%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.26", %%% date = "08 August 2024", %%% time = "08:52:25 MDT", %%% filename = "jcryptoeng.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% FAX = "+1 801 581 4148", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "21832 8393 31450 343490", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Journal of %%% Cryptographic Engineering", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This is a COMPLETE bibliography of the %%% Journal of Cryptographic Engineering (CODEN %%% none, ISSN 2190-8508 (print), 2190-8516 %%% (electronic)), published by Springer. %%% %%% Publication began with volume 1, number 1, in %%% 2011, and the journal currently appears %%% quarterly. %%% %%% The journal has World-Wide Web sites at %%% %%% http://link.springer.com/journal/13389 %%% http://link.springer.com/journal/volumesAndIssues/13389 %%% http://www.springer.com/computer/security+and+cryptology/journal/13389 %%% %%% At version 1.26, the year coverage looked %%% like this: %%% %%% 2011 ( 28) 2016 ( 23) 2021 ( 29) %%% 2012 ( 23) 2017 ( 27) 2022 ( 27) %%% 2013 ( 22) 2018 ( 24) 2023 ( 31) %%% 2014 ( 24) 2019 ( 27) 2024 ( 29) %%% 2015 ( 21) 2020 ( 23) %%% %%% Article: 358 %%% %%% Total entries: 358 %%% %%% Data for the bibliography have been collected %%% primarily from the publisher Web site. %%% %%% Spelling has been verified with the UNIX %%% spell and GNU ispell programs using the %%% exception dictionary stored in the companion %%% file with extension .sok. %%% %%% BibTeX citation tags are uniformly chosen %%% as name:year:abbrev, where name is the %%% family name of the first author or editor, %%% year is a 4-digit number, and abbrev is a %%% 3-letter condensation of important title %%% words. Citation tags were automatically %%% generated by software developed for the %%% BibNet Project. %%% %%% In this bibliography, entries are sorted in %%% publication order, using ``bibsort -byvolume''. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{ "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" # "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi" } %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, FAX: +1 801 581 4148, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-J-CRYPTO-ENG = "Journal of Cryptographic Engineering"} %%% ==================================================================== %%% Bibliography entries, in publication order: @Article{Koc:2011:IBC, author = "{\c{C}}etin Kaya Ko{\c{c}}", title = "Introduction to the {{\booktitle{Journal of Cryptographic Engineering}}}", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "1--3", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0007-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://cs.ucsb.edu/~koc/docs/j75.pdf; http://link.springer.com/article/10.1007/s13389-011-0007-x; http://link.springer.com/content/pdf/10.1007/s13389-011-0007-x.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kocher:2011:IDP, author = "Paul Kocher and Joshua Jaffe and Benjamin Jun and Pankaj Rohatgi", title = "Introduction to differential power analysis", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "5--27", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0006-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0006-y; http://link.springer.com/content/pdf/10.1007/s13389-011-0006-y.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Molter:2011:SPA, author = "H. Gregor Molter and Marc St{\"o}ttinger and Abdulhadi Shoufan and Falko Strenzke", title = "A simple power analysis attack on a {McEliece} cryptoprocessor", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "29--36", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0001-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0001-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Guneysu:2011:UHC, author = "Tim G{\"u}neysu", title = "Utilizing hard cores of modern {FPGA} devices for high-performance cryptography", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "37--55", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0002-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0002-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dominguez-Oviedo:2011:ALE, author = "Agustin Dominguez-Oviedo and M. Anwar Hasan", title = "Algorithm-level error detection for {Montgomery} ladder-based {ECSM}", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "57--69", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0003-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0003-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Skorobogatov:2011:SMS, author = "Sergei Skorobogatov", title = "Synchronization method for {SCA} and fault attacks", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "71--77", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0004-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0004-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hocquet:2011:HPN, author = "C{\'e}dric Hocquet and Dina Kamel and Francesco Regazzoni and Jean-Didier Legat and Denis Flandre and David Bol and Fran{\c{c}}ois-Xavier Standaert", title = "Harvesting the potential of nano-{CMOS} for lightweight cryptography: an ultra-low-voltage 65 nm {AES} coprocessor for passive {RFID} tags", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "79--86", month = apr, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0005-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0005-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2011:HCa, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "1", number = "1", pages = "??--??", month = apr, year = "2011", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:30 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Moreno:2011:SRB, author = "Carlos Moreno and M. Anwar Hasan", title = "{SPA}-resistant binary exponentiation with optimal execution time", journal = j-J-CRYPTO-ENG, volume = "1", number = "2", pages = "87--99", month = aug, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0008-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0008-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Beuchat:2011:LAU, author = "Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki", title = "A low-area unified hardware architecture for the {AES} and the cryptographic hash function {ECHO}", journal = j-J-CRYPTO-ENG, volume = "1", number = "2", pages = "101--121", month = aug, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0009-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0009-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Doget:2011:USC, author = "Julien Doget and Emmanuel Prouff and Matthieu Rivain and Fran{\c{c}}ois-Xavier Standaert", title = "Univariate side channel attacks and leakage modeling", journal = j-J-CRYPTO-ENG, volume = "1", number = "2", pages = "123--144", month = aug, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0010-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0010-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Whitnall:2011:FEF, author = "Carolyn Whitnall and Elisabeth Oswald", title = "A fair evaluation framework for comparing side-channel distinguishers", journal = j-J-CRYPTO-ENG, volume = "1", number = "2", pages = "145--160", month = aug, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0011-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0011-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Goundar:2011:SMW, author = "Raveen R. Goundar and Marc Joye and Atsuko Miyaji and Matthieu Rivain and Alexandre Venelli", title = "Scalar multiplication on {Weierstra{\ss}} elliptic curves from Co-{$Z$} arithmetic", journal = j-J-CRYPTO-ENG, volume = "1", number = "2", pages = "161--176", month = aug, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0012-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0012-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2011:HCb, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "1", number = "2", pages = "??--??", month = aug, year = "2011", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Katzenbeisser:2011:RPL, author = "Stefan Katzenbeisser and {\"U}nal Kocaba{\v{s}} and Vincent van der Leest and Ahmad-Reza Sadeghi and Geert-Jan Schrijen and Christian Wachsmann", title = "Recyclable {PUFs}: logically reconfigurable {PUFs}", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "177--186", month = nov, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0016-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0016-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Taverne:2011:SSM, author = "Jonathan Taverne and Armando Faz-Hern{\'a}ndez and Diego F. Aranha and Francisco Rodr{\'\i}guez-Henr{\'\i}quez and Darrel Hankerson and Julio L{\'o}pez", title = "Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "187--199", month = nov, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0017-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0017-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Meloni:2011:HPG, author = "Nicolas M{\'e}loni and Christophe Negre and M. Anwar Hasan", title = "High performance {GHASH} and impacts of a class of unconventional bases", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "201--218", month = nov, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0013-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0013-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Tunstall:2011:PCD, author = "Michael Tunstall", title = "Practical complexity differential cryptanalysis and fault analysis of {AES}", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "219--230", month = nov, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0018-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0018-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Medwed:2011:EAS, author = "Marcel Medwed and Fran{\c{c}}ois-Xavier Standaert", title = "Extractors against side-channel attacks: weak or strong?", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "231--241", month = nov, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0014-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0014-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Brier:2011:MFA, author = "{\'E}ric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi", title = "Modulus fault attacks against {RSA--CRT} signatures", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "243--253", month = nov, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0015-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0015-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2011:HCc, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "1", number = "3", pages = "??--??", month = nov, year = "2011", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:31 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dichtl:2011:NMB, author = "Markus Dichtl", title = "A new method of black box power analysis and a fast algorithm for optimal key search", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "255--264", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0019-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0019-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Endo:2011:CGC, author = "Sho Endo and Takeshi Sugawara and Naofumi Homma and Takafumi Aoki and Akashi Satoh", title = "An on-chip glitchy-clock generator for testing fault injection attacks", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "265--270", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0022-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0022-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Avanzi:2011:SCA, author = "Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall", title = "Side-channel attacks on the {McEliece} and {Niederreiter} public-key cryptosystems", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "271--281", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0024-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", note = "See erratum \cite{Avanzi:2012:ESC}.", URL = "http://link.springer.com/article/10.1007/s13389-011-0024-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Strenzke:2011:MAS, author = "Falko Strenzke", title = "Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "283--292", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0020-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0020-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hospodar:2011:MLS, author = "Gabriel Hospodar and Benedikt Gierlichs and Elke {De Mulder} and Ingrid Verbauwhede and Joos Vandewalle", title = "Machine learning in side-channel analysis: a first study", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "293--302", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0023-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0023-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lux:2011:TSD, author = "Alexander Lux and Artem Starostin", title = "A tool for static detection of timing channels in {Java}", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "303--313", month = dec, year = "2011", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0021-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0021-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2011:HCd, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "1", number = "4", pages = "??--??", month = dec, year = "2011", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Grabher:2012:EMD, author = "P. Grabher and J. Gro{\ss}sch{\"a}dl and S. Hoerder and K. J{\"a}rvinen and D. Page and S. Tillich and M. W{\'o}jcik", title = "An exploration of mechanisms for dynamic cryptographic instruction set extension", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "1--18", month = may, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0025-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-011-0025-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gouvea:2012:ESI, author = "Conrado P. L. Gouv{\^e}a and Leonardo B. Oliveira and Julio L{\'o}pez", title = "Efficient software implementation of public-key cryptography on sensor networks using the {MSP430X} microcontroller", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "19--29", month = may, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0029-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0029-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gueron:2012:ESI, author = "Shay Gueron", title = "Efficient software implementations of modular exponentiation", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "31--43", month = may, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0031-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0031-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Carlet:2012:AAS, author = "Claude Carlet and Jean-Charles Faug{\`e}re and Christopher Goyet and Gu{\'e}na{\"e}l Renault", title = "Analysis of the algebraic side channel attack", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "45--62", month = may, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0028-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0028-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Elaabid:2012:PT, author = "M. Abdelaziz Elaabid and Sylvain Guilley", title = "Portability of templates", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "63--74", month = may, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0030-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0030-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Avanzi:2012:ESC, author = "Roberto Avanzi and Simon Hoerder and Dan Page and Michael Tunstall", title = "Erratum to: Side-channel attacks on the {McEliece} and {Niederreiter} public-key cryptosystems", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "75--75", month = may, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-011-0026-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", note = "See \cite{Avanzi:2011:SCA}.", URL = "http://link.springer.com/article/10.1007/s13389-011-0026-7; http://link.springer.com/content/pdf/10.1007/s13389-011-0026-7.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2012:HCa, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "2", number = "1", pages = "??--??", month = may, year = "2012", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bernstein:2012:HSH, author = "Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang", title = "High-speed high-security signatures", journal = j-J-CRYPTO-ENG, volume = "2", number = "2", pages = "77--89", month = sep, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0027-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0027-1; http://link.springer.com/content/pdf/10.1007/s13389-012-0027-1.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hasan:2012:SMS, author = "M. Anwar Hasan and Christophe Negre", title = "Sequential multiplier with sub-linear gate complexity", journal = j-J-CRYPTO-ENG, volume = "2", number = "2", pages = "91--97", month = sep, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0035-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0035-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Yen:2012:MEA, author = "Sung-Ming Yen and Chien-Ning Chen and SangJae Moon", title = "Multi-exponentiation algorithm based on binary {GCD} computation and its application to side-channel countermeasure", journal = j-J-CRYPTO-ENG, volume = "2", number = "2", pages = "99--110", month = sep, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0032-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0032-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Roche:2012:HOG, author = "Thomas Roche and Emmanuel Prouff", title = "Higher-order glitch free implementation of the {AES} using {Secure Multi--Party Computation} protocols", journal = j-J-CRYPTO-ENG, volume = "2", number = "2", pages = "111--127", month = sep, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0033-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0033-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bringer:2012:PAA, author = "Julien Bringer and Herv{\'e} Chabanne and Thanh Ha Le", title = "Protecting {AES} against side-channel analysis using wire-tap codes", journal = j-J-CRYPTO-ENG, volume = "2", number = "2", pages = "129--141", month = sep, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0034-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0034-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2012:HCb, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "2", number = "2", pages = "??--??", month = sep, year = "2012", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:32 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kasper:2012:SCB, author = "Markus Kasper and Amir Moradi and Georg T. Becker and Oliver Mischke and Tim G{\"u}neysu and Christof Paar and Wayne Burleson", title = "Side channels as building blocks", journal = j-J-CRYPTO-ENG, volume = "2", number = "3", pages = "143--159", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0040-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0040-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Mather:2012:PSC, author = "Luke Mather and Elisabeth Oswald", title = "Pinpointing side-channel information leaks in web applications", journal = j-J-CRYPTO-ENG, volume = "2", number = "3", pages = "161--177", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0036-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0036-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Trujillo-Olaya:2012:APV, author = "Vladimir Trujillo-Olaya and Timothy Sherwood and {\c{C}}etin Kaya Ko{\c{c}}", title = "Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications", journal = j-J-CRYPTO-ENG, volume = "2", number = "3", pages = "179--188", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0039-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0039-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Shariati:2012:AEE, author = "Saloomeh Shariati and Fran{\c{c}}ois-Xavier Standaert and Laurent Jacques and Benoit Macq", title = "Analysis and experimental evaluation of image-based {PUFs}", journal = j-J-CRYPTO-ENG, volume = "2", number = "3", pages = "189--206", month = oct, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0041-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0041-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Anonymous:2012:HCc, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "2", number = "3", pages = "??