Login / Signup
J. Cryptogr. Eng.
2011
2015
2019
2024
2011
2024
Keyphrases
Publications
volume 14, number 1, 2024
Wei Cheng
,
Yi Liu
,
Sylvain Guilley
,
Olivier Rioul
Toward finding best linear codes for side-channel protections (extended version).
J. Cryptogr. Eng.
14 (1) (2024)
Dmitrii I. Koshelev
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing.
J. Cryptogr. Eng.
14 (1) (2024)
Shiping Cai
,
Zhi Hu
,
Zheng-an Yao
,
Chang-An Zhao
The elliptic net algorithm revisited.
J. Cryptogr. Eng.
14 (1) (2024)
Elif Ozbay Gurler
,
Hüseyin Hisil
Complete group law for genus 2 Jacobians on Jacobian coordinates.
J. Cryptogr. Eng.
14 (1) (2024)
Tamon Asano
,
Takeshi Sugawara
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version.
J. Cryptogr. Eng.
14 (1) (2024)
Satyam Kumar
,
Sandip Kumar Mondal
,
Santanu Sarkar
,
Takanori Isobe
,
Anubhab Baksi
,
Avishek Adhikari
Restricted near collision attack on Plantlet.
J. Cryptogr. Eng.
14 (1) (2024)
Guilhem Lacombe
,
David Féliot
,
Etienne Boespflug
,
Marie-Laure Potet
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities.
J. Cryptogr. Eng.
14 (1) (2024)
Fan Zhang
Editorial about PROOFS 2021.
J. Cryptogr. Eng.
14 (1) (2024)
Leonardo A. D. S. Ribeiro
,
José Paulo da Silva Lima
,
Ruy J. G. B. de Queiroz
,
Amirton Bezerra Chagas
,
José R. R. Junior
,
Jonysberg P. Quintino
,
Fabio Q. B. da Silva
,
André L. M. Santos
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures.
J. Cryptogr. Eng.
14 (1) (2024)
Dúnia Marchiori
,
Ricardo Custódio
,
Daniel Panario
,
Lucia Moura
Probabilistic root finding in code-based cryptography.
J. Cryptogr. Eng.
14 (1) (2024)
Cuiping Shao
,
Dongyan Zhao
,
Huiyun Li
,
Song Cheng
,
Shunxian Gao
,
Liuqing Yang
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit.
J. Cryptogr. Eng.
14 (1) (2024)
Felix Oberhansl
,
Tim Fritzmann
,
Thomas Pöppelmann
,
Debapriya Basu Roy
,
Georg Sigl
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography.
J. Cryptogr. Eng.
14 (1) (2024)
Priyanka Joshi
,
Bodhisatwa Mazumdar
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN.
J. Cryptogr. Eng.
14 (1) (2024)
volume 14, number 2, 2024
Kwang Ho Kim
,
Sihem Mesnager
,
Kyong Il Pak
Montgomery curve arithmetic revisited.
J. Cryptogr. Eng.
14 (2) (2024)
Ronan Lashermes
,
Hélène Le Bouder
Generic SCARE: reverse engineering without knowing the algorithm nor the machine.
J. Cryptogr. Eng.
14 (2) (2024)
Ihab Alshaer
,
Gijs Burghoorn
,
Brice Colombier
,
Christophe Deleuze
,
Vincent Beroulle
,
Paolo Maistri
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions.
J. Cryptogr. Eng.
14 (2) (2024)
Furkan Aydin
,
Aydin Aysu
Leaking secrets in homomorphic encryption with side-channel attacks.
J. Cryptogr. Eng.
14 (2) (2024)
Vaishnavi Kumar
,
Padmapriya Pravinkumar
Quantum random number generator on IBM QX.
J. Cryptogr. Eng.
14 (2) (2024)
Argyrios Sideris
,
Theodora Sanida
,
Minas Dasygenis
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA.
J. Cryptogr. Eng.
14 (2) (2024)
Jingwei Hu
,
Wen Wang
,
Kris Gaj
,
Donglong Chen
,
Huaxiong Wang
Universal Gaussian elimination hardware for cryptographic purposes.
J. Cryptogr. Eng.
14 (2) (2024)
Satyanarayana Vollala
Energy efficient triple-modular exponential techniques for batch verification schemes.
J. Cryptogr. Eng.
14 (2) (2024)
Raziyeh Salarifard
,
Hadi Soleimany
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA.
J. Cryptogr. Eng.
14 (2) (2024)
Muhammed Jassem Al-Muhammed
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation.
J. Cryptogr. Eng.
14 (2) (2024)
Milad Seddigh
,
Mahdi Esfahani
,
Sarani Bhattacharya
,
Mohammad Reza Aref
,
Hadi Soleimany
Breaking KASLR on mobile devices without any use of cache memory (extended version).
J. Cryptogr. Eng.
14 (2) (2024)
Raphael Viera
,
Jean-Max Dutertre
,
Rodrigo Silva Lima
,
Matthieu Pommies
,
Anthony Bertrand
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations.
J. Cryptogr. Eng.
14 (2) (2024)
Muayad J. Aljafar
,
Florence Azaïs
,
Marie-Lise Flottes
,
Samuel Pagliarini
Utilizing layout effects for analog logic locking.
