


default search action
Journal of Cryptographic Engineering, Volume 12
Volume 12, Number 1, April 2022
- Maria Chiara Molteni
, Vittorio Zaccaria
:
A relation calculus for reasoning about t-probing security. 1-14 - Dusan Bozilov
, Miroslav Knezevic, Ventzislav Nikov:
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications. 15-51 - Andrea Caforio
, Fatih Balli, Subhadeep Banik
:
Melting SNOW-V: improved lightweight architectures. 53-73 - Maamar Ouladj
, Sylvain Guilley
, Philippe Guillot, Farid Mokrane:
Spectral approach to process the (multivariate) high-order template attack against any masking scheme. 75-93 - Benjamin Buhrow
, Barry K. Gilbert, Clifton R. Haider:
Parallel modular multiplication using 512-bit advanced vector instructions. 95-105 - Kaushik Nath
, Palash Sarkar:
Security and efficiency trade-offs for elliptic curve Diffie-Hellman at the 128-bit and 224-bit security levels. 107-121
Volume 12, Number 2, June 2022
- Carlo Brunetta
, Pablo Picazo-Sanchez
:
Modelling cryptographic distinguishers using machine learning. 123-135 - Jori Winderickx
, An Braeken
, Dave Singelée
, Nele Mentens
:
In-depth energy analysis of security algorithms and protocols for the Internet of Things. 137-149 - Liron David
, Avishai Wool
:
Rank estimation with bounded error via exponential sampling. 151-168 - Duc-Phong Le
, Rongxing Lu, Ali A. Ghorbani:
Improved fault analysis on SIMECK ciphers. 169-180 - Mathieu Gross
, Nisha Jacob, Andreas Zankl
, Georg Sigl:
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC. 181-196 - Fanghui Liu
, Waldemar Cruz, Laurent Michel
:
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming. 197-228
Volume 12, Number 3, September 2022
- Susanne Engels
, Max Hoffmann, Christof Paar:
A critical view on the real-world security of logic locking. 229-244 - Jean-Max Dutertre, Amir-Pasha Mirbaha
, David Naccache, Assia Tria:
Photonic power firewalls. 245-254 - Juan Di Mauro
, Eduardo Salazar
, Hugo D. Scolnik:
Design and implementation of a novel cryptographically secure pseudorandom number generator. 255-265 - Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji
, Domenic Forte
:
Physical security in the post-quantum era. 267-303 - Kalikinkar Mandal, Dhiman Saha
, Sumanta Sarkar, Yosuke Todo
:
Sycon: a new milestone in designing ASCON-like permutations. 305-327 - Esra Yeniaras
, Murat Cenk
:
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation. 329-348 - Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez
, Samuel Jaques
, Francisco Rodríguez-Henríquez:
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents. 349-368
Volume 12, Number 4, November 2022
- Chip-Hong Chang, Stefan Katzenbeisser, Ulrich Rührmair, Patrick Schaumont:
The ASHES 2020 special issue at JCEN. 369-370 - Markku-Juhani O. Saarinen
, G. Richard Newell, Ben Marshall:
Development of the RISC-V entropy source interface. 371-386 - Ulrich Rührmair
:
Secret-free security: a survey and tutorial. 387-412 - Chenglu Jin
, Wayne P. Burleson, Marten van Dijk, Ulrich Rührmair:
Programmable access-controlled and generic erasable PUF design and its applications. 413-432 - Amit Jana, Anirban Nath, Goutam Paul
, Dhiman Saha
:
Differential fault analysis of NORX using variants of coupon collector problem. 433-459 - Jacob Fustos, Michael Garrett Bechtel, Heechul Yun:
A framework for leaking secrets to past instructions. 461-473 - Anup Kumar Kundu
, Aikata
, Banashri Karmakar
, Dhiman Saha
:
Fault analysis of the PRINCE family of lightweight ciphers. 475-494 - Rijoy Mukherjee
, Sree Ranjani Rajendran, Rajat Subhra Chakraborty:
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention. 495-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.