--??", month = oct, year = "2012", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Rolt:2012:SAS, author = "Jean Da Rolt and Amitabh Das and Santosh Ghosh and Giorgio {Di Natale} and Marie-Lise Flottes and Bruno Rouzeyre and Ingrid Verbauwhede", title = "Scan attacks on side-channel and fault attack resistant public-key implementations", journal = j-J-CRYPTO-ENG, volume = "2", number = "4", pages = "207--219", month = nov, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0045-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0045-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Baldwin:2012:CES, author = "Brian Baldwin and Raveen R. Goundar and Mark Hamilton and William P. Marnane", title = "Co-{$Z$} {ECC} scalar multiplications for hardware, software and hardware-software co-design on embedded systems", journal = j-J-CRYPTO-ENG, volume = "2", number = "4", pages = "221--240", month = nov, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0042-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0042-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gueron:2012:PMS, author = "Shay Gueron and Vlad Krasnov", title = "Parallelizing message schedules to accelerate the computations of hash functions", journal = j-J-CRYPTO-ENG, volume = "2", number = "4", pages = "241--253", month = nov, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0037-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0037-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Koeberl:2012:PDA, author = "Patrick Koeberl and Jiangtao Li and Roel Maes and Anand Rajan and Claire Vishik and Marcin W{\'o}jcik and Wei Wu", title = "A practical device authentication scheme using {SRAM} {PUFs}", journal = j-J-CRYPTO-ENG, volume = "2", number = "4", pages = "255--269", month = nov, year = "2012", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0043-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0043-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Anonymous:2012:HCd, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "2", number = "4", pages = "??--??", month = nov, year = "2012", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:33 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Prouff:2013:ICS, author = "Emmanuel Prouff and Patrick Schaumont", title = "Introduction to the {CHES 2012} special issue", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "1--1", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0055-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0055-5; http://link.springer.com/content/pdf/10.1007/s13389-013-0055-5.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Schlosser:2013:SPE, author = "Alexander Schl{\"o}sser and Dmitry Nedospasov and Juliane Kr{\"a}mer and Susanna Orlic and Jean-Pierre Seifert", title = "Simple photonic emission analysis of {AES}", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "3--15", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0053-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0053-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ruhrmair:2013:PUP, author = "Ulrich R{\"u}hrmair and Marten van Dijk", title = "On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "17--28", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0052-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0052-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Heyse:2013:CBC, author = "Stefan Heyse and Tim G{\"u}neysu", title = "Code-based cryptography on reconfigurable hardware: tweaking {Niederreiter} encryption for performance", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "29--43", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0056-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0056-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gerard:2013:UOL, author = "Beno{\^\i}t G{\'e}rard and Fran{\c{c}}ois-Xavier Standaert", title = "Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "45--58", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0051-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0051-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Fouque:2013:ARC, author = "Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz", title = "Attacking {RSA--CRT} signatures with faults on {Montgomery} multiplication", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "59--72", month = apr, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0050-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0050-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2013:HCa, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "3", number = "1", pages = "??--??", month = apr, year = "2013", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ali:2013:DFA, author = "Sk Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall", title = "Differential fault analysis of {AES}: towards reaching its limits", journal = j-J-CRYPTO-ENG, volume = "3", number = "2", pages = "73--97", month = jun, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0046-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0046-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Montminy:2013:ICD, author = "David P. Montminy and Rusty O. Baldwin and Michael A. Temple and Eric D. Laspe", title = "Improving cross-device attacks using zero-mean unit-variance normalization", journal = j-J-CRYPTO-ENG, volume = "3", number = "2", pages = "99--110", month = jun, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0038-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0038-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Akinyele:2013:CFR, author = "Joseph A. Akinyele and Christina Garman and Ian Miers and Matthew W. Pagano and Michael Rushanan and Matthew Green and Aviel D. Rubin", title = "{Charm}: a framework for rapidly prototyping cryptosystems", journal = j-J-CRYPTO-ENG, volume = "3", number = "2", pages = "111--128", month = jun, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0057-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0057-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kurdziel:2013:MPO, author = "Michael T. Kurdziel and Marcin Lukowiak and Michael A. Sanfilippo", title = "Minimizing performance overhead in memory encryption", journal = j-J-CRYPTO-ENG, volume = "3", number = "2", pages = "129--138", month = jun, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0047-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0047-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2013:HCb, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "3", number = "2", pages = "??--??", month = jun, year = "2013", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Mohamed:2013:IAS, author = "Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter and Johannes Buchmann", title = "Improved algebraic side-channel attack on {AES}", journal = j-J-CRYPTO-ENG, volume = "3", number = "3", pages = "139--156", month = sep, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0059-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0059-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Christofi:2013:FVC, author = "Maria Christofi and Boutheina Chetali and Louis Goubin and David Vigilant", title = "Formal verification of a {CRT--RSA} implementation against fault attacks", journal = j-J-CRYPTO-ENG, volume = "3", number = "3", pages = "157--167", month = sep, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0049-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0049-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Briais:2013:FST, author = "S{\'e}bastien Briais and Jean-Luc Danger and Sylvain Guilley", title = "A formal study of two physical countermeasures against side channel attacks", journal = j-J-CRYPTO-ENG, volume = "3", number = "3", pages = "169--180", month = sep, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0054-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0054-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Brown:2013:TTC, author = "Mark Brown", title = "Toward a taxonomy of communications security models", journal = j-J-CRYPTO-ENG, volume = "3", number = "3", pages = "181--195", month = sep, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0058-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0058-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2013:HCc, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "3", number = "3", pages = "??--??", month = sep, year = "2013", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:34 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Yamamoto:2013:VEP, author = "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh", title = "Variety enhancement of {PUF} responses using the locations of random outputting {RS} latches", journal = j-J-CRYPTO-ENG, volume = "3", number = "4", pages = "197--211", month = nov, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-012-0044-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-012-0044-0; http://link.springer.com/content/pdf/10.1007/s13389-012-0044-0.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Bhasin:2013:CHA, author = "Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Jean-Luc Danger", title = "From cryptography to hardware: analyzing and protecting embedded {Xilinx} {BRAM} for cryptographic applications", journal = j-J-CRYPTO-ENG, volume = "3", number = "4", pages = "213--225", month = nov, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0048-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0048-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kamal:2013:SHI, author = "Abdel Alim Kamal and Amr M. Youssef", title = "Strengthening hardware implementations of {NTRUEncrypt} against fault analysis attacks", journal = j-J-CRYPTO-ENG, volume = "3", number = "4", pages = "227--240", month = nov, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0061-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0061-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Danger:2013:SSC, author = "Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and C{\'e}dric Murdica and David Naccache", title = "A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards", journal = j-J-CRYPTO-ENG, volume = "3", number = "4", pages = "241--265", month = nov, year = "2013", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0062-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0062-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2013:HCd, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "3", number = "4", pages = "??--??", month = nov, year = "2013", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bertoni:2014:ICS, author = "Guido Bertoni and Jean-S{\'e}bastien Coron", title = "Introduction to the {CHES 2013} special issue", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "1--1", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0076-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0076-8; http://link.springer.com/content/pdf/10.1007/s13389-014-0076-8.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Oliveira:2014:TFP, author = "Thomaz Oliveira and Julio L{\'o}pez and Diego F. Aranha and Francisco Rodr{\'\i}guez-Henr{\'\i}quez", title = "Two is the fastest prime: lambda coordinates for binary elliptic curves", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "3--17", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0069-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0069-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Becker:2014:SDL, author = "Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson", title = "Stealthy dopant-level hardware {Trojans}: extended version", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "19--31", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0068-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0068-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{DeMulder:2014:UBS, author = "Elke {De Mulder} and Michael Hutter and Mark E. Marson and Peter Pearson", title = "Using {Bleichenbacher}'s solution to the hidden number problem to attack nonce leaks in $ 384$-bit {ECDSA}: extended version", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "33--45", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0072-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0072-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Grosso:2014:MVM, author = "Vincent Grosso and Fran{\c{c}}ois-Xavier Standaert and Sebastian Faust", title = "Masking vs. multiparty computation: how large is the gap for {AES}?", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "47--57", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0073-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0073-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Sugawara:2014:MSC, author = "Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino", title = "On measurable side-channel leaks inside {ASIC} design primitives", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "59--73", month = apr, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0078-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0078-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2014:HCa, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "4", number = "1", pages = "??--??", month = apr, year = "2014", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:35 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Almeida:2014:LPB, author = "Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. {Simplicio, Jr.}", title = "{Lyra}: password-based key derivation with tunable memory and processing costs", journal = j-J-CRYPTO-ENG, volume = "4", number = "2", pages = "75--89", month = jun, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0063-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0063-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Negre:2014:EBP, author = "Chistophe Negre", title = "Efficient binary polynomial multiplication based on optimized {Karatsuba} reconstruction", journal = j-J-CRYPTO-ENG, volume = "4", number = "2", pages = "91--106", month = jun, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0066-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0066-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Carlet:2014:ASC, author = "Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Emmanuel Prouff Houssem Maghrebi", title = "Achieving side-channel high-order correlation immunity with leakage squeezing", journal = j-J-CRYPTO-ENG, volume = "4", number = "2", pages = "107--121", month = jun, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0067-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0067-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Biasi:2014:SEC, author = "Felipe P. Biasi and Paulo S. L. M. Barreto and Rafael Misoczki and Wilson V. Ruggiero", title = "Scaling efficient code-based cryptosystems for embedded platforms", journal = j-J-CRYPTO-ENG, volume = "4", number = "2", pages = "123--134", month = jun, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0070-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0070-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Paul:2014:DSC, author = "Goutam Paul and Anupam Chattopadhyay", title = "Designing stream ciphers with scalable data-widths: a case study with {HC-128}", journal = j-J-CRYPTO-ENG, volume = "4", number = "2", pages = "135--143", month = jun, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0071-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0071-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2014:HCb, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "4", number = "2", pages = "??--??", month = jun, year = "2014", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Moro:2014:FVS, author = "N. Moro and K. Heydemann and E. Encrenaz and B. Robisson", title = "Formal verification of a software countermeasure against instruction skip attacks", journal = j-J-CRYPTO-ENG, volume = "4", number = "3", pages = "145--156", month = sep, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0077-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0077-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Belaid:2014:TFR, author = "Sonia Bela{\"\i}d and Fabrizio {De Santis} and Johann Heyszl and Stefan Mangard and Marcel Medwed and J{\o}rn-Marc Schmidt and Fran{\c{c}}ois-Xavier Standaert and Stefan Tillich", title = "Towards fresh re-keying with leakage-resilient {PRFs}: cipher design principles and analysis", journal = j-J-CRYPTO-ENG, volume = "4", number = "3", pages = "157--171", month = sep, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0079-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0079-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Rauzy:2014:FPC, author = "Pablo Rauzy and Sylvain Guilley", title = "A formal proof of countermeasures against fault injection attacks on {CRT--RSA}", journal = j-J-CRYPTO-ENG, volume = "4", number = "3", pages = "173--185", month = sep, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0065-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0065-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kamel:2014:ULI, author = "Dina Kamel and Mathieu Renauld and Denis Flandre and Fran{\c{c}}ois-Xavier Standaert", title = "Understanding the limitations and improving the relevance of {SPICE} simulations in side-channel security evaluations", journal = j-J-CRYPTO-ENG, volume = "4", number = "3", pages = "187--195", month = sep, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0080-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0080-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Tiran:2014:MLF, author = "S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine", title = "A model of the leakage in the frequency domain and its application to {CPA} and {DPA}", journal = j-J-CRYPTO-ENG, volume = "4", number = "3", pages = "197--212", month = sep, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0074-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0074-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2014:HCc, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "4", number = "3", pages = "??--??", month = sep, year = "2014", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Aug 20 18:51:36 MDT 2014", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Schindler:2014:PAP, author = "Werner Schindler and Andreas Wiemers", title = "Power attacks in the presence of exponent blinding", journal = j-J-CRYPTO-ENG, volume = "4", number = "4", pages = "213--236", month = nov, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0081-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Feb 10 08:19:07 MST 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0081-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Karati:2014:NAB, author = "Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury and Bhargav Bellur and Debojyoti Bhattacharya and Aravind Iyer", title = "New algorithms for batch verification of standard {ECDSA} signatures", journal = j-J-CRYPTO-ENG, volume = "4", number = "4", pages = "237--258", month = nov, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0082-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Feb 10 08:19:07 MST 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0082-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Clavier:2014:PIS, author = "Christophe Clavier and Jean-Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^\i}t G{\'e}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'e} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and et al", title = "Practical improvements of side-channel attacks on {AES}: feedback from the 2nd {DPA} contest", journal = j-J-CRYPTO-ENG, volume = "4", number = "4", pages = "259--274", month = nov, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0075-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Feb 10 08:19:07 MST 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0075-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bos:2014:CTM, author = "Joppe W. Bos", title = "Constant time modular inversion", journal = j-J-CRYPTO-ENG, volume = "4", number = "4", pages = "275--281", month = nov, year = "2014", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0084-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Feb 10 08:19:07 MST 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0084-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Anonymous:2014:HC, author = "Anonymous", title = "Help \& Contacts", journal = j-J-CRYPTO-ENG, volume = "4", number = "4", pages = "??