Sign in
J. Cryptogr. Eng.
2011
2015
2019
2023
2011
2023
Keyphrases
Publications
volume 13, number 1, 2023
Pradeep Kumar Goud Nadikuda
,
Lakshmi Boppana
) using polynomial basis.
J. Cryptogr. Eng.
13 (1) (2023)
Gora Adj
,
Jesús-Javier Chi-Domínguez
,
Francisco Rodríguez-Henríquez
Karatsuba-based square-root Vélu's formulas applied to two isogeny-based protocols.
J. Cryptogr. Eng.
13 (1) (2023)
Dmitrii Koshelev
Subgroup membership testing on elliptic curves via the Tate pairing.
J. Cryptogr. Eng.
13 (1) (2023)
Andreas Wiemers
,
Johannes Mittmann
Improving recent side-channel attacks against the DES key schedule.
J. Cryptogr. Eng.
13 (1) (2023)
Jean-Marc Robert
,
Pascal Véron
Faster multiplication over ${\mathbb {F}}_2[X]$ using AVX512 instruction set and VPCLMULQDQ instruction.
J. Cryptogr. Eng.
13 (1) (2023)
Vidal Attias
,
Luigi Vigneri
,
Vassil S. Dimitrov
Rethinking modular multi-exponentiation in real-world applications.
J. Cryptogr. Eng.
13 (1) (2023)
Alexandre Augusto Giron
,
Ricardo Custódio
,
Francisco Rodríguez-Henríquez
Post-quantum hybrid key exchange: a systematic mapping study.
J. Cryptogr. Eng.
13 (1) (2023)
Ihsan Çiçek
,
Ahmad Alkhas
A new read-write collision-based SRAM PUF implemented on Xilinx FPGAs.
J. Cryptogr. Eng.
13 (1) (2023)
volume 13, number 2, 2023
Bo-Yuan Peng
,
Adrian Marotzke
,
Ming-Han Tsai
,
Bo-Yin Yang
,
Ho-Lin Chen
Streamlined NTRU Prime on FPGA.
J. Cryptogr. Eng.
13 (2) (2023)
Sumit Kumar Debnath
,
Sihem Mesnager
,
Vikas Srivastava
,
Saibal Kumar Pal
,
Nibedita Kundu
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture.
J. Cryptogr. Eng.
13 (2) (2023)
Ryusuke Koseki
,
Akira Ito
,
Rei Ueno
,
Mehdi Tibouchi
,
Naofumi Homma
Homomorphic encryption for stochastic computing.
J. Cryptogr. Eng.
13 (2) (2023)
Priyanka Joshi
,
Bodhisatwa Mazumdar
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox.
J. Cryptogr. Eng.
13 (2) (2023)
Loïc Masure
,
Rémi Strullu
Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning.
J. Cryptogr. Eng.
13 (2) (2023)
Elena Almaraz Luengo
,
Bittor Alaña Olivares
,
Luis Javier García-Villalba
,
Julio Hernandez-Castro
,
Darren Hurley-Smith
StringENT test suite: ENT battery revisited for efficient P value computation.
J. Cryptogr. Eng.
13 (2) (2023)
Vincent Werner
,
Laurent Maingault
,
Marie-Laure Potet
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers.
J. Cryptogr. Eng.
13 (2) (2023)
Yaxin Cui
,
Hong Xu
,
Lin Tan
,
Huajin Chen
,
Wenfeng Qi
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64.
J. Cryptogr. Eng.
13 (2) (2023)
volume 13, number 3, 2023
Dor Salomon
,
Itamar Levi
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case.
J. Cryptogr. Eng.
13 (3) (2023)
Maikel Kerkhof
,
Lichao Wu
,
Guilherme Perin
,
Stjepan Picek
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis.
J. Cryptogr. Eng.
13 (3) (2023)
Jason T. LeGrow
A faster method for fault attack resistance in static/ephemeral CSIDH.
J. Cryptogr. Eng.
13 (3) (2023)
Hamed Arshad
,
Pablo Picazo-Sanchez
,
Christian Johansen
,
Gerardo Schneider
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng.
13 (3) (2023)
Iftekhar Salam
,
Wei-Chuen Yau
,
Raphaël C.-W. Phan
,
Josef Pieprzyk
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng.
13 (3) (2023)
Jean-Claude Bajard
,
Kazuhide Fukushima
,
Thomas Plantard
,
Arnaud Sipasseuth
Fast verification and public key storage optimization for unstructured lattice-based signatures.
J. Cryptogr. Eng.
13 (3) (2023)
Pedro Geraldo M. R. Alves
,
Jheyne N. Ortiz
,
Diego F. Aranha
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference.
J. Cryptogr. Eng.
13 (3) (2023)
volume 13, number 4, 2023
Kunihiro Kuroda
,
Yuta Fukuda
,
Kota Yoshida
,
Takeshi Fujino
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM.
J. Cryptogr. Eng.
13 (4) (2023)
Kalle Ngo
,
Elena Dubrova
,
Thomas Johansson
A side-channel attack on a masked and shuffled software implementation of Saber.
J. Cryptogr. Eng.
13 (4) (2023)
Rony Komissarov
,
Sharon Vaisman
,
Avishai Wool
Spoofing attacks against vehicular FMCW radar.
