default search action
Journal of Cryptographic Engineering, Volume 9
Volume 9, Number 1, April 2019
- Aaron Hutchinson, Koray Karabina:
Constructing multidimensional differential addition chains and their applications. 1-19 - Lejla Batina, Lukasz Chmielewski, Louiza Papachristodoulou, Peter Schwabe, Michael Tunstall:
Online template attacks. 21-36 - Ibrahima Diop, Yanis Linge, Thomas Ordas, Pierre-Yvan Liardet, Philippe Maurine:
From theory to practice: horizontal attacks on protected implementations of modular exponentiations. 37-52 - Dhiman Saha, Dipanwita Roy Chowdhury:
Internal differential fault analysis of parallelizable ciphers in the counter-mode. 53-67 - Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni:
Compact circuits for combined AES encryption/decryption. 69-83 - Alan G. Konheim:
Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology. 85-100
Volume 9, Number 2, June 2019
- Rei Ueno, Naofumi Homma, Yasuyuki Nogami, Takafumi Aoki:
Highly efficient GF(28) inversion circuit based on hybrid GF representations. 101-113 - Jean-Marc Robert, Christophe Nègre, Thomas Plantard:
Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding. 115-136 - Thomas Unterluggauer, Mario Werner, Stefan Mangard:
MEAS: memory encryption and authentication secure against side-channel attacks. 137-158 - Biagio Peccerillo, Sandro Bartolini, Çetin Kaya Koç:
Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs. 159-171 - Michael Hutter, Michael Tunstall:
Constant-time higher-order Boolean-to-arithmetic masking. 173-184 - Vincent Herbert, Bhaskar Biswas, Caroline Fontaine:
Design and implementation of low-depth pairing-based homomorphic encryption scheme. 185-201
Volume 9, Number 3, September 2019
- Sayandeep Saha, Ujjawal Kumar, Debdeep Mukhopadhyay, Pallab Dasgupta:
An automated framework for exploitable fault identification in block ciphers. 203-219 - Nils Wisiol, Marian Margraf:
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs. 221-230 - Inès Ben El Ouahma, Quentin L. Meunier, Karine Heydemann, Emmanuelle Encrenaz:
Side-channel robustness analysis of masked assembly codes using a symbolic approach. 231-242 - Christoph Baumann, Oliver Schwarz, Mads Dam:
On the verification of system-level information flow properties for virtualized execution platforms. 243-261 - Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay:
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands. 263-275 - Rémi Géraud, David Naccache:
Mixed-radix Naccache-Stern encryption. 277-282 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:
Triathlon of lightweight block ciphers for the Internet of things. 283-302 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Polynomial direct sum masking to protect against both SCA and FIA. 303-312
Volume 9, Number 4, November 2019
- Shinichi Kawamura, Yuichi Komano, Hideo Shimizu, Tomoko Yonemura:
RNS Montgomery reduction algorithms using quadratic residuosity. 313-331 - Gökay Saldamli, Yoo-Jin Baek:
Uniform Montgomery multiplier. 333-339 - Nir Drucker, Shay Gueron:
A toolbox for software optimization of QC-MDPC code-based cryptosystems. 341-357 - Gustavo Banegas, Ricardo Felipe Custódio, Daniel Panario:
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields. 359-373 - Marco Cianfriglia, Stefano Guarino, Massimo Bernaschi, Flavio Lombardi, Marco Pedicini:
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search. 375-392 - Alla Levina, Roman Mostovoi, Daria Sleptsova, Lavrentii Tcvetkov:
Physical model of sensitive data leakage from PC-based cryptographic systems. 393-400 - Tao Wu, Ruomei Wang:
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs. 401-410
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.