--??", month = nov, year = "2014", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Feb 10 08:19:07 MST 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Templin:2015:NPA, author = "Joshua R. Templin and Jason R. Hamlet", title = "A new power-aware {FPGA} design metric", journal = j-J-CRYPTO-ENG, volume = "5", number = "1", pages = "1--11", month = apr, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-013-0060-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-013-0060-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Banik:2015:IDF, author = "Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar", title = "Improved differential fault attack on {MICKEY 2.0}", journal = j-J-CRYPTO-ENG, volume = "5", number = "1", pages = "13--29", month = apr, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0083-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0083-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Faz-Hernandez:2015:ESA, author = "Armando Faz-Hern{\'a}ndez and Patrick Longa and Ana H. S{\'a}nchez", title = "Efficient and secure algorithms for {GLV}-based scalar multiplication and their implementation on {GLV--GLS} curves (extended version)", journal = j-J-CRYPTO-ENG, volume = "5", number = "1", pages = "31--52", month = apr, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0085-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0085-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{OFlynn:2015:SSC, author = "Colin O'Flynn and Zhizhang Chen", title = "Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection", journal = j-J-CRYPTO-ENG, volume = "5", number = "1", pages = "53--69", month = apr, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0087-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0087-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Batina:2015:ICS, author = "Lejla Batina and M. J. B. Robshaw", title = "Introduction to the {CHES 2014} special issue", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "71--72", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0098-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0098-x; http://link.springer.com/content/pdf/10.1007/s13389-015-0098-x.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Coron:2015:FEP, author = "Jean-S{\'e}bastien Coron and Arnab Roy and Srinivas Vivek", title = "Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "73--83", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0099-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0099-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Sugawara:2015:RSD, author = "Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino", title = "Reversing stealthy dopant-level circuits", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "85--94", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0102-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0102-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Genkin:2015:GYH, author = "Daniel Genkin and Itamar Pipman and Eran Tromer", title = "Get your hands off my laptop: physical side-channel key-extraction attacks on {PCs}", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "95--112", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0100-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0100-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Vliegen:2015:PFE, author = "Jo Vliegen and Nele Mentens and Dirk Koch and Dries Schellekens and Ingrid Verbauwhede", title = "Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware {IP} cores in {Xilinx} {FPGAs}", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "113--122", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0088-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0088-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lerman:2015:MLA, author = "Liran Lerman and Gianluca Bontempi and Olivier Markowitch", title = "A machine learning approach against a masked {AES}", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "123--139", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0089-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0089-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gueron:2015:FPF, author = "Shay Gueron and Vlad Krasnov", title = "Fast prime field elliptic-curve cryptography with $ 256$-bit primes", journal = j-J-CRYPTO-ENG, volume = "5", number = "2", pages = "141--151", month = jun, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0090-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0090-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Guo:2015:SAC, author = "Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin and Ramesh Karri", title = "Security analysis of concurrent error detection against differential fault analysis", journal = j-J-CRYPTO-ENG, volume = "5", number = "3", pages = "153--169", month = sep, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0092-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0092-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Perin:2015:VHC, author = "Guilherme Perin and Laurent Imbert and Philippe Maurine and Lionel Torres", title = "Vertical and horizontal correlation attacks on {RNS}-based exponentiations", journal = j-J-CRYPTO-ENG, volume = "5", number = "3", pages = "171--185", month = sep, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0095-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0095-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Yamamoto:2015:NME, author = "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh and Naoya Torii", title = "A new method for enhancing variety and maintaining reliability of {PUF} responses and its evaluation on {ASICs}", journal = j-J-CRYPTO-ENG, volume = "5", number = "3", pages = "187--199", month = sep, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-014-0091-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-014-0091-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Hutter:2015:MMA, author = "Michael Hutter and Peter Schwabe", title = "Multiprecision multiplication on {AVR} revisited", journal = j-J-CRYPTO-ENG, volume = "5", number = "3", pages = "201--214", month = sep, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0093-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0093-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "AVR ATmega 8-bit microcontroller; Karatsuba multiplication; microcontroller; multiple-precision multiplication", } @Article{Bluhm:2015:FSI, author = "Manuel Bluhm and Shay Gueron", title = "Fast software implementation of binary elliptic curve cryptography", journal = j-J-CRYPTO-ENG, volume = "5", number = "3", pages = "215--226", month = sep, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0094-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Aug 8 10:42:46 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0094-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "Binary elliptic curve; Binary field arithmetic; ECDHE; ECDSA; Intel AVX pclmulqdq instruction; Mul\&add; Scalar multiplication; Side-channel protection", } @Article{Fei:2015:SBS, author = "Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang", title = "A statistics-based success rate model for {DPA} and {CPA}", journal = j-J-CRYPTO-ENG, volume = "5", number = "4", pages = "227--243", month = nov, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0107-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Oct 19 14:22:58 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0107-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hamlet:2015:TOI, author = "Jason R. Hamlet and Robert W. Brocato", title = "Throughput-optimized implementations of {QUAD}", journal = j-J-CRYPTO-ENG, volume = "5", number = "4", pages = "245--254", month = nov, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0109-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Oct 19 14:22:58 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0109-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lerman:2015:BVD, author = "Liran Lerman and Gianluca Bontempi and Olivier Markowitch", title = "The bias-variance decomposition in profiled attacks", journal = j-J-CRYPTO-ENG, volume = "5", number = "4", pages = "255--267", month = nov, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0106-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Oct 19 14:22:58 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0106-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bongiovanni:2015:DVT, author = "Simone Bongiovanni and Francesco Centurelli and Giuseppe Scotti and Alessandro Trifiletti", title = "Design and validation through a frequency-based metric of a new countermeasure to protect nanometer {ICs} from side-channel attacks", journal = j-J-CRYPTO-ENG, volume = "5", number = "4", pages = "269--288", month = nov, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0096-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Oct 19 14:22:58 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0096-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cenk:2015:SNR, author = "Murat Cenk and M. Anwar Hasan", title = "Some new results on binary polynomial multiplication", journal = j-J-CRYPTO-ENG, volume = "5", number = "4", pages = "289--303", month = nov, year = "2015", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0101-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Oct 19 14:22:58 MDT 2015", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0101-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Konheim:2016:ATM, author = "Alan G. Konheim", title = "Automated teller machines: their history and authentication protocols", journal = j-J-CRYPTO-ENG, volume = "6", number = "1", pages = "1--29", month = apr, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0104-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Apr 7 09:34:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0104-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Aldaya:2016:ABT, author = "Alejandro Cabrera Aldaya and Alejandro J. Cabrera Sarmiento and Santiago S{\'a}nchez-Solano", title = "{AES T-Box} tampering attack", journal = j-J-CRYPTO-ENG, volume = "6", number = "1", pages = "31--48", month = apr, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0103-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Apr 7 09:34:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0103-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ferradi:2016:WOC, author = "Houda Ferradi and R{\'e}mi G{\'e}raud and David Naccache and Assia Tria", title = "When organized crime applies academic results: a forensic analysis of an in-card listening device", journal = j-J-CRYPTO-ENG, volume = "6", number = "1", pages = "49--59", month = apr, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0112-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Apr 7 09:34:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0112-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bayon:2016:FME, author = "Pierre Bayon and Lilian Bossuet and Alain Aubert and Viktor Fischer", title = "Fault model of electromagnetic attacks targeting ring oscillator-based true random number generators", journal = j-J-CRYPTO-ENG, volume = "6", number = "1", pages = "61--74", month = apr, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0113-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Apr 7 09:34:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0113-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Saarinen:2016:BAC, author = "Markku-Juhani O. Saarinen", title = "The {BRUTUS} automatic cryptanalytic framework", journal = j-J-CRYPTO-ENG, volume = "6", number = "1", pages = "75--82", month = apr, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0114-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Apr 7 09:34:40 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-015-0114-1; http://link.springer.com/content/pdf/10.1007/s13389-015-0114-1.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Guneysu:2016:ICS, author = "Tim G{\"u}neysu and Helena Handschuh", title = "Introduction to the {CHES 2015} special issue", journal = j-J-CRYPTO-ENG, volume = "6", number = "2", pages = "83--84", month = jun, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0130-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon May 30 07:49:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0130-9; http://link.springer.com/content/pdf/10.1007/s13389-016-0130-9.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Schneider:2016:LAM, author = "Tobias Schneider and Amir Moradi", title = "Leakage assessment methodology", journal = j-J-CRYPTO-ENG, volume = "6", number = "2", pages = "85--99", month = jun, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0120-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon May 30 07:49:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0120-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Schindler:2016:EEB, author = "Werner Schindler", title = "Exclusive exponent blinding is not enough to prevent any timing attack on {RSA}", journal = j-J-CRYPTO-ENG, volume = "6", number = "2", pages = "101--119", month = jun, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0124-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon May 30 07:49:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0124-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Maes:2016:SKG, author = "Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems", title = "Secure key generation from biased {PUFs}: extended version", journal = j-J-CRYPTO-ENG, volume = "6", number = "2", pages = "121--137", month = jun, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0125-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon May 30 07:49:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0125-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Reparaz:2016:MRL, author = "Oscar Reparaz and Sujoy Sinha Roy and Ruan de Clercq and Frederik Vercauteren and Ingrid Verbauwhede", title = "Masking ring-{LWE}", journal = j-J-CRYPTO-ENG, volume = "6", number = "2", pages = "139--153", month = jun, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0126-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon May 30 07:49:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0126-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Coisel:2016:ICD, author = "Iwen Coisel and Ignacio Sanchez", title = "Improved cryptanalysis of the {DECT} standard cipher", journal = j-J-CRYPTO-ENG, volume = "6", number = "2", pages = "155--169", month = jun, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0127-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon May 30 07:49:01 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0127-4; http://link.springer.com/content/pdf/10.1007/s13389-016-0127-4.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lemire:2016:FBU, author = "Daniel Lemire and Owen Kaser", title = "Faster $ 64$-bit universal hashing using carry-less multiplications", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "171--185", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0110-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0110-5; http://link.springer.com/article/10.1007/s13389-015-0110-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Goundar:2016:IFA, author = "Raveen R. Goundar and Marc Joye", title = "Inversion-free arithmetic on elliptic curves through isomorphisms", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "187--199", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0131-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0131-8; http://link.springer.com/article/10.1007/s13389-016-0131-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Rauzy:2016:FPS, author = "Pablo Rauzy and Sylvain Guilley and Zakaria Najm", title = "Formally proved security of assembly code against power analysis", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "201--216", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0105-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0105-2; http://link.springer.com/article/10.1007/s13389-015-0105-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Robisson:2016:PFC, author = "Bruno Robisson and H{\'e}l{\`e}ne {Le Bouder}", title = "Physical functions: the common factor of side-channel and fault attacks?", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "217--227", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0111-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0111-4; http://link.springer.com/article/10.1007/s13389-015-0111-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Galindo:2016:ILR, author = "David Galindo and Johann Gro{\ss}sch{\"a}dl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek", title = "Implementation of a leakage-resilient {ElGamal} key encapsulation mechanism", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "229--238", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0121-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0121-x; http://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ngo:2016:MTA, author = "Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger", title = "Method taking into account process dispersion to detect hardware {Trojan Horse} by side-channel analysis", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "239--247", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0129-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0129-2; http://link.springer.com/article/10.1007/s13389-016-0129-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ganji:2016:PLA, author = "Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert", title = "{PAC} learning of arbiter {PUFs}", journal = j-J-CRYPTO-ENG, volume = "6", number = "3", pages = "249--258", month = sep, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0119-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Mon Sep 12 08:05:12 MDT 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0119-4; http://link.springer.com/article/10.1007/s13389-016-0119-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Bos:2016:SEC, author = "Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig", title = "Selecting elliptic curves for cryptography: an efficiency and security analysis", journal = j-J-CRYPTO-ENG, volume = "6", number = "4", pages = "259--286", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0097-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Nov 17 07:32:46 MST 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0097-y; http://link.springer.com/article/10.1007/s13389-015-0097-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Wenger:2016:HBF, author = "Erich Wenger and Paul Wolfger", title = "Harder, better, faster, stronger: elliptic curve discrete logarithm computations on {FPGAs}", journal = j-J-CRYPTO-ENG, volume = "6", number = "4", pages = "287--297", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-015-0108-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Nov 17 07:32:46 MST 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0108-z; http://link.springer.com/article/10.1007/s13389-015-0108-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Khalid:2016:RRP, author = "Ayesha Khalid and Muhammad Hassan and Goutam Paul and Anupam Chattopadhyay", title = "{RunFein}: a rapid prototyping framework for {Feistel} and {SPN}-based block ciphers", journal = j-J-CRYPTO-ENG, volume = "6", number = "4", pages = "299--323", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0116-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Nov 17 07:32:46 MST 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0116-7; http://link.springer.com/article/10.1007/s13389-016-0116-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Moein:2016:HAA, author = "Samer Moein and Fayez Gebali and T. Aaron Gulliver", title = "Hardware attacks: an algebraic approach", journal = j-J-CRYPTO-ENG, volume = "6", number = "4", pages = "325--337", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0117-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Nov 17 07:32:46 MST 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0117-6; http://link.springer.com/article/10.1007/s13389-016-0117-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ghafar:2016:SRV, author = "Amir Hamzah Abd Ghafar and Muhammad Rezal Kamel Ariffin", title = "{SPA} on {Rabin} variant with public key {$ N = p^2 q $}", journal = j-J-CRYPTO-ENG, volume = "6", number = "4", pages = "339--346", month = nov, year = "2016", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0118-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Nov 17 07:32:46 MST 2016", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0118-5; http://link.springer.com/article/10.1007/s13389-016-0118-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Carbone:2017:MIA, author = "Mathieu Carbone and Yannick Teglia and Gilles R. Ducharme and Philippe Maurine", title = "Mutual information analysis: higher-order statistical moments, efficiency and efficacy", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "1--17", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0123-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0123-8; http://link.springer.com/article/10.1007/s13389-016-0123-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Guilley:2017:EAP, author = "Sylvain Guilley", title = "Editorial about {PROOFS 2015}", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "19--20", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0140-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0140-7; http://link.springer.com/content/pdf/10.1007/s13389-016-0140-7.