default search action
Journal of Cryptographic Engineering, Volume 1
Volume 1, Number 1, April 2011
- Çetin Kaya Koç:
Introduction to the Journal of Cryptographic Engineering. 1-3 - Paul C. Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi:
Introduction to differential power analysis. 5-27 - H. Gregor Molter, Marc Stöttinger, Abdulhadi Shoufan, Falko Strenzke:
A simple power analysis attack on a McEliece cryptoprocessor. 29-36 - Tim Güneysu:
Utilizing hard cores of modern FPGA devices for high-performance cryptography. 37-55 - Agustin Dominguez-Oviedo, M. Anwar Hasan:
Algorithm-level error detection for Montgomery ladder-based ECSM. 57-69 - Sergei Skorobogatov:
Synchronization method for SCA and fault attacks. 71-77 - Cédric Hocquet, Dina Kamel, Francesco Regazzoni, Jean-Didier Legat, Denis Flandre, David Bol, François-Xavier Standaert:
Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags. 79-86
Volume 1, Number 2, August 2011
- Carlos Moreno, M. Anwar Hasan:
SPA-resistant binary exponentiation with optimal execution time. 87-99 - Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki:
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO. 101-121 - Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert:
Univariate side channel attacks and leakage modeling. 123-144 - Carolyn Whitnall, Elisabeth Oswald:
A fair evaluation framework for comparing side-channel distinguishers. 145-160 - Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli:
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic. 161-176
Volume 1, Number 3, November 2011
- Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Christian Wachsmann:
Recyclable PUFs: logically reconfigurable PUFs. 177-186 - Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López:
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction. 187-199 - Nicolas Méloni, Christophe Nègre, M. Anwar Hasan:
High performance GHASH and impacts of a class of unconventional bases. 201-218 - Michael Tunstall:
Practical complexity differential cryptanalysis and fault analysis of AES. 219-230 - Marcel Medwed, François-Xavier Standaert:
Extractors against side-channel attacks: weak or strong? 231-241 - Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:
Modulus fault attacks against RSA-CRT signatures. 243-253
Volume 1, Number 4, December 2011
- Markus Dichtl:
A new method of black box power analysis and a fast algorithm for optimal key search. 255-264 - Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
An on-chip glitchy-clock generator for testing fault injection attacks. 265-270 - Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall:
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. 271-281 - Falko Strenzke:
Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties. 283-292 - Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede, Joos Vandewalle:
Machine learning in side-channel analysis: a first study. 293-302 - Alexander Lux, Artem Starostin:
A tool for static detection of timing channels in Java. 303-313
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.