![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Journal of Cryptographic Engineering, Volume 14
Volume 14, Number 1, April 2024
- Felix Oberhansl
, Tim Fritzmann, Thomas Pöppelmann, Debapriya Basu Roy, Georg Sigl:
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography. 1-18 - Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari:
Restricted near collision attack on Plantlet. 19-34 - Leonardo A. D. S. Ribeiro
, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton Bezerra Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos:
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures. 35-41 - Shiping Cai, Zhi Hu, Zheng-an Yao, Chang-An Zhao
:
The elliptic net algorithm revisited. 43-55 - Cuiping Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang:
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit. 57-70 - Dúnia Marchiori, Ricardo Custódio, Daniel Panario, Lucia Moura:
Probabilistic root finding in code-based cryptography. 71-85 - Elif Ozbay Gurler, Hüseyin Hisil:
Complete group law for genus 2 Jacobians on Jacobian coordinates. 87-101 - Priyanka Joshi
, Bodhisatwa Mazumdar
:
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN. 103-125 - Dmitrii I. Koshelev
:
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing. 127-128 - Fan Zhang:
Editorial about PROOFS 2021. 129 - Wei Cheng
, Yi Liu, Sylvain Guilley
, Olivier Rioul
:
Toward finding best linear codes for side-channel protections (extended version). 131-145 - Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet:
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. 147-164 - Tamon Asano, Takeshi Sugawara:
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version. 165-180
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.