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Idrissi:2017:TCM, author = "Noreddine El Janati {El Idrissi} and Guillaume Bouffard and Jean-Louis Lanet and Said {El Hajji}", title = "Trust can be misplaced", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "21--34", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0142-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0142-5; http://link.springer.com/article/10.1007/s13389-016-0142-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Nashimoto:2017:BOA, author = "Shoei Nashimoto and Naofumi Homma and Yu-ichi Hayashi and Junko Takahashi and Hitoshi Fuji and Takafumi Aoki", title = "Buffer overflow attack with multiple fault injection and a proven countermeasure", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "35--46", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0136-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0136-3; http://link.springer.com/article/10.1007/s13389-016-0136-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Robisson:2017:SSM, author = "Bruno Robisson and Michel Agoyan and Patrick Soquet and S{\'e}bastien Le-Henaff and Franck Wajsb{\"u}rt and Pirouz Bazargan-Sabet and Guillaume Phan", title = "Smart security management in secure devices", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "47--61", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0143-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0143-4; http://link.springer.com/article/10.1007/s13389-016-0143-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lugou:2017:STU, author = "Florian Lugou and Ludovic Apvrille and Aur{\'e}lien Francillon", title = "{SMASHUP}: a toolchain for unified verification of hardware\slash software co-designs", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "63--74", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0145-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0145-2; http://link.springer.com/article/10.1007/s13389-016-0145-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Azzi:2017:ULC, author = "Sabine Azzi and Bruno Barras and Maria Christofi and David Vigilant", title = "Using linear codes as a fault countermeasure for nonlinear operations: application to {AES} and formal verification", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "75--85", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0138-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0138-1; http://link.springer.com/article/10.1007/s13389-016-0138-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Sauvage:2017:MLF, author = "Laurent Sauvage and Tarik Graba and Thibault Porteboeuf", title = "Multi-level formal verification", journal = j-J-CRYPTO-ENG, volume = "7", number = "1", pages = "87--95", month = apr, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0144-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun Apr 2 17:26:33 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0144-3; http://link.springer.com/article/10.1007/s13389-016-0144-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gierlichs:2017:ICS, author = "Benedikt Gierlichs and Axel Y. Poschmann", title = "Introduction to the {CHES 2016} special issue", journal = j-J-CRYPTO-ENG, volume = "7", number = "2", pages = "97--98", month = jun, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0158-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jun 24 12:13:17 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/content/pdf/10.1007/s13389-017-0158-5.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Yarom:2017:CTA, author = "Yuval Yarom and Daniel Genkin and Nadia Heninger", title = "{CacheBleed}: a timing attack on {OpenSSL} constant-time {RSA}", journal = j-J-CRYPTO-ENG, volume = "7", number = "2", pages = "99--112", month = jun, year = "2017", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jun 24 12:13:17 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ganji:2017:HNM, author = "Fatemeh Ganji and Shahin Tajik and Fabian F{\"a}{\ss}ler and Jean-Pierre Seifert", title = "Having no mathematical model may not secure {PUFs}", journal = j-J-CRYPTO-ENG, volume = "7", number = "2", pages = "113--128", month = jun, year = "2017", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jun 24 12:13:17 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Durvaux:2017:TEL, author = "Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois-Xavier Standaert and Santos Merino {Del Pozo}", title = "Towards easy leakage certification: extended version", journal = j-J-CRYPTO-ENG, volume = "7", number = "2", pages = "129--147", month = jun, year = "2017", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jun 24 12:13:17 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Boss:2017:SBS, author = "Erik Boss and Vincent Grosso and Tim G{\"u}neysu and Gregor Leander and Amir Moradi and Tobias Schneider", title = "Strong $8$-bit {Sboxes} with efficient masking in hardware extended version", journal = j-J-CRYPTO-ENG, volume = "7", number = "2", pages = "149--165", month = jun, year = "2017", CODEN = "????", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jun 24 12:13:17 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bottinelli:2017:CAC, author = "Paul Bottinelli and Joppe W. Bos", title = "Computational aspects of correlation power analysis", journal = j-J-CRYPTO-ENG, volume = "7", number = "3", pages = "167--181", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0122-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Aug 25 11:38:26 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0122-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ordas:2017:EFI, author = "S. Ordas and L. Guillaume-Sage and P. Maurine", title = "Electromagnetic fault injection: the curse of flip-flops", journal = j-J-CRYPTO-ENG, volume = "7", number = "3", pages = "183--197", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0128-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Aug 25 11:38:26 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0128-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Swierczynski:2017:IPH, author = "Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar", title = "Interdiction in practice --- Hardware {Trojan} against a high-security {USB} flash drive", journal = j-J-CRYPTO-ENG, volume = "7", number = "3", pages = "199--211", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0132-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Aug 25 11:38:26 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0132-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Mayhew:2017:OHL, author = "Matthew Mayhew and Radu Muresan", title = "An overview of hardware-level statistical power analysis attack countermeasures", journal = j-J-CRYPTO-ENG, volume = "7", number = "3", pages = "213--244", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0133-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Aug 25 11:38:26 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0133-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Negre:2017:ERM, author = "Christophe Negre and Thomas Plantard", title = "Efficient regular modular exponentiation using multiplicative half-size splitting", journal = j-J-CRYPTO-ENG, volume = "7", number = "3", pages = "245--253", month = sep, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0134-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Aug 25 11:38:26 MDT 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0134-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Schindler:2017:GPA, author = "Werner Schindler and Andreas Wiemers", title = "Generic power attacks on {RSA} with {CRT} and exponent blinding: new results", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "255--272", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0146-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0146-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Aldaya:2017:SVB, author = "Alejandro Cabrera Aldaya and Alejandro J. Cabrera Sarmiento and Santiago S{\'a}nchez-Solano", title = "{SPA} vulnerabilities of the binary extended {Euclidean} algorithm", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "273--285", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0135-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Nov 23 09:04:19 MST 2017", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0135-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Pasalic:2017:EIG, author = "Enes Pasalic and Anupam Chattopadhyay and WeiGuo Zhang", title = "Efficient implementation of generalized {Maiorana--McFarland} class of cryptographic functions", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "287--295", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0139-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0139-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Homma:2017:IPS, author = "Naofumi Homma", title = "Introduction to the {PROOFS 2016} special section", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "297--298", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0173-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0173-6; https://link.springer.com/content/pdf/10.1007/s13389-017-0173-6.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bhattacharya:2017:FFA, author = "Sarani Bhattacharya and Debdeep Mukhopadhyay", title = "Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "299--310", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0165-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0165-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Breier:2017:SAS, author = "Jakub Breier and Dirmanto Jap and Shivam Bhasin", title = "A study on analyzing side-channel resistant encoding schemes with respect to fault attacks", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "311--320", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0166-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0166-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dugardin:2017:UME, author = "Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy", title = "Using modular extension to provably protect {Edwards} curves against fault attacks", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "321--330", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0167-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0167-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bruneau:2017:OSC, author = "Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul", title = "Optimal side-channel attacks for multivariate leakages and multiple models", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "331--341", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0170-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0170-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Picek:2017:TAV, author = "Stjepan Picek and Annelie Heuser and Sylvain Guilley", title = "Template attack versus {Bayes} classifier", journal = j-J-CRYPTO-ENG, volume = "7", number = "4", pages = "343--351", month = nov, year = "2017", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0172-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0172-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ge:2018:SMT, author = "Qian Ge and Yuval Yarom and David Cock and Gernot Heiser", title = "A survey of microarchitectural timing attacks and countermeasures on contemporary hardware", journal = j-J-CRYPTO-ENG, volume = "8", number = "1", pages = "1--27", month = apr, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0141-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0141-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chakraborti:2018:TUT, author = "Avik Chakraborti and Anupam Chattopadhyay and Muhammad Hassan and Mridul Nandi", title = "{TriviA} and {uTriviA}: two fast and secure authenticated encryption schemes", journal = j-J-CRYPTO-ENG, volume = "8", number = "1", pages = "29--48", month = apr, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0137-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0137-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chakraborty:2018:DED, author = "Debrup Chakraborty and Cuauhtemoc Mancillas L{\'o}pez and Palash Sarkar", title = "Disk encryption: do we need to preserve length?", journal = j-J-CRYPTO-ENG, volume = "8", number = "1", pages = "49--69", month = apr, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-016-0147-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-016-0147-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Saarinen:2018:ACB, author = "Markku-Juhani O. Saarinen", title = "Arithmetic coding and blinding countermeasures for lattice signatures", journal = j-J-CRYPTO-ENG, volume = "8", number = "1", pages = "71--84", month = apr, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0149-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0149-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ferradi:2018:RPN, author = "Houda Ferradi and R{\'e}mi G{\'e}raud and Diana Maimut and David Naccache and Amaury de Wargny", title = "Regulating the pace of {von Neumann} correctors", journal = j-J-CRYPTO-ENG, volume = "8", number = "1", pages = "85--91", month = apr, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0153-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0153-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Fischer:2018:ICS, author = "Wieland Fischer and Naofumi Homma", title = "Introduction to the {CHES 2017} special issue", journal = j-J-CRYPTO-ENG, volume = "8", number = "2", pages = "93--94", month = jun, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0189-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0189-6; https://link.springer.com/content/pdf/10.1007/s13389-018-0189-6.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chou:2018:MRT, author = "Tung Chou", title = "{McBits} revisited: toward a fast constant-time code-based {KEM}", journal = j-J-CRYPTO-ENG, volume = "8", number = "2", pages = "95--107", month = jun, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0186-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0186-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gross:2018:UMA, author = "Hannes Gross and Stefan Mangard", title = "A unified masking approach", journal = j-J-CRYPTO-ENG, volume = "8", number = "2", pages = "109--124", month = jun, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0184-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0184-y; https://link.springer.com/content/pdf/10.1007/s13389-018-0184-y.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Immler:2018:YRC, author = "Vincent Immler and Robert Specht and Florian Unterstein", title = "Your rails cannot hide from localized {EM}: how dual-rail logic fails on {FPGAs} --- extended version", journal = j-J-CRYPTO-ENG, volume = "8", number = "2", pages = "125--139", month = jun, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0185-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0185-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hatzivasilis:2018:RLB, author = "George Hatzivasilis and Konstantinos Fysarakis and Ioannis Papaefstathiou and Charalampos Manifavas", title = "A review of lightweight block ciphers", journal = j-J-CRYPTO-ENG, volume = "8", number = "2", pages = "141--184", month = jun, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0160-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sun May 27 08:23:24 MDT 2018", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0160-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Rodriguez-Henriquez:2018:SIH, author = "Francisco Rodr{\'\i}guez-Henr{\'\i}quez and Erkay Savas", title = "Special issue in honor of {Peter Lawrence Montgomery}", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "185--187", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0168-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0168-3; https://link.springer.com/content/pdf/10.1007/s13389-017-0168-3.