J. Cryptogr. Eng.
14 (2) (2024)
Claude Carlet
,
Abderrahman Daif
,
Sylvain Guilley
,
Cédric Tavernier
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost.
J. Cryptogr. Eng.
14 (2) (2024)
Luis Guillen
The Asymmetric five-card trick: working with variable encoding in card-based protocols.
J. Cryptogr. Eng.
14 (2) (2024)
Amit Jana
,
Goutam Paul
Differential fault attack on SPN-based sponge and SIV-like AE schemes.
J. Cryptogr. Eng.
14 (2) (2024)
volume 13, number 2, 2023
Elena Almaraz Luengo
,
Bittor Alaña Olivares
,
Luis Javier García-Villalba
,
Julio Hernandez-Castro
,
Darren Hurley-Smith
StringENT test suite: ENT battery revisited for efficient P value computation.
J. Cryptogr. Eng.
13 (2) (2023)
Bo-Yuan Peng
,
Adrian Marotzke
,
Ming-Han Tsai
,
Bo-Yin Yang
,
Ho-Lin Chen
Streamlined NTRU Prime on FPGA.
J. Cryptogr. Eng.
13 (2) (2023)
Ryusuke Koseki
,
Akira Ito
,
Rei Ueno
,
Mehdi Tibouchi
,
Naofumi Homma
Homomorphic encryption for stochastic computing.
J. Cryptogr. Eng.
13 (2) (2023)
Sumit Kumar Debnath
,
Sihem Mesnager
,
Vikas Srivastava
,
Saibal Kumar Pal
,
Nibedita Kundu
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture.
J. Cryptogr. Eng.
13 (2) (2023)
Loïc Masure
,
Rémi Strullu
Side-channel analysis against ANSSI's protected AES implementation on ARM: end-to-end attacks with multi-task learning.
J. Cryptogr. Eng.
13 (2) (2023)
Priyanka Joshi
,
Bodhisatwa Mazumdar
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox.
J. Cryptogr. Eng.
13 (2) (2023)
volume 13, number 3, 2023
Jean-Claude Bajard
,
Kazuhide Fukushima
,
Thomas Plantard
,
Arnaud Sipasseuth
Fast verification and public key storage optimization for unstructured lattice-based signatures.
J. Cryptogr. Eng.
13 (3) (2023)
Jason T. LeGrow
A faster method for fault attack resistance in static/ephemeral CSIDH.
J. Cryptogr. Eng.
13 (3) (2023)
Hamed Arshad
,
Pablo Picazo-Sanchez
,
Christian Johansen
,
Gerardo Schneider
Attribute-based encryption with enforceable obligations.
J. Cryptogr. Eng.
13 (3) (2023)
Iftekhar Salam
,
Wei-Chuen Yau
,
Raphaël C.-W. Phan
,
Josef Pieprzyk
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128.
J. Cryptogr. Eng.
13 (3) (2023)
Maikel Kerkhof
,
Lichao Wu
,
Guilherme Perin
,
Stjepan Picek
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis.
J. Cryptogr. Eng.
13 (3) (2023)
Dor Salomon
,
Itamar Levi
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case.
J. Cryptogr. Eng.
13 (3) (2023)
Pedro Geraldo M. R. Alves
,
Jheyne N. Ortiz
,
Diego F. Aranha
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference.
J. Cryptogr. Eng.
13 (3) (2023)
volume 13, number 4, 2023
Chip-Hong Chang
,
Stefan Katzenbeisser
,
Debdeep Mukhopadhyay
,
Ulrich Rührmair
The ASHES 2021 special issue at JCEN.
J. Cryptogr. Eng.
13 (4) (2023)
Thilo Krachenfels
,
Jean-Pierre Seifert
,
Shahin Tajik
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version).
J. Cryptogr. Eng.
13 (4) (2023)
Kalle Ngo
,
Elena Dubrova
,
Thomas Johansson
A side-channel attack on a masked and shuffled software implementation of Saber.
J. Cryptogr. Eng.
13 (4) (2023)
Malik Imran
,
Felipe Almeida
,
Andrea Basso
,
Sujoy Sinha Roy
,
Samuel Pagliarini
High-speed SABER key encapsulation mechanism in 65nm CMOS.
J. Cryptogr. Eng.
13 (4) (2023)
Rony Komissarov
,
Sharon Vaisman
,
Avishai Wool
Spoofing attacks against vehicular FMCW radar.
J. Cryptogr. Eng.
13 (4) (2023)
Calvin Deutschbein
,
Andres Meza
,
Francesco Restuccia
,
Ryan Kastner
,
Cynthia Sturton
Isadora: automated information-flow property generation for hardware security verification.
J. Cryptogr. Eng.
13 (4) (2023)
Aurélien Vasselle
,
Hugues Thiebeauld
,
Philippe Maurine
Spatial dependency analysis to extract information from side-channel mixtures: extended version.
J. Cryptogr. Eng.
13 (4) (2023)
Kunihiro Kuroda
,
Yuta Fukuda
,
Kota Yoshida
,
Takeshi Fujino
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM.
J. Cryptogr. Eng.
13 (4) (2023)