


default search action
Journal of Cryptographic Engineering, Volume 5
Volume 5, Number 1, April 2015
- Joshua Templin, Jason R. Hamlet:

A new power-aware FPGA design metric. 1-11 - Subhadeep Banik

, Subhamoy Maitra, Santanu Sarkar
:
Improved differential fault attack on MICKEY 2.0. 13-29 - Armando Faz-Hernández

, Patrick Longa, Ana Helena Sánchez:
Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version). 31-52 - Colin O'Flynn, Zhizhang Chen

:
Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection. 53-69
Volume 5, Number 2, June 2015
- Lejla Batina, Matthew J. B. Robshaw:

Introduction to the CHES 2014 special issue. 71-72 - Jean-Sébastien Coron, Arnab Roy

, Srinivas Vivek
:
Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures. 73-83 - Takeshi Sugawara

, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino:
Reversing stealthy dopant-level circuits. 85-94 - Daniel Genkin, Itamar Pipman, Eran Tromer

:
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version. 95-112
- Jo Vliegen, Nele Mentens

, Dirk Koch
, Dries Schellekens, Ingrid Verbauwhede
:
Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs. 113-122 - Liran Lerman, Gianluca Bontempi

, Olivier Markowitch:
A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model. 123-139 - Shay Gueron

, Vlad Krasnov:
Fast prime field elliptic-curve cryptography with 256-bit primes. 141-151
Volume 5, Number 3, September 2015
- Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri

:
Security analysis of concurrent error detection against differential fault analysis. 153-169 - Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres:

Vertical and horizontal correlation attacks on RNS-based exponentiations. 171-185 - Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, Naoya Torii:

A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs. 187-199 - Michael Hutter, Peter Schwabe:

Multiprecision multiplication on AVR revisited. 201-214 - Manuel Bluhm, Shay Gueron

:
Fast software implementation of binary elliptic curve cryptography. 215-226
Volume 5, Number 4, November 2015
- Yunsi Fei

, A. Adam Ding
, Jian Lao, Liwei Zhang:
A statistics-based success rate model for DPA and CPA. 227-243 - Jason R. Hamlet, Robert W. Brocato:

Throughput-optimized implementations of QUAD. 245-254 - Liran Lerman, Gianluca Bontempi

, Olivier Markowitch:
The bias-variance decomposition in profiled attacks. 255-267 - Simone Bongiovanni, Francesco Centurelli

, Giuseppe Scotti
, Alessandro Trifiletti:
Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks. 269-288 - Murat Cenk

, M. Anwar Hasan:
Some new results on binary polynomial multiplication. 289-303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














