Pub Date : 2020-10-11DOI: 10.1007/s13389-021-00263-w
Duc-Phong Le, Rongxing Lu, A. Ghorbani
{"title":"Improved fault analysis on SIMECK ciphers","authors":"Duc-Phong Le, Rongxing Lu, A. Ghorbani","doi":"10.1007/s13389-021-00263-w","DOIUrl":"https://doi.org/10.1007/s13389-021-00263-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"169 - 180"},"PeriodicalIF":1.9,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00263-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42677240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-09DOI: 10.1007/s13389-020-00242-7
Amanda Cristina Davi Resende, Diego de Freitas Aranha
{"title":"Faster unbalanced Private Set Intersection in the semi-honest setting","authors":"Amanda Cristina Davi Resende, Diego de Freitas Aranha","doi":"10.1007/s13389-020-00242-7","DOIUrl":"https://doi.org/10.1007/s13389-020-00242-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"17 1","pages":"21 - 38"},"PeriodicalIF":1.9,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79465478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-03DOI: 10.1007/s13389-020-00240-9
M. Shiozaki, T. Fujino
{"title":"Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF","authors":"M. Shiozaki, T. Fujino","doi":"10.1007/s13389-020-00240-9","DOIUrl":"https://doi.org/10.1007/s13389-020-00240-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"201 - 212"},"PeriodicalIF":1.9,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00240-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45898894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-30DOI: 10.1007/s13389-020-00239-2
Maamar Ouladj, N. El Mrabet, S. Guilley, P. Guillot, G. Millérioux
{"title":"On the power of template attacks in highly multivariate context","authors":"Maamar Ouladj, N. El Mrabet, S. Guilley, P. Guillot, G. Millérioux","doi":"10.1007/s13389-020-00239-2","DOIUrl":"https://doi.org/10.1007/s13389-020-00239-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"337 - 354"},"PeriodicalIF":1.9,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00239-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44936351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-18DOI: 10.1007/s13389-020-00235-6
A. Wiemers
{"title":"A remark on a success rate model for side-channel attack analysis","authors":"A. Wiemers","doi":"10.1007/s13389-020-00235-6","DOIUrl":"https://doi.org/10.1007/s13389-020-00235-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"269 - 274"},"PeriodicalIF":1.9,"publicationDate":"2020-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00235-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44472448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.1007/s13389-020-00234-7
Mael Gay, Batya Karp, O. Keren, I. Polian
{"title":"Error control scheme for malicious and natural faults in cryptographic modules","authors":"Mael Gay, Batya Karp, O. Keren, I. Polian","doi":"10.1007/s13389-020-00234-7","DOIUrl":"https://doi.org/10.1007/s13389-020-00234-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"321 - 336"},"PeriodicalIF":1.9,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00234-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46486099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-06-25DOI: 10.1007/s13389-020-00231-w
Dimitrios Schoinianakis
{"title":"Residue arithmetic systems in cryptography: a survey on modern security applications","authors":"Dimitrios Schoinianakis","doi":"10.1007/s13389-020-00231-w","DOIUrl":"https://doi.org/10.1007/s13389-020-00231-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"249 - 267"},"PeriodicalIF":1.9,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00231-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47395551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}