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bajard:2018:MRW, author = "Jean-Claude Bajard and Julien Eynard and Nabil Merkiche", title = "{Montgomery} reduction within the context of residue number system arithmetic", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "189--200", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0154-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0154-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Savas:2018:MI, author = "Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}", title = "{Montgomery} inversion", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "201--210", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0161-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0161-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dai:2018:SAM, author = "Wangchen Dai and Ray C. C. Cheung", title = "Spectral arithmetic in {Montgomery} modular multiplication", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "211--226", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0151-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0151-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Costello:2018:MCT, author = "Craig Costello and Benjamin Smith", title = "{Montgomery} curves and their arithmetic", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "227--240", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0157-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0157-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Oliveira:2018:MLB, author = "Thomaz Oliveira and Julio L{\'o}pez and Francisco Rodr{\'{\i}}guez-Henr{\'{\i}}quez", title = "The {Montgomery} ladder on binary elliptic curves", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "241--258", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0163-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0163-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cenk:2018:KLF, author = "Murat Cenk", title = "{Karatsuba}-like formulae and their associated techniques", journal = j-J-CRYPTO-ENG, volume = "8", number = "3", pages = "259--269", month = sep, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0155-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0155-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Farias:2018:CSE, author = "Luckas A. Farias and Bruno C. Albertini and Paulo S. L. M. Barreto", title = "A class of safe and efficient binary {Edwards} curves", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "271--283", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0174-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0174-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Jarvinen:2018:ATA, author = "Kimmo J{\"a}rvinen and Sujoy Sinha Roy and Ingrid Verbauwhede", title = "Arithmetic of $ \tau $-adic expansions for lightweight {Koblitz} curve cryptography", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "285--300", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0182-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0182-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lerman:2018:TAV, author = "Liran Lerman and Romain Poussier and Olivier Markowitch and Fran{\c{c}}ois-Xavier Standaert", title = "Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "301--313", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0162-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0162-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{DeVale:2018:ADI, author = "John DeVale and Ryan Rakvic and Kevin Rudd", title = "Another dimension in integrated circuit trust", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "315--326", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0164-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0164-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Karmakar:2018:SBS, author = "Sandip Karmakar and Dipanwita Roy Chowdhury", title = "Scan-based side channel attack on stream ciphers and its prevention", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "327--340", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0178-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0178-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Skoric:2018:TDS, author = "Boris Skori{\'c}", title = "A trivial debiasing scheme for {Helper Data Systems}", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "341--349", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0183-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0183-z; https://link.springer.com/content/pdf/10.1007/s13389-018-0183-z.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dosso:2018:EAC, author = "Yssouf Dosso and Fabien Herbaut and Nicolas M{\'e}loni and Pascal V{\'e}ron", title = "{Euclidean} addition chains scalar multiplication on curves with efficient endomorphism", journal = j-J-CRYPTO-ENG, volume = "8", number = "4", pages = "351--367", month = nov, year = "2018", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0190-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:50 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0190-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hutchinson:2019:CMD, author = "Aaron Hutchinson and Koray Karabina", title = "Constructing multidimensional differential addition chains and their applications", journal = j-J-CRYPTO-ENG, volume = "9", number = "1", pages = "1--19", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0177-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0177-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Batina:2019:OTA, author = "Lejla Batina and {\L}ukasz Chmielewski and Louiza Papachristodoulou and Peter Schwabe and Michael Tunstall", title = "Online template attacks", journal = j-J-CRYPTO-ENG, volume = "9", number = "1", pages = "21--36", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0171-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0171-8; https://link.springer.com/content/pdf/10.1007/s13389-017-0171-8.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Diop:2019:TPH, author = "Ibrahima Diop and Yanis Linge and Thomas Ordas and Pierre-Yvan Liardet and Philippe Maurine", title = "From theory to practice: horizontal attacks on protected implementations of modular exponentiations", journal = j-J-CRYPTO-ENG, volume = "9", number = "1", pages = "37--52", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0181-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0181-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Saha:2019:IDF, author = "Dhiman Saha and Dipanwita Roy Chowdhury", title = "Internal differential fault analysis of parallelizable ciphers in the counter-mode", journal = j-J-CRYPTO-ENG, volume = "9", number = "1", pages = "53--67", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0179-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0179-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Banik:2019:CCC, author = "Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni", title = "Compact circuits for combined {AES} encryption\slash decryption", journal = j-J-CRYPTO-ENG, volume = "9", number = "1", pages = "69--83", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0176-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0176-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Konheim:2019:HFI, author = "Alan G. Konheim", title = "{Horst Feistel}: the inventor of {LUCIFER}, the cryptographic algorithm that changed cryptology", journal = j-J-CRYPTO-ENG, volume = "9", number = "1", pages = "85--100", month = apr, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0198-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0198-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ueno:2019:HEG, author = "Rei Ueno and Naofumi Homma and Yasuyuki Nogami and Takafumi Aoki", title = "Highly efficient {$ \textit {GF}(2^8) $} inversion circuit based on hybrid {GF} representations", journal = j-J-CRYPTO-ENG, volume = "9", number = "2", pages = "101--113", month = jun, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0187-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0187-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Robert:2019:EFB, author = "Jean-Marc Robert and Christophe Negre and Thomas Plantard", title = "Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding", journal = j-J-CRYPTO-ENG, volume = "9", number = "2", pages = "115--136", month = jun, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0196-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0196-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Unterluggauer:2019:MME, author = "Thomas Unterluggauer and Mario Werner and Stefan Mangard", title = "{MEAS}: memory encryption and authentication secure against side-channel attacks", journal = j-J-CRYPTO-ENG, volume = "9", number = "2", pages = "137--158", month = jun, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0180-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0180-2; https://link.springer.com/content/pdf/10.1007/s13389-018-0180-2.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Peccerillo:2019:PBA, author = "Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin Kaya Ko{\c{c}}", title = "Parallel bitsliced {AES} through {PHAST}: a single-source high-performance library for multi-cores and {GPUs}", journal = j-J-CRYPTO-ENG, volume = "9", number = "2", pages = "159--171", month = jun, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-017-0175-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-017-0175-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hutter:2019:CTH, author = "Michael Hutter and Michael Tunstall", title = "Constant-time higher-order {Boolean}-to-arithmetic masking", journal = j-J-CRYPTO-ENG, volume = "9", number = "2", pages = "173--184", month = jun, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0191-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0191-z", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Herbert:2019:DIL, author = "Vincent Herbert and Bhaskar Biswas and Caroline Fontaine", title = "Design and implementation of low-depth pairing-based homomorphic encryption scheme", journal = j-J-CRYPTO-ENG, volume = "9", number = "2", pages = "185--201", month = jun, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0192-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:51 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0192-y", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Saha:2019:AFE, author = "Sayandeep Saha and Ujjawal Kumar and Debdeep Mukhopadhyay and Pallab Dasgupta", title = "An automated framework for exploitable fault identification in block ciphers", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "203--219", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00203-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00203-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Wisiol:2019:WAL, author = "Nils Wisiol and Marian Margraf", title = "Why attackers lose: design and security analysis of arbitrarily large {XOR} arbiter {PUFs}", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "221--230", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00204-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00204-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{BenElOuahma:2019:SCR, author = "In{\`e}s {Ben El Ouahma} and Quentin L. Meunier and Karine Heydemann and Emmanuelle Encrenaz", title = "Side-channel robustness analysis of masked assembly codes using a symbolic approach", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "231--242", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00205-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00205-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Baumann:2019:VSL, author = "Christoph Baumann and Oliver Schwarz and Mads Dam", title = "On the verification of system-level information flow properties for virtualized execution platforms", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "243--261", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00216-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00216-4; https://link.springer.com/content/pdf/10.1007/s13389-019-00216-4.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Das:2019:AGH, author = "Poulami Das and Debapriya Basu Roy and Debdeep Mukhopadhyay", title = "Automatic generation of {HCCA}-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "263--275", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00219-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00219-1", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Geraud:2019:MRN, author = "R{\'e}mi G{\'e}raud and David Naccache", title = "Mixed-radix {Naccache--Stern} encryption", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "277--282", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0188-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0188-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dinu:2019:TLB, author = "Daniel Dinu and Yann {Le Corre} and Dmitry Khovratovich and L{\'e}o Perrin and Johann Gro{\ss}sch{\"a}dl and Alex Biryukov", title = "Triathlon of lightweight block ciphers for the {Internet of Things}", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "283--302", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0193-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0193-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Carlet:2019:PDS, author = "Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'e}dric Tavernier", title = "Polynomial direct sum masking to protect against both {SCA} and {FIA}", journal = j-J-CRYPTO-ENG, volume = "9", number = "3", pages = "303--312", month = sep, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0194-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Oct 2 11:24:52 MDT 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0194-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kawamura:2019:RMR, author = "Shinichi Kawamura and Yuichi Komano and Hideo Shimizu and Tomoko Yonemura", title = "{RNS} {Montgomery} reduction algorithms using quadratic residuosity", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "313--331", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0195-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0195-8; https://link.springer.com/content/pdf/10.1007/s13389-018-0195-8.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Saldamli:2019:UMM, author = "Gokay Saldamli and Yoo-Jin Baek", title = "Uniform {Montgomery} multiplier", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "333--339", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00213-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00213-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Drucker:2019:TSO, author = "Nir Drucker and Shay Gueron", title = "A toolbox for software optimization of {QC--MDPC} code-based cryptosystems", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "341--357", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-00200-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-00200-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Banegas:2019:NCI, author = "Gustavo Banegas and Ricardo Cust{\'o}dio and Daniel Panario", title = "A new class of irreducible pentanomials for polynomial-based multipliers in binary fields", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "359--373", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-0197-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-0197-6; https://link.springer.com/content/pdf/10.1007/s13389-018-0197-6.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cianfriglia:2019:KAR, author = "Marco Cianfriglia and Stefano Guarino and Massimo Bernaschi and Flavio Lombardi and Marco Pedicini", title = "Kite attack: reshaping the cube attack for a flexible {GPU}-based maxterm search", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "375--392", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00217-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00217-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Levina:2019:PMS, author = "Alla Levina and Roman Mostovoi and Daria Sleptsova and Lavrentii Tcvetkov", title = "Physical model of sensitive data leakage from {PC}-based cryptographic systems", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "393--400", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00215-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00215-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Wu:2019:FUE, author = "Tao Wu and Ruomei Wang", title = "Fast unified elliptic curve point multiplication for {NIST} prime curves on {FPGAs}", journal = j-J-CRYPTO-ENG, volume = "9", number = "4", pages = "401--410", month = nov, year = "2019", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00211-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Nov 30 08:02:44 MST 2019", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00211-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389w", } @Article{Jauvart:2020:ISC, author = "Damien Jauvart and Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin", title = "Improving side-channel attacks against pairing-based cryptography", journal = j-J-CRYPTO-ENG, volume = "10", number = "1", pages = "1--16", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-00201-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 8 10:09:54 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-00201-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Barthe:2020:IPM, author = "Gilles Barthe and Sonia Bela{\"\i}d and Fran{\c{c}}ois Dupressoir and Pierre-Alain Fouque and Benjamin Gr{\'e}goire and Fran{\c{c}}ois-Xavier Standaert and Pierre-Yves Strub", title = "Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations", journal = j-J-CRYPTO-ENG, volume = "10", number = "1", pages = "17--26", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-018-00202-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 8 10:09:54 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-018-00202-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Abarzua:2020:SVA, author = "Rodrigo Abarz{\'u}a and Santi Mart{\'\i}nez and Valeria Mendoza and Nicolas Th{\'e}riault", title = "Same value analysis on {Edwards} curves", journal = j-J-CRYPTO-ENG, volume = "10", number = "1", pages = "27--48", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00206-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 8 10:09:54 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00206-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Goubin:2020:HRS, author = "Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang", title = "How to reveal the secrets of an obscure white-box implementation", journal = j-J-CRYPTO-ENG, volume = "10", number = "1", pages = "49--66", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00207-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 8 10:09:54 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00207-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Willers:2020:FDC, author = "Oliver Willers and Christopher Huth and Jorge Guajardo and Helmut Seidel and Peter Deutsch", title = "On the feasibility of deriving cryptographic keys from {MEMS} sensors", journal = j-J-CRYPTO-ENG, volume = "10", number = "1", pages = "67--83", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00208-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 8 10:09:54 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00208-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Zhou:2020:DLM, author = "Yuanyuan Zhou and Fran{\c{c}}ois-Xavier Standaert", title = "Deep learning mitigates but does not annihilate the need of aligned traces and a generalized {ResNet} model for side-channel attacks", journal = j-J-CRYPTO-ENG, volume = "10", number = "1", pages = "85--95", month = apr, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00209-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 8 10:09:54 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00209-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bos:2020:FMA, author = "Joppe W. Bos and Simon J. Friedberger", title = "Faster modular arithmetic for isogeny-based crypto on embedded devices", journal = j-J-CRYPTO-ENG, volume = "10", number = "2", pages = "97--109", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00214-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jul 25 08:32:22 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00214-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Didier:2020:EMO, author = "Laurent-St{\'e}phane Didier and Fangan-Yssouf Dosso and Pascal V{\'e}ron", title = "Efficient modular operations using the adapted modular number system", journal = j-J-CRYPTO-ENG, volume = "10", number = "2", pages = "111--133", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00221-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jul 25 08:32:22 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00221-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hettwer:2020:AML, author = "Benjamin Hettwer and Stefan Gehrer and Tim G{\"u}neysu", title = "Applications of machine learning techniques in side-channel attacks: a survey", journal = j-J-CRYPTO-ENG, volume = "10", number = "2", pages = "135--162", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00212-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jul 25 08:32:22 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00212-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Benadjila:2020:DLS, author = "Ryad Benadjila and Emmanuel Prouff and R{\'e}mi Strullu and Eleonora Cagli and C{\'e}cile Dumas", title = "Deep learning for side-channel analysis and introduction to {ASCAD} database", journal = j-J-CRYPTO-ENG, volume = "10", number = "2", pages = "163--188", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00220-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jul 25 08:32:22 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00220-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Orumiehchiha:2020:DFA, author = "Mohammad Ali Orumiehchiha and Saeed Rostami and Elham Shakour and Josef Pieprzyk", title = "A differential fault attack on the {WG} family of stream ciphers", journal = j-J-CRYPTO-ENG, volume = "10", number = "2", pages = "189--195", month = jun, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00222-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Jul 25 08:32:22 MDT 2020", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00222-x", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Piccoli:2020:PMB, author = "Alessandro {De Piccoli} and Andrea Visconti and Ottavio Giulio Rizzo", title = "Polynomial multiplication over binary finite fields: new upper bounds", journal = j-J-CRYPTO-ENG, volume = "10", number = "3", pages = "197--210", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00210-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00210-w", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cruz:2020:ESS, author = "Rafael J. Cruz and Antonio Guimar{\~a}es and Diego F. Aranha", title = "Efficient and secure software implementations of {Fantomas}", journal = j-J-CRYPTO-ENG, volume = "10", number = "3", pages = "211--228", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-019-00218-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-019-00218-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hiller:2020:REC, author = "Matthias Hiller and Ludwig K{\"u}rzinger and Georg Sigl", title = "Review of error correction for {PUFs} and evaluation on state-of-the-art {FPGAs}", journal = j-J-CRYPTO-ENG, volume = "10", number = "3", pages = "229--247", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00223-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00223-w; https://link.springer.com/content/pdf/10.1007/s13389-020-00223-w.