Pub Date : 2024-01-05DOI: 10.1007/s13389-023-00344-y
Milad Seddigh, M. Esfahani, Sarani Bhattacharya, Mohammadreza Aref, H. Soleimany
{"title":"Breaking KASLR on mobile devices without any use of cache memory (extended version)","authors":"Milad Seddigh, M. Esfahani, Sarani Bhattacharya, Mohammadreza Aref, H. Soleimany","doi":"10.1007/s13389-023-00344-y","DOIUrl":"https://doi.org/10.1007/s13389-023-00344-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"84 14","pages":"1-14"},"PeriodicalIF":1.9,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-07DOI: 10.1007/s13389-023-00341-1
Vaishnavi Kumar, Padmapriya Pravinkumar
{"title":"Quantum random number generator on IBM QX","authors":"Vaishnavi Kumar, Padmapriya Pravinkumar","doi":"10.1007/s13389-023-00341-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00341-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"33 20","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-04DOI: 10.1007/s13389-023-00339-9
Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
{"title":"A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost","authors":"Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier","doi":"10.1007/s13389-023-00339-9","DOIUrl":"https://doi.org/10.1007/s13389-023-00339-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"107 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135773392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-01DOI: 10.1007/s13389-023-00338-w
Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, U. Rührmair
{"title":"The ASHES 2021 special issue at JCEN","authors":"Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, U. Rührmair","doi":"10.1007/s13389-023-00338-w","DOIUrl":"https://doi.org/10.1007/s13389-023-00338-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"35 1","pages":"389 - 390"},"PeriodicalIF":1.9,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-16DOI: 10.1007/s13389-023-00337-x
Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton B. Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos
{"title":"SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures","authors":"Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton B. Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos","doi":"10.1007/s13389-023-00337-x","DOIUrl":"https://doi.org/10.1007/s13389-023-00337-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136078865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-03DOI: 10.1007/s13389-023-00335-z
Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand
{"title":"Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations","authors":"Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand","doi":"10.1007/s13389-023-00335-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00335-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135689187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-31DOI: 10.1007/s13389-023-00333-1
Luis Guillen
{"title":"The Asymmetric five-card trick: working with variable encoding in card-based protocols","authors":"Luis Guillen","doi":"10.1007/s13389-023-00333-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00333-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52846562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}