Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jce/jce7.bht:"
@article{DBLP:journals/jce/AldayaSS17, author = {Alejandro Cabrera Aldaya and Alejandro Cabrera Sarmiento and Santiago S{\'{a}}nchez{-}Solano}, title = {{SPA} vulnerabilities of the binary extended Euclidean algorithm}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {273--285}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0135-4}, doi = {10.1007/S13389-016-0135-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AldayaSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AzziBCV17, author = {Sabine Azzi and Bruno Barras and Maria Christofi and David Vigilant}, title = {Using linear codes as a fault countermeasure for nonlinear operations: application to {AES} and formal verification}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {75--85}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0138-1}, doi = {10.1007/S13389-016-0138-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AzziBCV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BhattacharyaM17, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {299--310}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0165-6}, doi = {10.1007/S13389-017-0165-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BhattacharyaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BossGGL0017, author = {Erik Boss and Vincent Grosso and Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi and Tobias Schneider}, title = {Strong 8-bit Sboxes with efficient masking in hardware extended version}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {149--165}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0156-7}, doi = {10.1007/S13389-017-0156-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BossGGL0017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BottinelliB17, author = {Paul Bottinelli and Joppe W. Bos}, title = {Computational aspects of correlation power analysis}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {167--181}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0122-9}, doi = {10.1007/S13389-016-0122-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BottinelliB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BreierJB17, author = {Jakub Breier and Dirmanto Jap and Shivam Bhasin}, title = {A study on analyzing side-channel resistant encoding schemes with respect to fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {311--320}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0166-5}, doi = {10.1007/S13389-017-0166-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BreierJB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BruneauGHMR17, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Optimal side-channel attacks for multivariate leakages and multiple models}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {331--341}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0170-9}, doi = {10.1007/S13389-017-0170-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BruneauGHMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CarboneTDM17, author = {Mathieu Carbone and Yannick Teglia and Gilles R. Ducharme and Philippe Maurine}, title = {Mutual information analysis: higher-order statistical moments, efficiency and efficacy}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {1--17}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0123-8}, doi = {10.1007/S13389-016-0123-8}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CarboneTDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DugardinGMNR17, author = {Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy}, title = {Using modular extension to provably protect Edwards curves against fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {321--330}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0167-4}, doi = {10.1007/S13389-017-0167-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DugardinGMNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DurvauxSP17, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Santos Merino Del Pozo}, title = {Towards easy leakage certification: extended version}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {129--147}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0150-0}, doi = {10.1007/S13389-017-0150-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/DurvauxSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GanjiTFS17, author = {Fatemeh Ganji and Shahin Tajik and Fabian F{\"{a}}{\ss}ler and Jean{-}Pierre Seifert}, title = {Having no mathematical model may not secure PUFs}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {113--128}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0159-4}, doi = {10.1007/S13389-017-0159-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GanjiTFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GierlichsP17, author = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Introduction to the {CHES} 2016 special issue}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {97--98}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0158-5}, doi = {10.1007/S13389-017-0158-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GierlichsP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Guilley17, author = {Sylvain Guilley}, title = {Editorial about {PROOFS} 2015}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {19--20}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0140-7}, doi = {10.1007/S13389-016-0140-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Guilley17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Homma17, author = {Naofumi Homma}, title = {Introduction to the {PROOFS} 2016 special section}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {297--298}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0173-6}, doi = {10.1007/S13389-017-0173-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Homma17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/IdrissiBLH17, author = {Noreddine El Janati El Idrissi and Guillaume Bouffard and Jean{-}Louis Lanet and Said El Hajji}, title = {Trust can be misplaced}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {21--34}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0142-5}, doi = {10.1007/S13389-016-0142-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/IdrissiBLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/LugouAF17, author = {Florian Lugou and Ludovic Apvrille and Aur{\'{e}}lien Francillon}, title = {{SMASHUP:} a toolchain for unified verification of hardware/software co-designs}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {63--74}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0145-2}, doi = {10.1007/S13389-016-0145-2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/LugouAF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/MayhewM17, author = {Matthew Mayhew and Radu Muresan}, title = {An overview of hardware-level statistical power analysis attack countermeasures}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {213--244}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0133-6}, doi = {10.1007/S13389-016-0133-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/MayhewM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NashimotoHHTFA17, author = {Shoei Nashimoto and Naofumi Homma and Yu{-}ichi Hayashi and Junko Takahashi and Hitoshi Fuji and Takafumi Aoki}, title = {Buffer overflow attack with multiple fault injection and a proven countermeasure}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {35--46}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0136-3}, doi = {10.1007/S13389-016-0136-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NashimotoHHTFA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/NegreP17, author = {Christophe N{\`{e}}gre and Thomas Plantard}, title = {Efficient regular modular exponentiation using multiplicative half-size splitting}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {245--253}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0134-5}, doi = {10.1007/S13389-016-0134-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/NegreP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OrdasGM17, author = {S{\'{e}}bastien Ordas and Ludovic Guillaume{-}Sage and Philippe Maurine}, title = {Electromagnetic fault injection: the curse of flip-flops}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {183--197}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0128-3}, doi = {10.1007/S13389-016-0128-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OrdasGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PasalicCZ17, author = {Enes Pasalic and Anupam Chattopadhyay and WeiGuo Zhang}, title = {Efficient implementation of generalized Maiorana-McFarland class of cryptographic functions}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {287--295}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0139-0}, doi = {10.1007/S13389-016-0139-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PasalicCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PicekHG17, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template attack versus Bayes classifier}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {343--351}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0172-7}, doi = {10.1007/S13389-017-0172-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/PicekHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RobissonASHWBP17, author = {Bruno Robisson and Michel Agoyan and Patrick Soquet and S{\'{e}}bastien Le Henaff and Franck Wajsb{\"{u}}rt and Pirouz Bazargan{-}Sabet and Guillaume Phan}, title = {Smart security management in secure devices}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {47--61}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0143-4}, doi = {10.1007/S13389-016-0143-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RobissonASHWBP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SauvageGP17, author = {Laurent Sauvage and Tarik Graba and Thibault Porteboeuf}, title = {Multi-level formal verification - {A} new approach against fault injection attack}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {1}, pages = {87--95}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0144-3}, doi = {10.1007/S13389-016-0144-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SauvageGP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SchindlerW17, author = {Werner Schindler and Andreas Wiemers}, title = {Generic power attacks on {RSA} with {CRT} and exponent blinding: new results}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {4}, pages = {255--272}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0146-1}, doi = {10.1007/S13389-016-0146-1}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SchindlerW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SwierczynskiFKM17, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar}, title = {Interdiction in practice - Hardware Trojan against a high-security {USB} flash drive}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {3}, pages = {199--211}, year = {2017}, url = {https://doi.org/10.1007/s13389-016-0132-7}, doi = {10.1007/S13389-016-0132-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SwierczynskiFKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YaromGH17, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {99--112}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0152-y}, doi = {10.1007/S13389-017-0152-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YaromGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.