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Schoinianakis:2020:RAS, author = "Dimitrios Schoinianakis", title = "Residue arithmetic systems in cryptography: a survey on modern security applications", journal = j-J-CRYPTO-ENG, volume = "10", number = "3", pages = "249--267", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00231-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00231-w", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Wiemers:2020:RSR, author = "Andreas Wiemers", title = "A remark on a success rate model for side-channel attack analysis", journal = j-J-CRYPTO-ENG, volume = "10", number = "3", pages = "269--274", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00235-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00235-6; https://link.springer.com/content/pdf/10.1007/s13389-020-00235-6.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Richter:2020:TAN, author = "Bastian Richter and Amir Moradi", title = "Template attacks on nano-scale {CMOS} devices", journal = j-J-CRYPTO-ENG, volume = "10", number = "3", pages = "275--285", month = sep, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00225-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:04 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00225-8; https://link.springer.com/content/pdf/10.1007/s13389-020-00225-8.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Batina:2020:PE, author = "Lejla Batina and Nele Mentens", title = "{PROOFS} 2018 Editorial", journal = j-J-CRYPTO-ENG, volume = "10", number = "4", pages = "287--287", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00248-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00248-1; https://link.springer.com/content/pdf/10.1007/s13389-020-00248-1.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Alam:2020:IAH, author = "Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen Kadiyala and Siew-Kei Lam and Thambipillai Srikanthan", title = "Improving accuracy of {HPC}-based malware classification for embedded platforms using gradient descent optimization", journal = j-J-CRYPTO-ENG, volume = "10", number = "4", pages = "289--303", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00232-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00232-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Sijacic:2020:TEA, author = "Danilo Sijaci{\'c} and Josep Balasch and Bohan Yang and Santosh Ghosh and Ingrid Verbauwhede", title = "Towards efficient and automated side-channel evaluations at design time", journal = j-J-CRYPTO-ENG, volume = "10", number = "4", pages = "305--319", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00233-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00233-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gay:2020:ECS, author = "Mael Gay and Batya Karp and Osnat Keren and Ilia Polian", title = "Error control scheme for malicious and natural faults in cryptographic modules", journal = j-J-CRYPTO-ENG, volume = "10", number = "4", pages = "321--336", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00234-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00234-7; https://link.springer.com/content/pdf/10.1007/s13389-020-00234-7.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ouladj:2020:PTA, author = "Maamar Ouladj and Nadia {El Mrabet} and Sylvain Guilley and Philippe Guillot and Gilles Mill{\'e}rioux", title = "On the power of template attacks in highly multivariate context", journal = j-J-CRYPTO-ENG, volume = "10", number = "4", pages = "337--354", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00239-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00239-2", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Baksi:2020:IIC, author = "Anubhab Baksi and Dhiman Saha and Sumanta Sarkar", title = "To infect or not to infect: a critical analysis of infective countermeasures in fault attacks", journal = j-J-CRYPTO-ENG, volume = "10", number = "4", pages = "355--374", month = nov, year = "2020", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00224-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00224-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Yeo:2021:IAA, author = "Sze Ling Yeo and Duc-Phong Le and Khoongming Khoo", title = "Improved algebraic attacks on lightweight block ciphers", journal = j-J-CRYPTO-ENG, volume = "11", number = "1", pages = "1--19", month = apr, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00237-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00237-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Resende:2021:FUP, author = "Amanda Cristina Davi Resende and Diego de Freitas Aranha", title = "Faster unbalanced {Private Set Intersection} in the semi-honest setting", journal = j-J-CRYPTO-ENG, volume = "11", number = "1", pages = "21--38", month = apr, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00242-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00242-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bronchain:2021:RRT, author = "Olivier Bronchain and Tobias Schneider and Fran{\c{c}}ois-Xavier Standaert", title = "Reducing risks through simplicity: high side-channel security for lazy engineers", journal = j-J-CRYPTO-ENG, volume = "11", number = "1", pages = "39--55", month = apr, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00241-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00241-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Pereira:2021:OPA, author = "Geovandro Pereira and Javad Doliskani and David Jao", title = "$x$-only point addition formula and faster compressed {SIKE}", journal = j-J-CRYPTO-ENG, volume = "11", number = "1", pages = "57--69", month = apr, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00245-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00245-4", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Abarzua:2021:SPS, author = "Rodrigo Abarz{\'u}a and Claudio Valencia and Julio L{\'o}pez", title = "Survey on performance and security problems of countermeasures for passive side-channel attacks on {ECC}", journal = j-J-CRYPTO-ENG, volume = "11", number = "1", pages = "71--102", month = apr, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00257-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri May 7 08:20:05 MDT 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00257-8", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Heydemann:2021:EAP, author = "Karine Heydemann and Letitia Li", title = "Editorial about {PROOFS 2019}", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "103--104", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00236-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", note = "See correction \cite{Heydemann:2021:CEA}.", URL = "http://link.springer.com/article/10.1007/s13389-020-00236-5; https://link.springer.com/content/pdf/10.1007/s13389-020-00236-5.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ganji:2021:RPC, author = "Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean-Pierre Seifert and Mark Tehranipoor and Domenic Forte", title = "Rock'n'roll {PUFs}: crafting provably secure {PUFs} from less secure ones (extended version)", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "105--118", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00226-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00226-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Cheng:2021:DFI, author = "Wei Cheng and Claude Carlet and Kouassi Goli and Jean-Luc Danger and Sylvain Guilley", title = "Detecting faults in inner product masking scheme", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "119--133", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00227-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00227-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Perianin:2021:EEA, author = "Thomas Perianin and Sebastien Carr{\'e} and Victor Dyseryn and Adrien Facon and Sylvain Guilley", title = "End-to-end automated cache-timing attack driven by machine learning", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "135--146", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00228-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00228-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Keren:2021:IRC, author = "Osnat Keren and Ilia Polian", title = "{IPM-RED}: combining higher-order masking with robust error detection", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "147--160", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00229-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00229-4; https://link.springer.com/content/pdf/10.1007/s13389-020-00229-4.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ueno:2021:MCS, author = "Rei Ueno and Junko Takahashi and Yu-ichi Hayashi and Naofumi Homma", title = "A method for constructing sliding windows leak from noisy cache timing information", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "161--170", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00230-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00230-x; https://link.springer.com/content/pdf/10.1007/s13389-020-00230-x.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kamel:2021:SCA, author = "Dina Kamel and Davide Bellizia and Olivier Bronchain and Fran{\c{c}}ois-Xavier Standaert", title = "Side-channel analysis of a learning parity with physical noise processor", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "171--179", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00238-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00238-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Jacobson:2021:RWK, author = "Michael John {Jacobson, Jr.} and Prabhat Kushwaha", title = "Removable weak keys for discrete logarithm-based cryptography", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "181--195", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00250-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00250-7", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Heydemann:2021:CEA, author = "Karine Heydemann and Letitia Li", title = "Correction to: {Editorial} about {PROOFS 2019}", journal = j-J-CRYPTO-ENG, volume = "11", number = "2", pages = "197--197", month = jun, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00266-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", note = "See \cite{Heydemann:2021:EAP}.", URL = "http://link.springer.com/article/10.1007/s13389-021-00266-7; https://link.springer.com/content/pdf/10.1007/s13389-021-00266-7.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chang:2021:ASI, author = "Chip-Hong Chang and Daniel E. Holcomb and Ulrich R{\"u}hrmair and Patrick Schaumont", title = "The {ASHES 2019} special issue at {JCEN}", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "199--200", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00270-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00270-x; https://link.springer.com/content/pdf/10.1007/s13389-021-00270-x.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Shiozaki:2021:SEA, author = "Mitsuru Shiozaki and Takeshi Fujino", title = "Simple electromagnetic analysis attack based on geometric leak on {ASIC} implementation of ring-oscillator {PUF}", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "201--212", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00240-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00240-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Zhang:2021:NTG, author = "Yuqiao Zhang and Ayush Jain and Pinchen Cui and Ziqi Zhou and Ujjwal Guin", title = "A novel topology-guided attack and its countermeasure towards secure logic locking", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "213--226", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00243-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00243-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gu:2021:LSC, author = "Chongyan Gu and Chip-Hong Chang and Weiqiang Liu and Neil Hanley and Jack Miskelly and M{\'a}ire O'Neill", title = "A large-scale comprehensive evaluation of single-slice ring oscillator and {PicoPUF} bit cells on 28-nm {Xilinx FPGAs}", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "227--238", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00244-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00244-5; https://link.springer.com/content/pdf/10.1007/s13389-020-00244-5.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", keywords = "physically unclonable functions (PUFs)", } @Article{Bandara:2021:ACD, author = "Sahan Bandara and Michel A. Kinsy", title = "Adaptive caches as a defense mechanism against cache side-channel attacks", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "239--255", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00246-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00246-3", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Unterstein:2021:SSU, author = "Florian Unterstein and Nisha Jacob and Neil Hanley and Chongyan Gu and Johann Heyszl", title = "{SCA} secure and updatable crypto engines for {FPGA SoC} bitstream decryption: extended version", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "257--272", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00247-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00247-2; https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ramezanpour:2021:FIM, author = "Keyvan Ramezanpour and Paul Ampadu and William Diehl", title = "Fault intensity map analysis with neural network key distinguisher", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "273--288", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00249-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00249-0", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Nashimoto:2021:LCD, author = "Shoei Nashimoto and Daisuke Suzuki and Noriyuki Miura and Tatsuya Machida and Kohei Matsuda and Makoto Nagata", title = "Low-cost distance-spoofing attack on {FMCW} radar and its feasibility study on countermeasure", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "289--298", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00252-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00252-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Azriel:2021:SAM, author = "Leonid Azriel and Julian Speith and Nils Albartus and Ran Ginosar and Avi Mendelson and Christof Paar", title = "A survey of algorithmic methods in {IC} reverse engineering", journal = j-J-CRYPTO-ENG, volume = "11", number = "3", pages = "299--315", month = sep, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00268-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:55 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00268-5", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Howe:2021:EPI, author = "James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni", title = "Exploring Parallelism to Improve the Performance of {FrodoKEM} in Hardware", journal = j-J-CRYPTO-ENG, volume = "11", number = "4", pages = "317--327", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00258-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00258-7; https://link.springer.com/content/pdf/10.1007/s13389-021-00258-7.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Perin:2021:ICS, author = "Lucas Pandolfo Perin and Gustavo Zambonin and Ricardo Cust{\'o}dio and Lucia Moura and Daniel Panario", title = "Improved constant-sum encodings for hash-based signatures", journal = j-J-CRYPTO-ENG, volume = "11", number = "4", pages = "329--351", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00264-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00264-9", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Trouchkine:2021:EFI, author = "Thomas Trouchkine and S{\'e}banjila Kevin Bukasa and Mathieu Escouteloup and Ronan Lashermes and Guillaume Bouffard", title = "Electromagnetic fault injection against a complex {CPU}, toward new micro-architectural fault models", journal = j-J-CRYPTO-ENG, volume = "11", number = "4", pages = "353--367", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00259-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00259-6", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Mittmann:2021:TAL, author = "Johannes Mittmann and Werner Schindler", title = "Timing attacks and local timing attacks against {Barrett}'s modular multiplication algorithm", journal = j-J-CRYPTO-ENG, volume = "11", number = "4", pages = "369--397", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00254-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-020-00254-3; https://link.springer.com/content/pdf/10.1007/s13389-020-00254-3.