search action
Journal of Cryptographic Engineering, Volume 14
Volume 14, Number 1, April 2024
- Felix Oberhansl, Tim Fritzmann, Thomas Pöppelmann, Debapriya Basu Roy, Georg Sigl:
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography. 1-18 - Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. 19-34 - Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton Bezerra Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos:
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures. 35-41 - Shiping Cai, Zhi Hu, Zheng-an Yao, Chang-An Zhao:
The elliptic net algorithm revisited. 43-55 - Cuiping Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang:
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit. 57-70 - Dúnia Marchiori, Ricardo Custódio, Daniel Panario, Lucia Moura:
Probabilistic root finding in code-based cryptography. 71-85 - Elif Ozbay Gurler, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 87-101 - Priyanka Joshi, Bodhisatwa Mazumdar:
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN. 103-125 - Dmitrii I. Koshelev:
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing. 127-128 - Fan Zhang:
Editorial about PROOFS 2021. 129 - Wei Cheng, Yi Liu, Sylvain Guilley, Olivier Rioul:
Toward finding best linear codes for side-channel protections (extended version). 131-145 - Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. 147-164 - Tamon Asano, Takeshi Sugawara:
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version. 165-180
Volume 14, Number 2, June 2024
- Luis Guillen:
The Asymmetric five-card trick: working with variable encoding in card-based protocols. 181-192 - Argyrios Sideris, Theodora Sanida, Minas Dasygenis:
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA. 193-205 - Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand:
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations. 207-221 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. 223-240 - Furkan Aydin, Aydin Aysu:
Leaking secrets in homomorphic encryption with side-channel attacks. 241-251 - Vaishnavi Kumar, Padmapriya Pravinkumar:
Quantum random number generator on IBM QX. 253-259 - Muhammed Jassem Al-Muhammed:
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation. 261-279 - Milad Seddigh, Mahdi Esfahani, Sarani Bhattacharya, Mohammad Reza Aref, Hadi Soleimany:
Breaking KASLR on mobile devices without any use of cache memory (extended version). 281-294 - Satyanarayana Vollala:
Energy efficient triple-modular exponential techniques for batch verification schemes. 295-309 - Muayad J. Aljafar, Florence Azaïs, Marie-Lise Flottes, Samuel Pagliarini:
Utilizing layout effects for analog logic locking. 311-324 - Ihab Alshaer, Gijs Burghoorn, Brice Colombier, Christophe Deleuze, Vincent Beroulle, Paolo Maistri:
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions. 325-342 - Kwang Ho Kim, Sihem Mesnager, Kyong Il Pak:
Montgomery curve arithmetic revisited. 343-362 - Amit Jana, Goutam Paul:
Differential fault attack on SPN-based sponge and SIV-like AE schemes. 363-381 - Jingwei Hu, Wen Wang, Kris Gaj, Donglong Chen, Huaxiong Wang:
Universal Gaussian elimination hardware for cryptographic purposes. 383-397 - Ronan Lashermes, Hélène Le Bouder:
Generic SCARE: reverse engineering without knowing the algorithm nor the machine. 399-414 - Raziyeh Salarifard, Hadi Soleimany:
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA. 415-426
Volume 14, Number 3, September 2024
- Ngoc-Tuan Do, Van-Phuc Hoang, Van-Sang Doan:
A novel non-profiled side channel attack based on multi-output regression neural network. 427-439 - Oswa M. Amro, Vishesh Mishra, Rohit Negi, Urbi Chatterjee:
CPU-Doctor: when a device's heart-beat can be an acoustic side-channel disassembler. 441-462 - Mick G. D. Remmerswaal, Lichao Wu, Sébastien Tiran, Nele Mentens:
AutoPOI: automated points of interest selection for side-channel analysis. 463-474 - Marina Krcek, Guilherme Perin:
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis. 475-497 - Unai Rioja, Lejla Batina, Igor Armendariz, Jose Luis Flores:
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis. 499-511 - Damien Robissout, Lilian Bossuet, Amaury Habrard:
Scoring the predictions: a way to improve profiling side-channel attacks. 513-535 - Huanyu Wang:
Amplitude-modulated EM side-channel attack on provably secure masked AES. 537-549 - Cecilia Boschini, Dario Fiore, Elena Pagnin, Luca Torresetti, Andrea Visconti:
Progressive and efficient verification for digital signatures: extensions and experimental results. 551-575 - Antonio Guimarães, Edson Borin, Diego F. Aranha:
MOSFHET: Optimized Software for FHE over the Torus. 577-593
Volume 14, Number 4, November 2024
- Ravi Anand, Takanori Isobe, Anup Kumar Kundu, Mostafizar Rahman, Sahiba Suryawanshi:
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers - Rocca, Rocca-S and AEGIS. 595-607 - Azade Rezaeezade, Lejla Batina:
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis. 609-629 - Alexander Wagner, Felix Oberhansl, Marc Schink:
Extended version - to be, or not to be stateful: post-quantum secure boot using hash-based signatures. 631-648 - Huimin Li, Guilherme Perin:
A systematic study of data augmentation for protected AES implementations. 649-666
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.