Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jce/jce10.bht:"
@article{DBLP:journals/jce/AbarzuaMMT20, author = {Rodrigo Abarz{\'{u}}a and Santi Mart{\'{\i}}nez and Valeria Mendoza and Nicolas Th{\'{e}}riault}, title = {Same value analysis on Edwards curves}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {27--48}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00206-6}, doi = {10.1007/S13389-019-00206-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/AbarzuaMMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/AlamMKLS20, author = {Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen Kadiyala and Siew{-}Kei Lam and Thambipillai Srikanthan}, title = {Improving accuracy of HPC-based malware classification for embedded platforms using gradient descent optimization}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {289--303}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00232-9}, doi = {10.1007/S13389-020-00232-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/AlamMKLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BaksiSS20, author = {Anubhab Baksi and Dhiman Saha and Sumanta Sarkar}, title = {To infect or not to infect: a critical analysis of infective countermeasures in fault attacks}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {355--374}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00224-9}, doi = {10.1007/S13389-020-00224-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BaksiSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BartheBDFGSS20, author = {Gilles Barthe and Sonia Bela{\"{\i}}d and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Fran{\c{c}}ois{-}Xavier Standaert and Pierre{-}Yves Strub}, title = {Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {17--26}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00202-2}, doi = {10.1007/S13389-018-00202-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BartheBDFGSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaM20, author = {Lejla Batina and Nele Mentens}, title = {{PROOFS} 2018 Editorial}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {287}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00248-1}, doi = {10.1007/S13389-020-00248-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BenadjilaPSCD20, author = {Ryad Benadjila and Emmanuel Prouff and R{\'{e}}mi Strullu and Eleonora Cagli and C{\'{e}}cile Dumas}, title = {Deep learning for side-channel analysis and introduction to {ASCAD} database}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {163--188}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00220-8}, doi = {10.1007/S13389-019-00220-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BenadjilaPSCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BosF20, author = {Joppe W. Bos and Simon Friedberger}, title = {Faster modular arithmetic for isogeny-based crypto on embedded devices}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {97--109}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00214-6}, doi = {10.1007/S13389-019-00214-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BosF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/CruzGA20, author = {Rafael J. Cruz and Antonio Guimar{\~{a}}es and Diego F. Aranha}, title = {Efficient and secure software implementations of Fantomas}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {211--228}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00218-2}, doi = {10.1007/S13389-019-00218-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/CruzGA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DidierDV20, author = {Laurent{-}St{\'{e}}phane Didier and Fangan{-}Yssouf Dosso and Pascal V{\'{e}}ron}, title = {Efficient modular operations using the adapted modular number system}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {111--133}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00221-7}, doi = {10.1007/S13389-019-00221-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DidierDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GayKKP20, author = {Mael Gay and Batya Karp and Osnat Keren and Ilia Polian}, title = {Error control scheme for malicious and natural faults in cryptographic modules}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {321--336}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00234-7}, doi = {10.1007/S13389-020-00234-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GayKKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GoubinPRW20, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to reveal the secrets of an obscure white-box implementation}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {49--66}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00207-5}, doi = {10.1007/S13389-019-00207-5}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GoubinPRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HettwerGG20, author = {Benjamin Hettwer and Stefan Gehrer and Tim G{\"{u}}neysu}, title = {Applications of machine learning techniques in side-channel attacks: a survey}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {135--162}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00212-8}, doi = {10.1007/S13389-019-00212-8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HettwerGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/HillerKS20, author = {Matthias Hiller and Ludwig K{\"{u}}rzinger and Georg Sigl}, title = {Review of error correction for PUFs and evaluation on state-of-the-art FPGAs}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {229--247}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00223-w}, doi = {10.1007/S13389-020-00223-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/HillerKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/JauvartMFG20, author = {Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin}, title = {Improving side-channel attacks against pairing-based cryptography}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {1--16}, year = {2020}, url = {https://doi.org/10.1007/s13389-018-00201-3}, doi = {10.1007/S13389-018-00201-3}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/JauvartMFG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OrumiehchihaRSP20, author = {Mohammad Ali Orumiehchiha and Saeed Rostami and Elham Shakour and Josef Pieprzyk}, title = {A differential fault attack on the {WG} family of stream ciphers}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {2}, pages = {189--195}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00222-x}, doi = {10.1007/S13389-020-00222-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OrumiehchihaRSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/OuladjMGGM20, author = {Maamar Ouladj and Nadia El Mrabet and Sylvain Guilley and Philippe Guillot and Gilles Mill{\'{e}}rioux}, title = {On the power of template attacks in highly multivariate context}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {337--354}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00239-2}, doi = {10.1007/S13389-020-00239-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/OuladjMGGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/PiccoliVR20, author = {Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo}, title = {Polynomial multiplication over binary finite fields: new upper bounds}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {197--210}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00210-w}, doi = {10.1007/S13389-019-00210-W}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/PiccoliVR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/RichterM20, author = {Bastian Richter and Amir Moradi}, title = {Template attacks on nano-scale {CMOS} devices}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {275--285}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00225-8}, doi = {10.1007/S13389-020-00225-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/RichterM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Schoinianakis20, author = {Dimitrios Schoinianakis}, title = {Residue arithmetic systems in cryptography: a survey on modern security applications}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {249--267}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00231-w}, doi = {10.1007/S13389-020-00231-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Schoinianakis20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/SijacicBYGV20, author = {Danilo Sijacic and Josep Balasch and Bohan Yang and Santosh Ghosh and Ingrid Verbauwhede}, title = {Towards efficient and automated side-channel evaluations at design time}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {4}, pages = {305--319}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00233-8}, doi = {10.1007/S13389-020-00233-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/SijacicBYGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/Wiemers20, author = {Andreas Wiemers}, title = {A remark on a success rate model for side-channel attack analysis}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {3}, pages = {269--274}, year = {2020}, url = {https://doi.org/10.1007/s13389-020-00235-6}, doi = {10.1007/S13389-020-00235-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/Wiemers20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/WillersHGSD20, author = {Oliver Willers and Christopher Huth and Jorge Guajardo and Helmut Seidel and Peter W. Deutsch}, title = {On the feasibility of deriving cryptographic keys from {MEMS} sensors}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {67--83}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00208-4}, doi = {10.1007/S13389-019-00208-4}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/WillersHGSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ZhouS20, author = {Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Deep learning mitigates but does not annihilate the need of aligned traces and a generalized ResNet model for side-channel attacks}, journal = {J. Cryptogr. Eng.}, volume = {10}, number = {1}, pages = {85--95}, year = {2020}, url = {https://doi.org/10.1007/s13389-019-00209-3}, doi = {10.1007/S13389-019-00209-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ZhouS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.