Search dblp for Publications

export results for "toc:db/journals/jce/jce7.bht:"

 download as .bib file

@article{DBLP:journals/jce/AldayaSS17,
  author       = {Alejandro Cabrera Aldaya and
                  Alejandro Cabrera Sarmiento and
                  Santiago S{\'{a}}nchez{-}Solano},
  title        = {{SPA} vulnerabilities of the binary extended Euclidean algorithm},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {273--285},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0135-4},
  doi          = {10.1007/S13389-016-0135-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AldayaSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/AzziBCV17,
  author       = {Sabine Azzi and
                  Bruno Barras and
                  Maria Christofi and
                  David Vigilant},
  title        = {Using linear codes as a fault countermeasure for nonlinear operations:
                  application to {AES} and formal verification},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {75--85},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0138-1},
  doi          = {10.1007/S13389-016-0138-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/AzziBCV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BhattacharyaM17,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  title        = {Formal fault analysis of branch predictors: attacking countermeasures
                  of asymmetric key ciphers},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {299--310},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0165-6},
  doi          = {10.1007/S13389-017-0165-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BhattacharyaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BossGGL0017,
  author       = {Erik Boss and
                  Vincent Grosso and
                  Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi and
                  Tobias Schneider},
  title        = {Strong 8-bit Sboxes with efficient masking in hardware extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {149--165},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0156-7},
  doi          = {10.1007/S13389-017-0156-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BossGGL0017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BottinelliB17,
  author       = {Paul Bottinelli and
                  Joppe W. Bos},
  title        = {Computational aspects of correlation power analysis},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {167--181},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0122-9},
  doi          = {10.1007/S13389-016-0122-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BottinelliB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BreierJB17,
  author       = {Jakub Breier and
                  Dirmanto Jap and
                  Shivam Bhasin},
  title        = {A study on analyzing side-channel resistant encoding schemes with
                  respect to fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {311--320},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0166-5},
  doi          = {10.1007/S13389-017-0166-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BreierJB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BruneauGHMR17,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  title        = {Optimal side-channel attacks for multivariate leakages and multiple
                  models},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {331--341},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0170-9},
  doi          = {10.1007/S13389-017-0170-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/CarboneTDM17,
  author       = {Mathieu Carbone and
                  Yannick Teglia and
                  Gilles R. Ducharme and
                  Philippe Maurine},
  title        = {Mutual information analysis: higher-order statistical moments, efficiency
                  and efficacy},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {1--17},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0123-8},
  doi          = {10.1007/S13389-016-0123-8},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/CarboneTDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DugardinGMNR17,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Martin Moreau and
                  Zakaria Najm and
                  Pablo Rauzy},
  title        = {Using modular extension to provably protect Edwards curves against
                  fault attacks},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {321--330},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0167-4},
  doi          = {10.1007/S13389-017-0167-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DurvauxSP17,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Santos Merino Del Pozo},
  title        = {Towards easy leakage certification: extended version},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {129--147},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0150-0},
  doi          = {10.1007/S13389-017-0150-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/DurvauxSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GanjiTFS17,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Fabian F{\"{a}}{\ss}ler and
                  Jean{-}Pierre Seifert},
  title        = {Having no mathematical model may not secure PUFs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {113--128},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0159-4},
  doi          = {10.1007/S13389-017-0159-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GanjiTFS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/GierlichsP17,
  author       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Introduction to the {CHES} 2016 special issue},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {97--98},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0158-5},
  doi          = {10.1007/S13389-017-0158-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/GierlichsP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Guilley17,
  author       = {Sylvain Guilley},
  title        = {Editorial about {PROOFS} 2015},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {19--20},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0140-7},
  doi          = {10.1007/S13389-016-0140-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Guilley17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/Homma17,
  author       = {Naofumi Homma},
  title        = {Introduction to the {PROOFS} 2016 special section},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {297--298},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0173-6},
  doi          = {10.1007/S13389-017-0173-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/Homma17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/IdrissiBLH17,
