


default search action
Journal of Cryptographic Engineering, Volume 3
Volume 3, Number 1, April 2013
- Emmanuel Prouff, Patrick Schaumont
:
Introduction to the CHES 2012 special issue. 1 - Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert:
Simple photonic emission analysis of AES. 3-15 - Ulrich Rührmair, Marten van Dijk
:
On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols. 17-28 - Stefan Heyse, Tim Güneysu
:
Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance. 29-43 - Benoît Gérard, François-Xavier Standaert
:
Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version. 45-58 - Pierre-Alain Fouque
, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi
, Jean-Christophe Zapalowicz:
Attacking RSA-CRT signatures with faults on montgomery multiplication. 59-72
Volume 3, Number 2, June 2013
- Subidh Ali
, Debdeep Mukhopadhyay, Michael Tunstall
:
Differential fault analysis of AES: towards reaching its limits. 73-97 - David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Eric D. Laspe:
Improving cross-device attacks using zero-mean unit-variance normalization. 99-110 - Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, Aviel D. Rubin:
Charm: a framework for rapidly prototyping cryptosystems. 111-128 - Michael T. Kurdziel, Marcin Lukowiak, Michael A. Sanfilippo:
Minimizing performance overhead in memory encryption. 129-138
Volume 3, Number 3, September 2013
- Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter
, Johannes Buchmann:
Improved algebraic side-channel attack on AES. 139-156 - Maria Christofi, Boutheina Chetali, Louis Goubin, David Vigilant:
Formal verification of a CRT-RSA implementation against fault attacks. 157-167 - Sébastien Briais, Jean-Luc Danger, Sylvain Guilley:
A formal study of two physical countermeasures against side channel attacks. 169-180 - Mark Brown:
Toward a taxonomy of communications security models. 181-195
Volume 3, Number 4, November 2013
- Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh:
Variety enhancement of PUF responses using the locations of random outputting RS latches. 197-211 - Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger:
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications. 213-225 - Abdel Alim Kamal, Amr M. Youssef:
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks. 227-240 - Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache:
A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards. 241-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.