default search action
Journal of Cryptographic Engineering, Volume 4
Volume 4, Number 1, April 2014
- Guido Bertoni, Jean-Sébastien Coron:
Introduction to the CHES 2013 special issue. 1 - Thomaz Oliveira, Julio López, Diego F. Aranha, Francisco Rodríguez-Henríquez:
Two is the fastest prime: lambda coordinates for binary elliptic curves. 3-17 - Georg T. Becker, Francesco Regazzoni, Christof Paar, Wayne P. Burleson:
Stealthy dopant-level hardware Trojans: extended version. 19-31 - Elke De Mulder, Michael Hutter, Mark E. Marson, Peter Pearson:
Using Bleichenbacher's solution to the hidden number problem to attack nonce leaks in 384-bit ECDSA: extended version. 33-45 - Vincent Grosso, François-Xavier Standaert, Sebastian Faust:
Masking vs. multiparty computation: how large is the gap for AES? 47-57 - Takeshi Sugawara, Daisuke Suzuki, Minoru Saeki, Mitsuru Shiozaki, Takeshi Fujino:
On measurable side-channel leaks inside ASIC design primitives. 59-73
Volume 4, Number 2, June 2014
- Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplício Jr.:
Lyra: password-based key derivation with tunable memory and processing costs. 75-89 - Christophe Nègre:
Efficient binary polynomial multiplication based on optimized Karatsuba reconstruction. 91-106 - Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi, Emmanuel Prouff:
Achieving side-channel high-order correlation immunity with leakage squeezing. 107-121 - Felipe P. Biasi, Paulo S. L. M. Barreto, Rafael Misoczki, Wilson Vicente Ruggiero:
Scaling efficient code-based cryptosystems for embedded platforms. 123-134 - Goutam Paul, Anupam Chattopadhyay:
Designing stream ciphers with scalable data-widths: a case study with HC-128. 135-143
Volume 4, Number 3, September 2014
- Nicolas Moro, Karine Heydemann, Emmanuelle Encrenaz, Bruno Robisson:
Formal verification of a software countermeasure against instruction skip attacks. 145-156 - Sonia Belaïd, Fabrizio De Santis, Johann Heyszl, Stefan Mangard, Marcel Medwed, Jörn-Marc Schmidt, François-Xavier Standaert, Stefan Tillich:
Towards fresh re-keying with leakage-resilient PRFs: cipher design principles and analysis. 157-171 - Pablo Rauzy, Sylvain Guilley:
A formal proof of countermeasures against fault injection attacks on CRT-RSA. 173-185 - Dina Kamel, Mathieu Renauld, Denis Flandre, François-Xavier Standaert:
Understanding the limitations and improving the relevance of SPICE simulations in side-channel security evaluations. 187-195 - Sébastien Tiran, Sébastien Ordas, Yannick Teglia, Michel Agoyan, Philippe Maurine:
A model of the leakage in the frequency domain and its application to CPA and DPA. 197-212
Volume 4, Number 4, November 2014
- Werner Schindler, Andreas Wiemers:
Power attacks in the presence of exponent blinding. 213-236 - Sabyasachi Karati, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer:
New algorithms for batch verification of standard ECDSA signatures. 237-258 - Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper, Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama, Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker:
Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest. 259-274 - Joppe W. Bos:
Constant time modular inversion. 275-281
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.