default search action
Journal of Cryptographic Engineering, Volume 7
Volume 7, Number 1, April 2017
- Mathieu Carbone, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine:
Mutual information analysis: higher-order statistical moments, efficiency and efficacy. 1-17 - Sylvain Guilley:
Editorial about PROOFS 2015. 19-20 - Noreddine El Janati El Idrissi, Guillaume Bouffard, Jean-Louis Lanet, Said El Hajji:
Trust can be misplaced. 21-34 - Shoei Nashimoto, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki:
Buffer overflow attack with multiple fault injection and a proven countermeasure. 35-46 - Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:
Smart security management in secure devices. 47-61 - Florian Lugou, Ludovic Apvrille, Aurélien Francillon:
SMASHUP: a toolchain for unified verification of hardware/software co-designs. 63-74 - Sabine Azzi, Bruno Barras, Maria Christofi, David Vigilant:
Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification. 75-85 - Laurent Sauvage, Tarik Graba, Thibault Porteboeuf:
Multi-level formal verification - A new approach against fault injection attack. 87-95
Volume 7, Number 2, June 2017
- Benedikt Gierlichs, Axel Y. Poschmann:
Introduction to the CHES 2016 special issue. 97-98 - Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: a timing attack on OpenSSL constant-time RSA. 99-112 - Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:
Having no mathematical model may not secure PUFs. 113-128 - François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo:
Towards easy leakage certification: extended version. 129-147 - Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:
Strong 8-bit Sboxes with efficient masking in hardware extended version. 149-165
Volume 7, Number 3, September 2017
- Paul Bottinelli, Joppe W. Bos:
Computational aspects of correlation power analysis. 167-181 - Sébastien Ordas, Ludovic Guillaume-Sage, Philippe Maurine:
Electromagnetic fault injection: the curse of flip-flops. 183-197 - Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi, Christof Paar:
Interdiction in practice - Hardware Trojan against a high-security USB flash drive. 199-211 - Matthew Mayhew, Radu Muresan:
An overview of hardware-level statistical power analysis attack countermeasures. 213-244 - Christophe Nègre, Thomas Plantard:
Efficient regular modular exponentiation using multiplicative half-size splitting. 245-253
Volume 7, Number 4, November 2017
- Werner Schindler, Andreas Wiemers:
Generic power attacks on RSA with CRT and exponent blinding: new results. 255-272 - Alejandro Cabrera Aldaya, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano:
SPA vulnerabilities of the binary extended Euclidean algorithm. 273-285 - Enes Pasalic, Anupam Chattopadhyay, WeiGuo Zhang:
Efficient implementation of generalized Maiorana-McFarland class of cryptographic functions. 287-295 - Naofumi Homma:
Introduction to the PROOFS 2016 special section. 297-298 - Sarani Bhattacharya, Debdeep Mukhopadhyay:
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers. 299-310 - Jakub Breier, Dirmanto Jap, Shivam Bhasin:
A study on analyzing side-channel resistant encoding schemes with respect to fault attacks. 311-320 - Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy:
Using modular extension to provably protect Edwards curves against fault attacks. 321-330 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul:
Optimal side-channel attacks for multivariate leakages and multiple models. 331-341 - Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template attack versus Bayes classifier. 343-351
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.