


default search action
Journal of Cryptographic Engineering, Volume 15
Volume 15, Number 1, April 2025
- Matthias Probst, Lars Tebelmann, Moritz Wettermann, Michael Pehl:
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor. 1 - Siqi Liu, Zhusen Liu, Donglong Chen, Wangchen Dai, Lu Zhou, Zhe Liu, Ray C. C. Cheung
, Çetin Kaya Koç:
MLFormer: a high performance MPC linear inference framework for transformers. 2 - Saeed Rostami, Mohammad Ali Orumiehchiha, Elham Shakour, Sadegh Alizadeh:
Fault attack on Enocoro stream cipher family. 3 - Denis Parfenov, Aleksandr Bakharev, Aleksandr Kutsenko, Aleksandr Belov, Natalia Atutova:
Optimization of the algorithm to compute the guaranteed number of activations in sfXS-circuits and its application to the analysis of block ciphers. 4 - Ruipeng Hong, Lei Zhang, Zhankun Pan, Chaoen Xiao, Jianxin Wang:
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA. 5 - MyeongHoon Lee, Hanbeom Shin, Myoungsu Shin, Dongjae Lee, Seog Chung Seo, Seokhie Hong:
Best interleave size of GIFT-128 on 64-bit ARM processor. 6 - Yanning Ji, Elena Dubrova:
A side-channel attack on a masked hardware implementation of CRYSTALS-Kyber. 7 - Mahmoud AbdelHafeez Sayed, Mostafa Taha:
Evaluation of encrypted matching criteria using homomorphic encryption based FSM. 8 - Hikaru Nishiyama
, Daisuke Fujimoto
, Yuichi Hayashi
:
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna. 9
Volume 15, Number 2, June 2025
- Eduardo Ferrufino
, Luke Beckwith
, Abubakr Abdulgadir
, Jens-Peter Kaps
:
FOBOS 3: an open-source platform for side-channel analysis and benchmarking. 10 - Tobias Stelzer
, Felix Oberhansl
, Jonas Schupp
, Patrick Karl
, Horia Turcuman:
Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform. 11 - Shungo Hayashi, Junichi Sakamoto, Tsutomu Matsumoto:
Design methodology of digital sensors for detecting laser fault injection attacks in FPGAs. 12 - Zhenhong Liu, Min Gu:
A flexible efficient and configurable number theoretic transform architecture implemented on FPGA. 13 - Jonathan Takeshita, Nirajan Koirala, Colin McKechney, Taeho Jung:
HEProfiler: an in-depth profiler of approximate homomorphic encryption libraries. 14 - Akram Kermiche, Mohamed Saoudi, Amine Drouiche:
High throughput pipelined implementation of SHA3 hash algorithm on FPGA. 15

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.