J. Cryptogr. Eng.
13 (4) (2023)
Calvin Deutschbein
,
Andres Meza
,
Francesco Restuccia
,
Ryan Kastner
,
Cynthia Sturton
Isadora: automated information-flow property generation for hardware security verification.
J. Cryptogr. Eng.
13 (4) (2023)
Chip-Hong Chang
,
Stefan Katzenbeisser
,
Debdeep Mukhopadhyay
,
Ulrich Rührmair
The ASHES 2021 special issue at JCEN.
J. Cryptogr. Eng.
13 (4) (2023)
Malik Imran
,
Felipe Almeida
,
Andrea Basso
,
Sujoy Sinha Roy
,
Samuel Pagliarini
High-speed SABER key encapsulation mechanism in 65nm CMOS.
J. Cryptogr. Eng.
13 (4) (2023)
Aurélien Vasselle
,
Hugues Thiebeauld
,
Philippe Maurine
Spatial dependency analysis to extract information from side-channel mixtures: extended version.
J. Cryptogr. Eng.
13 (4) (2023)
Thilo Krachenfels
,
Jean-Pierre Seifert
,
Shahin Tajik
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version).
J. Cryptogr. Eng.
13 (4) (2023)
volume 12, number 2, 2022
Mathieu Gross
,
Nisha Jacob
,
Andreas Zankl
,
Georg Sigl
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC.
J. Cryptogr. Eng.
12 (2) (2022)
Duc-Phong Le
,
Rongxing Lu
,
Ali A. Ghorbani
Improved fault analysis on SIMECK ciphers.
J. Cryptogr. Eng.
12 (2) (2022)
Carlo Brunetta
,
Pablo Picazo-Sanchez
Modelling cryptographic distinguishers using machine learning.
J. Cryptogr. Eng.
12 (2) (2022)
Fanghui Liu
,
Waldemar Cruz
,
Laurent Michel
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming.
J. Cryptogr. Eng.
12 (2) (2022)
volume 12, number 3, 2022
Jorge Chávez-Saab
,
Jesús-Javier Chi-Domínguez
,
Samuel Jaques
,
Francisco Rodríguez-Henríquez
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents.
J. Cryptogr. Eng.
12 (3) (2022)
Juan Di Mauro
,
Eduardo Salazar
,
Hugo D. Scolnik
Design and implementation of a novel cryptographically secure pseudorandom number generator.
J. Cryptogr. Eng.
12 (3) (2022)
Jean-Max Dutertre
,
Amir-Pasha Mirbaha
,
David Naccache
,
Assia Tria
Photonic power firewalls.
J. Cryptogr. Eng.
12 (3) (2022)
Esra Yeniaras
,
Murat Cenk
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation.
J. Cryptogr. Eng.
12 (3) (2022)
Susanne Engels
,
Max Hoffmann
,
Christof Paar
A critical view on the real-world security of logic locking.
J. Cryptogr. Eng.
12 (3) (2022)
Kalikinkar Mandal
,
Dhiman Saha
,
Sumanta Sarkar
,
Yosuke Todo
Sycon: a new milestone in designing ASCON-like permutations.
J. Cryptogr. Eng.
12 (3) (2022)
Sreeja Chowdhury
,
Ana Covic
,
Rabin Yu Acharya
,
Spencer Dupee
,
Fatemeh Ganji
,
Domenic Forte
Physical security in the post-quantum era.
J. Cryptogr. Eng.
12 (3) (2022)
volume 12, number 4, 2022
Anup Kumar Kundu
,
Aikata
,
Banashri Karmakar
,
Dhiman Saha
Fault analysis of the PRINCE family of lightweight ciphers.
J. Cryptogr. Eng.
12 (4) (2022)
Chenglu Jin
,
Wayne P. Burleson
,
Marten van Dijk
,
Ulrich Rührmair
Programmable access-controlled and generic erasable PUF design and its applications.
J. Cryptogr. Eng.
12 (4) (2022)
Jacob Fustos
,
Michael Garrett Bechtel
,
Heechul Yun
A framework for leaking secrets to past instructions.
J. Cryptogr. Eng.
12 (4) (2022)
Markku-Juhani O. Saarinen
,
G. Richard Newell
,
Ben Marshall
Development of the RISC-V entropy source interface.
J. Cryptogr. Eng.
12 (4) (2022)
Rijoy Mukherjee
,
Sree Ranjani Rajendran
,
Rajat Subhra Chakraborty
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention.
J. Cryptogr. Eng.
12 (4) (2022)
Amit Jana
,
Anirban Nath
,
Goutam Paul
,
Dhiman Saha
Differential fault analysis of NORX using variants of coupon collector problem.
J. Cryptogr. Eng.
12 (4) (2022)
Chip-Hong Chang
,
Stefan Katzenbeisser
,
Ulrich Rührmair
,
Patrick Schaumont
The ASHES 2020 special issue at JCEN.
J. Cryptogr. Eng.
12 (4) (2022)
Ulrich Rührmair
Secret-free security: a survey and tutorial.
J. Cryptogr. Eng.
12 (4) (2022)