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bajard:2021:MFP, author = "Jean Claude Bajard and Sylvain Duquesne", title = "{Montgomery}-friendly primes and applications to cryptography", journal = j-J-CRYPTO-ENG, volume = "11", number = "4", pages = "399--415", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00260-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00260-z", abstract = "This paper deals with Montgomery-friendly primes designed for the modular reduction algorithm of Montgomery. These numbers are scattered in the literature and their properties are partially exploited. We exhibit a large family of Montgomery-friendly primes which give rise to efficient modular reduction algorithms. We develop two main outcomes. The first one is dedicated directly to cryptography, in particular for isogeny-based approaches and more generally to elliptic curves cryptography (ECC). We suggest more appropriate finite fields and curves in terms of complexity for the recommended security levels, for both isogeny-based cryptography and ECC. The second issue is mainly arithmetic (even if its main use is cryptography), and we propose families of alternative RNS bases. We show that, for dedicated architectures with word operators, we can reach, for a same or better complexity, larger RNS bases with Montgomery-friendly pairwise co-primes than the RNS bases generally used in the literature with pseudo-Mersenne numbers.", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lombardia:2021:SSL, author = "Sergio Rold{\'a}n Lombard{\'\i}a and Fatih Balli and Subhadeep Banik", title = "Six shades lighter: a bit-serial implementation of the {AES} family", journal = j-J-CRYPTO-ENG, volume = "11", number = "4", pages = "417--439", month = nov, year = "2021", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00265-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Wed Feb 2 10:55:56 MST 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "http://link.springer.com/article/10.1007/s13389-021-00265-8; https://link.springer.com/content/pdf/10.1007/s13389-021-00265-8.pdf", acknowledgement = ack-nhfb, fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Molteni:2022:RCR, author = "Maria Chiara Molteni and Vittorio Zaccaria", title = "A relation calculus for reasoning about $t$-probing security", journal = j-J-CRYPTO-ENG, volume = "12", number = "1", pages = "1--14", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00286-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Apr 16 13:18:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00286-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bozilov:2022:OTI, author = "Dusan Bozilov and Miroslav Knezevi{\'c} and Ventzislav Nikov", title = "Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications", journal = j-J-CRYPTO-ENG, volume = "12", number = "1", pages = "15--51", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00276-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Apr 16 13:18:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00276-5", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Caforio:2022:MSV, author = "Andrea Caforio and Fatih Balli and Subhadeep Banik", title = "Melting {SNOW-V}: improved lightweight architectures", journal = j-J-CRYPTO-ENG, volume = "12", number = "1", pages = "53--73", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00251-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Apr 16 13:18:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-020-00251-6", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ouladj:2022:SAP, author = "Maamar Ouladj and Sylvain Guilley and Farid Mokrane", title = "Spectral approach to process the (multivariate) high-order template attack against any masking scheme", journal = j-J-CRYPTO-ENG, volume = "12", number = "1", pages = "75--93", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-020-00253-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Apr 16 13:18:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-020-00253-4", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Buhrow:2022:PMM, author = "Benjamin Buhrow and Barry Gilbert and Clifton Haider", title = "Parallel modular multiplication using 512-bit advanced vector instructions", journal = j-J-CRYPTO-ENG, volume = "12", number = "1", pages = "95--105", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00256-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Apr 16 13:18:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib; https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00256-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Nath:2022:SET, author = "Kaushik Nath and Palash Sarkar", title = "Security and efficiency trade-offs for elliptic curve {Diffie--Hellman} at the 128-bit and 224-bit security levels", journal = j-J-CRYPTO-ENG, volume = "12", number = "1", pages = "107--121", month = apr, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00261-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Sat Apr 16 13:18:32 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00261-y", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Brunetta:2022:MCD, author = "Carlo Brunetta and Pablo Picazo-Sanchez", title = "Modelling cryptographic distinguishers using machine learning", journal = j-J-CRYPTO-ENG, volume = "12", number = "2", pages = "123--135", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00262-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 3 10:37:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00262-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Winderickx:2022:DEA, author = "Jori Winderickx and An Braeken and Nele Mentens", title = "In-depth energy analysis of security algorithms and protocols for the {Internet of Things}", journal = j-J-CRYPTO-ENG, volume = "12", number = "2", pages = "137--149", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00274-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 3 10:37:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00274-7", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{David:2022:REB, author = "Liron David and Avishai Wool", title = "Rank estimation with bounded error via exponential sampling", journal = j-J-CRYPTO-ENG, volume = "12", number = "2", pages = "151--168", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00269-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 3 10:37:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00269-4", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Le:2022:IFA, author = "Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani", title = "Improved fault analysis on {SIMECK} ciphers", journal = j-J-CRYPTO-ENG, volume = "12", number = "2", pages = "169--180", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00263-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 3 10:37:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00263-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gross:2022:BTM, author = "Mathieu Gross and Nisha Jacob and Georg Sigl", title = "Breaking {TrustZone} memory isolation and secure boot through malicious hardware on a modern {FPGA-SoC}", journal = j-J-CRYPTO-ENG, volume = "12", number = "2", pages = "181--196", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00273-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 3 10:37:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00273-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Liu:2022:CTA, author = "Fanghui Liu and Waldemar Cruz and Laurent Michel", title = "A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming", journal = j-J-CRYPTO-ENG, volume = "12", number = "2", pages = "197--228", month = jun, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00280-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 3 10:37:26 MDT 2022", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00280-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Engels:2022:CVR, author = "Susanne Engels and Max Hoffmann and Christof Paar", title = "A critical view on the real-world security of logic locking", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "229--244", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00294-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00294-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Dutertre:2022:PPF, author = "Jean-Max Dutertre and Amir-Pasha Mirbaha and David Naccache and Assia Tria", title = "Photonic power firewalls", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "245--254", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00291-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00291-0", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{DiMauro:2022:DIN, author = "Juan {Di Mauro} and Eduardo Salazar and Hugo D. Scolnik", title = "Design and implementation of a novel cryptographically secure pseudorandom number generator", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "255--265", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00297-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00297-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chowdhury:2022:PSP, author = "Sreeja Chowdhury and Ana Covic and Rabin Yu Acharya and Spencer Dupee and Fatemeh Ganji and Domenic Forte", title = "Physical security in the post-quantum era", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "267--303", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00255-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00255-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Mandal:2022:SNM, author = "Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo", title = "{Sycon}: a new milestone in designing {ASCON}-like permutations", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "305--327", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00272-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00272-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Yeniaras:2022:FCT, author = "Esra Yeniaras and Murat Cenk", title = "Faster characteristic three polynomial multiplication and its application to {NTRU} Prime decapsulation", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "329--348", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00282-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00282-7", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chavez-Saab:2022:SCS, author = "Jorge Ch{\'a}vez-Saab and Jes{\'u}s-Javier Chi-Dom{\'{\i}}nguez and Samuel Jaques and Francisco Rodr{\'{\i}}guez-Henr{\'{\i}}quez", title = "The {SQALE} of {CSIDH}: sublinear {V{\'e}lu} quantum-resistant isogeny action with low exponents", journal = j-J-CRYPTO-ENG, volume = "12", number = "3", pages = "349--368", month = sep, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00271-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00271-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chang:2022:ASI, author = "Chip-Hong Chang and Stefan Katzenbeisser and Ulrich R{\"u}hrmair and Patrick Schaumont", title = "The {ASHES 2020} special issue at {JCEN}", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "369--370", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00300-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00300-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Saarinen:2022:DRV, author = "Markku-Juhani O. Saarinen and G. Richard Newell and Ben Marshall", title = "Development of the {RISC-V} entropy source interface", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "371--386", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00275-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/linux.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib; https://www.math.utah.edu/pub/tex/bib/risc-v.bib; https://www.math.utah.edu/pub/tex/bib/unix.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00275-6", abstract = "The RISC-V true random number generator (TRNG) architecture breaks with previous ISA TRNG practice by splitting the entropy source (ES) component away from cryptographic DRBGs into a separate privileged interface, and in its use of polling. The modular approach is suitable for the RISC-V hardware IP ecosystem, allows a significantly smaller implementation footprint on platforms that need it, while directly supporting current standards compliance testing methods. We describe the interface, its use in cryptography, and offer additional discussion, background, and rationale for various aspects of it. The design was informed by lessons learned from earlier mainstream ISAs, recently introduced SP 800-90B and FIPS 140-3 entropy audit requirements, AIS 31 and common criteria, current and emerging cryptographic needs such as post-quantum cryptography, and the goal of supporting a wide variety of RISC-V implementations and applications. Many of the architectural choices result from quantitative observations about random number generators in secure microcontrollers, the Linux kernel, and cryptographic libraries.", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ruhrmair:2022:SFS, author = "Ulrich R{\"u}hrmair", title = "Secret-free security: a survey and tutorial", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "387--412", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00283-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00283-6", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Jin:2022:PAC, author = "Chenglu Jin and Wayne Burleson and Marten van Dijk and Ulrich R{\"u}hrmair", title = "Programmable access-controlled and generic erasable {PUF} design and its applications", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "413--432", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00284-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00284-z", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Jana:2022:DFA, author = "Amit Jana and Anirban Nath and Goutam Paul and Dhiman Saha", title = "Differential fault analysis of {NORX} using variants of coupon collector problem", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "433--459", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00285-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00285-y", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Fustos:2022:FLS, author = "Jacob Fustos and Michael Bechtel and Heechul Yun", title = "A framework for leaking secrets to past instructions", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "461--473", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00289-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00289-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kundu:2022:FAP, author = "Anup Kumar Kundu and Aikata and Banashri Karmakar and Dhiman Saha", title = "Fault analysis of the {PRINCE} family of lightweight ciphers", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "475--494", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00290-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00290-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Mukherjee:2022:CSP, author = "Rijoy Mukherjee and Sree Ranjani Rajendran and Rajat Subhra Chakraborty", title = "A comprehensive survey of physical and logic testing techniques for {Hardware Trojan} detection and prevention", journal = j-J-CRYPTO-ENG, volume = "12", number = "4", pages = "495--522", month = nov, year = "2022", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00295-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:09 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00295-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Wiemers:2023:IRS, author = "Andreas Wiemers and Johannes Mittmann", title = "Improving recent side-channel attacks against the {DES} key schedule", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "1--17", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00279-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00279-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cicek:2023:NRW, author = "Ihsan Cicek and Ahmad {Al Khas}", title = "A new read-write collision-based {SRAM PUF} implemented on {Xilinx FPGAs}", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "19--36", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00281-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00281-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Robert:2023:FMM, author = "Jean-Marc Robert and Pascal V{\'e}ron", title = "Faster multiplication over {$ \mathbb {F}_2 [X] $} using {AVX512} instruction set and {VPCLMULQDQ} instruction", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "37--55", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-021-00278-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-021-00278-3", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Attias:2023:RMM, author = "Vidal Attias and Luigi Vigneri and Vassil Dimitrov", title = "Rethinking modular multi-exponentiation in real-world applications", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "57--70", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00287-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00287-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Giron:2023:PQH, author = "Alexandre Augusto Giron and Ricardo Cust{\'o}dio and Francisco Rodr{\'\i}guez-Henr{\'\i}quez", title = "Post-quantum hybrid key exchange: a systematic mapping study", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "71--88", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00288-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00288-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Adj:2023:KBS, author = "Gora Adj and Jes{\'u}s-Javier Chi-Dom{\'\i}nguez and Francisco Rodr{\'\i}guez-Henr{\'\i}quez", title = "{Karatsuba}-based square-root {V{\'e}lu}'s formulas applied to two isogeny-based protocols", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "89--106", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00293-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00293-y", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Nadikuda:2023:LAT, author = "Pradeep Kumar Goud Nadikuda and Lakshmi Boppana", title = "Low area-time complexity point multiplication architecture for {ECC} over {$ {\rm GF}(2^m) $} using polynomial basis", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "107--123", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00302-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00302-0", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Koshelev:2023:SMT, author = "Dmitrii Koshelev", title = "Subgroup membership testing on elliptic curves via the {Tate} pairing", journal = j-J-CRYPTO-ENG, volume = "13", number = "1", pages = "125--128", month = apr, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00296-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", note = "See correction \cite{Koshelev:2024:CSM}.", URL = "https://link.springer.com/article/10.1007/s13389-022-00296-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Masure:2023:SCA, author = "Lo{\"\i}c Masure and R{\'e}mi Strullu", title = "Side-channel analysis against {ANSSI}'s protected {AES} implementation on {ARM}: end-to-end attacks with multi-task learning", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "129--147", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00311-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00311-7", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Werner:2023:EEA, author = "Vincent Werner and Laurent Maingault and Marie-Laure Potet", title = "An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "149--165", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00292-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00292-z", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Peng:2023:SNP, author = "Bo-Yuan Peng and Adrian Marotzke and Ming-Han Tsai and Bo-Yin Yang and Ho-Lin Chen", title = "Streamlined {NTRU} Prime on {FPGA}", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "167--186", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00303-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00303-z", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Debnath:2023:MIM, author = "Sumit Kumar Debnath and Sihem Mesnager and Vikas Srivastava and Saibal Kumar Pal and Nibedita Kundu", title = "{Mul-IBS}: a multivariate identity-based signature scheme compatible with {IoT}-based {NDN} architecture", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "187--199", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00308-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00308-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Joshi:2023:SSP, author = "Priyanka Joshi and Bodhisatwa Mazumdar", title = "{SPSA}: Semi-Permanent Stuck-At fault analysis of {AES Rijndael SBox}", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "201--222", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00301-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00301-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cui:2023:CEL, author = "Yaxin Cui and Hong Xu and Lin Tan and Huajin Chen and Wenfeng Qi", title = "Construction of equivalent linear trails and multiple linear attack on reduced-round {GIFT-64}", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "223--234", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00298-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00298-7", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Luengo:2023:STS, author = "Elena Almaraz Luengo and Bittor Ala{\~n}a Olivares and Luis Javier Garc{\'{\i}}a Villalba and Julio Hernandez-Castro and Darren Hurley-Smith", title = "{StringENT} test suite: {ENT} battery revisited for efficient {$P$} value computation", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "235--249", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00313-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00313-5", abstract = "Random numbers play a key role in a wide variety of applications, ranging from mathematical simulation to cryptography. Generating random or pseudo-random numbers is not an easy task, especially when hardware, time and energy constraints are considered. In order to assess whether generators behave in a random fashion, there are several statistical test batteries. ENT is one of the simplest and most popular, at least in part due to its efficacy and speed. Nonetheless, only one of the tests of this suite provides a $p$ value, which is the most useful and standard way to determine whether the randomness hypothesis holds, for a certain significance level. As a consequence of this, rather arbitrary and at times misleading bounds are set in order to decide which intervals are acceptable for its results. This paper introduces an extension of the battery, named StringENT, which, while sticking to the fast speed that makes ENT popular and useful, still succeeds in providing $p$ values with which sound decisions can be made about the randomness of a sequence. It also highlights a flagrant randomness flaw that the classical ENT battery is not capable of detecting but the new StringENT notices, and introduces two additional tests.", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Koseki:2023:HES, author = "Ryusuke Koseki and Akira Ito and Rei Ueno and Mehdi Tibouchi and Naofumi Homma", title = "Homomorphic encryption for stochastic computing", journal = j-J-CRYPTO-ENG, volume = "13", number = "2", pages = "251--263", month = jun, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00299-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Jun 2 12:32:10 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00299-6", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Salam:2023:DFA, author = "Iftekhar Salam and Wei-Chuen Yau and Rapha{\"e}l C.