![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Journal of Cryptographic Engineering, Volume 4
Volume 4, Number 1, April 2014
- Guido Bertoni
, Jean-Sébastien Coron:
Introduction to the CHES 2013 special issue. 1 - Thomaz Oliveira, Julio López, Diego F. Aranha
, Francisco Rodríguez-Henríquez:
Two is the fastest prime: lambda coordinates for binary elliptic curves. 3-17 - Georg T. Becker, Francesco Regazzoni
, Christof Paar, Wayne P. Burleson:
Stealthy dopant-level hardware Trojans: extended version. 19-31 - Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version. 33-45 - Vincent Grosso
, François-Xavier Standaert
, Sebastian Faust:
Masking vs. multiparty computation: how large is the gap for AES? 47-57 - Takeshi Sugawara
, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On measurable side-channel leaks inside ASIC design primitives. 59-73
Volume 4, Number 2, June 2014
- Leonardo C. Almeida, Ewerton R. Andrade
, Paulo S. L. M. Barreto, Marcos A. Simplício Jr.
:
Lyra: password-based key derivation with tunable memory and processing costs. 75-89 - Christophe Nègre:
Efficient binary polynomial multiplication based on optimized Karatsuba reconstruction. 91-106 - Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi, Emmanuel Prouff:
Achieving side-channel high-order correlation immunity with leakage squeezing. 107-121 - Felipe P. Biasi, Paulo S. L. M. Barreto, Rafael Misoczki, Wilson Vicente Ruggiero
:
Scaling efficient code-based cryptosystems for embedded platforms. 123-134 - Goutam Paul, Anupam Chattopadhyay:
Designing stream ciphers with scalable data-widths: a case study with HC-128. 135-143
Volume 4, Number 3, September 2014
- Nicolas Moro
, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. 145-156 - Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert
, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. 157-171 - Pablo Rauzy
, Sylvain Guilley:
A formal proof of countermeasures against fault injection attacks on CRT-RSA. 173-185 - Dina Kamel, Mathieu Renauld, Denis Flandre
, François-Xavier Standaert
:
Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. 187-195 - Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A model of the leakage in the frequency domain and its application to CPA and DPA. 197-212
Volume 4, Number 4, November 2014
- Werner Schindler
, Andreas Wiemers:
Power attacks in the presence of exponent blinding. 213-236 - Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
New algorithms for batch verification of standard ECDSA signatures. 237-258 - Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler
, Marc Stöttinger
, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. 259-274 - Joppe W. Bos:
Constant time modular inversion. 275-281
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.