  author       = {Noreddine El Janati El Idrissi and
                  Guillaume Bouffard and
                  Jean{-}Louis Lanet and
                  Said El Hajji},
  title        = {Trust can be misplaced},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {21--34},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0142-5},
  doi          = {10.1007/S13389-016-0142-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/IdrissiBLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/LugouAF17,
  author       = {Florian Lugou and
                  Ludovic Apvrille and
                  Aur{\'{e}}lien Francillon},
  title        = {{SMASHUP:} a toolchain for unified verification of hardware/software
                  co-designs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {63--74},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0145-2},
  doi          = {10.1007/S13389-016-0145-2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/LugouAF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/MayhewM17,
  author       = {Matthew Mayhew and
                  Radu Muresan},
  title        = {An overview of hardware-level statistical power analysis attack countermeasures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {213--244},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0133-6},
  doi          = {10.1007/S13389-016-0133-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/MayhewM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NashimotoHHTFA17,
  author       = {Shoei Nashimoto and
                  Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Junko Takahashi and
                  Hitoshi Fuji and
                  Takafumi Aoki},
  title        = {Buffer overflow attack with multiple fault injection and a proven
                  countermeasure},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {35--46},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0136-3},
  doi          = {10.1007/S13389-016-0136-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NashimotoHHTFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/NegreP17,
  author       = {Christophe N{\`{e}}gre and
                  Thomas Plantard},
  title        = {Efficient regular modular exponentiation using multiplicative half-size
                  splitting},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {245--253},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0134-5},
  doi          = {10.1007/S13389-016-0134-5},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/NegreP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/OrdasGM17,
  author       = {S{\'{e}}bastien Ordas and
                  Ludovic Guillaume{-}Sage and
                  Philippe Maurine},
  title        = {Electromagnetic fault injection: the curse of flip-flops},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {183--197},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0128-3},
  doi          = {10.1007/S13389-016-0128-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/OrdasGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PasalicCZ17,
  author       = {Enes Pasalic and
                  Anupam Chattopadhyay and
                  WeiGuo Zhang},
  title        = {Efficient implementation of generalized Maiorana-McFarland class of
                  cryptographic functions},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {287--295},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0139-0},
  doi          = {10.1007/S13389-016-0139-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PasalicCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/PicekHG17,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Sylvain Guilley},
  title        = {Template attack versus Bayes classifier},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {343--351},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0172-7},
  doi          = {10.1007/S13389-017-0172-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/PicekHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/RobissonASHWBP17,
  author       = {Bruno Robisson and
                  Michel Agoyan and
                  Patrick Soquet and
                  S{\'{e}}bastien Le Henaff and
                  Franck Wajsb{\"{u}}rt and
                  Pirouz Bazargan{-}Sabet and
                  Guillaume Phan},
  title        = {Smart security management in secure devices},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {47--61},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0143-4},
  doi          = {10.1007/S13389-016-0143-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/RobissonASHWBP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SauvageGP17,
  author       = {Laurent Sauvage and
                  Tarik Graba and
                  Thibault Porteboeuf},
  title        = {Multi-level formal verification - {A} new approach against fault injection
                  attack},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {87--95},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0144-3},
  doi          = {10.1007/S13389-016-0144-3},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SauvageGP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SchindlerW17,
  author       = {Werner Schindler and
                  Andreas Wiemers},
  title        = {Generic power attacks on {RSA} with {CRT} and exponent blinding: new
                  results},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {4},
  pages        = {255--272},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0146-1},
  doi          = {10.1007/S13389-016-0146-1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SchindlerW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/SwierczynskiFKM17,
  author       = {Pawel Swierczynski and
                  Marc Fyrbiak and
                  Philipp Koppe and
                  Amir Moradi and
                  Christof Paar},
  title        = {Interdiction in practice - Hardware Trojan against a high-security
                  {USB} flash drive},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {3},
  pages        = {199--211},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-016-0132-7},
  doi          = {10.1007/S13389-016-0132-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/SwierczynskiFKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YaromGH17,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  title        = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}},
  journal      = {J. Cryptogr. Eng.},
  volume       = {7},
  number       = {2},
  pages        = {99--112},
  year         = {2017},
  url          = {https://doi.org/10.1007/s13389-017-0152-y},
  doi          = {10.1007/S13389-017-0152-Y},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YaromGH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics