default search action
Journal of Cryptographic Engineering, Volume 5
Volume 5, Number 1, April 2015
- Joshua Templin, Jason R. Hamlet:
A new power-aware FPGA design metric. 1-11 - Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar:
Improved differential fault attack on MICKEY 2.0. 13-29 - Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez:
Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version). 31-52 - Colin O'Flynn, Zhizhang Chen:
Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection. 53-69
Volume 5, Number 2, June 2015
- Lejla Batina, Matthew J. B. Robshaw:
Introduction to the CHES 2014 special issue. 71-72 - Jean-Sébastien Coron, Arnab Roy, Srinivas Vivek:
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. 73-83 - Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:
Reversing stealthy dopant-level circuits. 85-94 - Daniel Genkin, Itamar Pipman, Eran Tromer:
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version. 95-112
- Jo Vliegen, Nele Mentens, Dirk Koch, Dries Schellekens, Ingrid Verbauwhede:
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs. 113-122 - Liran Lerman, Gianluca Bontempi, Olivier Markowitch:
A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model. 123-139 - Shay Gueron, Vlad Krasnov:
Fast prime field elliptic-curve cryptography with 256-bit primes. 141-151
Volume 5, Number 3, September 2015
- Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri:
Security analysis of concurrent error detection against differential fault analysis. 153-169 - Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres:
Vertical and horizontal correlation attacks on RNS-based exponentiations. 171-185 - Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, Naoya Torii:
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs. 187-199 - Michael Hutter, Peter Schwabe:
Multiprecision multiplication on AVR revisited. 201-214 - Manuel Bluhm, Shay Gueron:
Fast software implementation of binary elliptic curve cryptography. 215-226
Volume 5, Number 4, November 2015
- Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang:
A statistics-based success rate model for DPA and CPA. 227-243 - Jason R. Hamlet, Robert W. Brocato:
Throughput-optimized implementations of QUAD. 245-254 - Liran Lerman, Gianluca Bontempi, Olivier Markowitch:
The bias-variance decomposition in profiled attacks. 255-267 - Simone Bongiovanni, Francesco Centurelli, Giuseppe Scotti, Alessandro Trifiletti:
Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks. 269-288 - Murat Cenk, M. Anwar Hasan:
Some new results on binary polynomial multiplication. 289-303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.