Journal Of Cryptographic Engineering

Journal Of Cryptographic Engineering

密码工程学杂志

  • 4区 中科院分区
  • Q2 JCR分区

高引用文章

文章名称 引用次数
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware 19
A review of lightweight block ciphers 13
Triathlon of lightweight block ciphers for the Internet of things 9
Montgomery curves and their arithmetic: The case of large characteristic fields 4
Compact circuits for combined AES encryption/decryption 3
Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs 3
RNS Montgomery reduction algorithms using quadratic residuosity 3
Uniform Montgomery multiplier 3
Montgomery reduction within the context of residue number system arithmetic 3
Side-channel robustness analysis of masked assembly codes using a symbolic approach 2
Arithmetic coding and blinding countermeasures for lattice signatures Engineering a side-channel resistant post-quantum signature scheme with compact signatures 2
Online template attacks 2
A unified masking approach 1
A class of safe and efficient binary Edwards curves 1
Scan-based side channel attack on stream ciphers and its prevention 1
Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version 1
A trivial debiasing scheme for Helper Data Systems 1
From theory to practice: horizontal attacks on protected implementations of modular exponentiations 1
Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology 1
Internal differential fault analysis of parallelizable ciphers in the counter-mode 1
Highly efficient GF(2(8)) inversion circuit based on hybrid GF representations 1
Parallel bitsliced AES through PHAST: a single-source high-performance library for multi-cores and GPUs 1
Montgomery inversion 1
Karatsuba-like formulae and their associated techniques 1
TriviA and uTriviA: two fast and secure authenticated encryption schemes 1
Disk encryption: do we need to preserve length? 1
Why attackers lose: design and security analysis of arbitrarily large XOR arbiter PUFs 1
Polynomial direct sum masking to protect against both SCA and FIA 0
Regulating the pace of von Neumann correctors 0
Automatic generation of HCCA-resistant scalar multiplication algorithm by proper sequencing of field multiplier operands 0
Mixed-radix Naccache-Stern encryption 0
On the verification of system-level information flow properties for virtualized execution platforms 0
An automated framework for exploitable fault identification in block ciphers 0
Physical model of sensitive data leakage from PC-based cryptographic systems 0
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields 0
Kite attack: reshaping the cube attack for a flexible GPU-based maxterm search 0
A toolbox for software optimization of QC-MDPC code-based cryptosystems 0
The Montgomery ladder on binary elliptic curves 0
Spectral arithmetic in Montgomery modular multiplication 0
Design and implementation of low-depth pairing-based homomorphic encryption scheme 0
Constant-time higher-order Boolean-to-arithmetic masking 0
MEAS: memory encryption and authentication secure against side-channel attacks 0
Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding 0
Constructing multidimensional differential addition chains and their applications 0
Euclidean addition chains scalar multiplication on curves with efficient endomorphism 0
Another dimension in integrated circuit trust 0
Arithmetic of tau-adic expansions for lightweight Koblitz curve cryptography 0
Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs-extended version 0
McBits revisited: toward a fast constant-time code-based KEM 0