-W. Phan and Josef Pieprzyk", title = "Differential fault attacks on the lightweight authenticated encryption algorithm {CLX-128}", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "265--281", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00326-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00326-0", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{LeGrow:2023:FMF, author = "Jason T. LeGrow", title = "A faster method for fault attack resistance in static\slash ephemeral {CSIDH}", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "283--294", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00318-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00318-0", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Alves:2023:PHT, author = "Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha", title = "Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "295--310", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00325-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00325-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kerkhof:2023:NGL, author = "Maikel Kerkhof and Lichao Wu and Guilherme Perin and Stjepan Picek", title = "No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "311--324", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00320-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00320-6", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Salomon:2023:MLP, author = "Dor Salomon and Itamar Levi", title = "{MaskSIMD-lib}: on the performance gap of a generic {C} optimized assembly and wide vector extensions for masked software with an {Ascon}-$p$ test case", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "325--342", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00322-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00322-4", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Arshad:2023:ABE, author = "Hamed Arshad and Pablo Picazo-Sanchez and Christian Johansen and Gerardo Schneider", title = "Attribute-based encryption with enforceable obligations", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "343--371", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00317-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00317-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Bajard:2023:FVP, author = "Jean-Claude Bajard and Kazuhide Fukushima and Thomas Plantard and Arnaud Sipasseuth", title = "Fast verification and public key storage optimization for unstructured lattice-based signatures", journal = j-J-CRYPTO-ENG, volume = "13", number = "3", pages = "373--388", month = sep, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00309-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 10 16:09:48 MDT 2023", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00309-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Chang:2023:ASI, author = "Chip-Hong Chang and Stefan Katzenbeisser and Debdeep Mukhopadhyay and Ulrich R{\"u}hrmair", title = "The {ASHES 2021} special issue at {JCEN}", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "389--390", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00338-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00338-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Deutschbein:2023:IAI, author = "Calvin Deutschbein and Andres Meza and Francesco Restuccia and Ryan Kastner and Cynthia Sturton", title = "{Isadora}: automated information-flow property generation for hardware security verification", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "391--407", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00306-w", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00306-w", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Vasselle:2023:SDA, author = "Aur{\'e}lien Vasselle and Hugues Thiebeauld and Philippe Maurine", title = "Spatial dependency analysis to extract information from side-channel mixtures: extended version", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "409--425", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00307-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00307-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kuroda:2023:PAN, author = "Kunihiro Kuroda and Yuta Fukuda and Kota Yoshida and Takeshi Fujino", title = "Practical aspects on non-profiled deep-learning side-channel attacks against {AES} software implementation with two types of masking countermeasures including {RSM}", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "427--442", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00312-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00312-6", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ngo:2023:SCA, author = "Kalle Ngo and Elena Dubrova and Thomas Johansson", title = "A side-channel attack on a masked and shuffled software implementation of {Saber}", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "443--460", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00315-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00315-3", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Imran:2023:HSS, author = "Malik Imran and Felipe Almeida and Andrea Basso and Sujoy Sinha Roy and Samuel Pagliarini", title = "High-speed {SABER} key encapsulation mechanism in 65nm {CMOS}", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "461--471", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00316-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00316-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Komissarov:2023:SAA, author = "Rony Komissarov and Sharon Vaisman and Avishai Wool", title = "Spoofing attacks against vehicular {FMCW} radar", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "473--484", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00321-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00321-5", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Krachenfels:2023:TAD, author = "Thilo Krachenfels and Jean-Pierre Seifert and Shahin Tajik", title = "{Trojan} awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)", journal = j-J-CRYPTO-ENG, volume = "13", number = "4", pages = "485--499", month = nov, year = "2023", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00323-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Fri Apr 19 08:14:26 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00323-3", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Oberhansl:2024:UIS, author = "Felix Oberhansl and Tim Fritzmann and Thomas P{\"o}ppelmann and Debapriya Basu Roy and Georg Sigl", title = "Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "1--18", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00332-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00332-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kumar:2024:RNC, author = "Satyam Kumar and Sandip Kumar Mondal and Santanu Sarkar and Takanori Isobe and Anubhab Baksi and Avishek Adhikari", title = "Restricted near collision attack on {Plantlet}", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "19--34", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00336-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00336-y", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Ribeiro:2024:SPQ, author = "Leonardo A. D. S. Ribeiro and Jos{\'e} Paulo da Silva Lima and Ruy J. G. B. de Queiroz and Amirton B. Chagas and Jos{\'e} R. R. Junior and Jonysberg P. Quintino and Fabio Q. B. da Silva and Andr{\'e} L. M. Santos", title = "{SABER} post-quantum key encapsulation mechanism {(KEM)}: evaluating performance in {ARM} and x64 architectures", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "35--41", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00337-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00337-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cai:2024:ENA, author = "Shiping Cai and Zhi Hu and Zheng-An Yao and Chang-An Zhao", title = "The elliptic net algorithm revisited", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "43--55", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00304-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00304-y", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Shao:2024:DSV, author = "Cuiping Shao and Dongyan Zhao and Huiyun Li and Song Cheng and Shunxian Gao and Liuqing Yang", title = "Detection of security vulnerabilities in cryptographic {ICs} against fault injection attacks based on compressed sensing and basis pursuit", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "57--70", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00324-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00324-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Marchiori:2024:PRF, author = "D{\'u}nia Marchiori and Ricardo Cust{\'o}dio and Daniel Panario and Lucia Moura", title = "Probabilistic root finding in code-based cryptography", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "71--85", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00329-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00329-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Gurler:2024:CGL, author = "Elif Ozbay Gurler and Huseyin Hisil", title = "Complete group law for genus 2 {Jacobians} on {Jacobian} coordinates", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "87--101", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00351-7", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00351-7", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Joshi:2024:DRK, author = "Priyanka Joshi and Bodhisatwa Mazumdar", title = "Deep round key recovery attacks and countermeasure in persistent fault model: a case study on {GIFT} and {KLEIN}", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "103--125", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00349-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00349-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Koshelev:2024:CSM, author = "Dmitrii Koshelev", title = "Correction to: {Subgroup} membership testing on elliptic curves via the {Tate} pairing", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "127--128", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00331-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", note = "See \cite{Koshelev:2023:SMT}.", URL = "https://link.springer.com/article/10.1007/s13389-023-00331-3", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Zhang:2024:EAP, author = "Fan Zhang", title = "Editorial about {PROOFS 2021}", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "129--129", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00345-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00345-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Cheng:2024:TFB, author = "Wei Cheng and Yi Liu and Sylvain Guilley and Olivier Rioul", title = "Toward finding best linear codes for side-channel protections (extended version)", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "131--145", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-022-00305-x", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-022-00305-x", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lacombe:2024:CSA, author = "Guilhem Lacombe and David Feliot and Etienne Boespflug and Marie-Laure Potet", title = "Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "147--164", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00310-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00310-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Asano:2024:SBE, author = "Tamon Asano and Takeshi Sugawara", title = "Simulation-based evaluation of bit-interaction side-channel leakage on {RISC-V}: extended version", journal = j-J-CRYPTO-ENG, volume = "14", number = "1", pages = "165--180", month = apr, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00319-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Tue Jun 25 13:48:06 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/risc-v.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00319-z", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", remark = "The information leakage attack described here is successful against both ARM and the Western Digital SweRV EH1 RISC-V processor.", } @Article{Guillen:2024:AFC, author = "Luis Guillen", title = "The Asymmetric five-card trick: working with variable encoding in card-based protocols", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "181--192", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00333-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00333-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Sideris:2024:HAD, author = "Argyrios Sideris and Theodora Sanida and Minas Dasygenis", title = "Hardware acceleration design of the {SHA-3} for high throughput and low area on {FPGA}", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "193--205", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00334-0", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00334-0", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Viera:2024:TFM, author = "Raphael Viera and Jean-Max Dutertre and Rodrigo Silva Lima and Matthieu Pommies and Anthony Bertrand", title = "Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "207--221", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00335-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00335-z", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Carlet:2024:MMB, author = "Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'e}dric Tavernier", title = "A masking method based on orthonormal spaces, protecting several bytes against both {SCA} and {FIA} with a reduced cost", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "223--240", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00339-9", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00339-9", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Aydin:2024:LSH, author = "Furkan Aydin and Aydin Aysu", title = "Leaking secrets in homomorphic encryption with side-channel attacks", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "241--251", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00340-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00340-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{kumar:2024:QRN, author = "Vaishnavi kumar and Padmapriya Pravinkumar", title = "Quantum random number generator on {IBM QX}", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "253--259", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00341-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib; https://www.math.utah.edu/pub/tex/bib/prng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00341-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Al-Muhammed:2024:BSC, author = "Muhammed Jassem Al-Muhammed", title = "Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "261--279", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00343-z", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00343-z", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Seddigh:2024:BKM, author = "Milad Seddigh and Mahdi Esfahani and Sarani Bhattacharya and Mohammad Reza Aref and Hadi Soleimany", title = "Breaking {KASLR} on mobile devices without any use of cache memory (extended version)", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "281--294", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-023-00344-y", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-023-00344-y", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Vollala:2024:EET, author = "Satyanarayana Vollala", title = "Energy efficient triple-modular exponential techniques for batch verification schemes", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "295--309", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00348-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00348-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Aljafar:2024:ULE, author = "Muayad J. Aljafar and Florence Azais and Marie-Lise Flottes and Samuel Pagliarini", title = "Utilizing layout effects for analog logic locking", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "311--324", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00350-8", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00350-8", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Alshaer:2024:CLA, author = "Ihab Alshaer and Gijs Burghoorn and Brice Colombier and Christophe Deleuze and Vincent Beroulle and Paolo Maistri", title = "Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "325--342", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00352-6", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00352-6", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Kim:2024:MCA, author = "Kwang Ho Kim and Sihem Mesnager and Kyong Il Pak", title = "{Montgomery} curve arithmetic revisited", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "343--362", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00353-5", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00353-5", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Jana:2024:DFA, author = "Amit Jana and Goutam Paul", title = "Differential fault attack on {SPN}-based sponge and {SIV}-like {AE} schemes", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "363--381", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00354-4", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00354-4", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Hu:2024:UGE, author = "Jingwei Hu and Wen Wang and Kris Gaj and Donglong Chen and Huaxiong Wang", title = "Universal {Gaussian} elimination hardware for cryptographic purposes", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "383--397", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00355-3", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00355-3", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Lashermes:2024:GSR, author = "Ronan Lashermes and H{\'e}l{\`e}ne {Le Bouder}", title = "Generic {SCARE}: reverse engineering without knowing the algorithm nor the machine", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "399--414", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00356-2", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00356-2", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", } @Article{Salarifard:2024:EHA, author = "Raziyeh Salarifard and Hadi Soleimany", title = "An efficient hardware accelerator for {NTT}-based polynomial multiplication using {FPGA}", journal = j-J-CRYPTO-ENG, volume = "14", number = "2", pages = "415--426", month = jun, year = "2024", CODEN = "????", DOI = "https://doi.org/10.1007/s13389-024-00357-1", ISSN = "2190-8508 (print), 2190-8516 (electronic)", ISSN-L = "2190-8508", bibdate = "Thu Aug 8 07:34:12 MDT 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib", URL = "https://link.springer.com/article/10.1007/s13389-024-00357-1", acknowledgement = ack-nhfb, ajournal = "J. Crypto. Eng.", fjournal = "Journal of Cryptographic Engineering", journal-URL = "http://link.springer.com/journal/13389", }