Pub Date : 2023-08-30DOI: 10.1007/s13389-023-00334-0
Argyrios Sideris, Theodora Sanida, M. Dasygenis
{"title":"Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA","authors":"Argyrios Sideris, Theodora Sanida, M. Dasygenis","doi":"10.1007/s13389-023-00334-0","DOIUrl":"https://doi.org/10.1007/s13389-023-00334-0","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48814227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-24DOI: 10.1007/s13389-023-00332-2
Felix Oberhansl, Tim Fritzmann, T. Pöppelmann, Debapriya Basu Roy, G. Sigl
{"title":"Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography","authors":"Felix Oberhansl, Tim Fritzmann, T. Pöppelmann, Debapriya Basu Roy, G. Sigl","doi":"10.1007/s13389-023-00332-2","DOIUrl":"https://doi.org/10.1007/s13389-023-00332-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44250615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-17DOI: 10.1007/s13389-023-00331-3
D. Koshelev
{"title":"Correction to: Subgroup membership testing on elliptic curves via the Tate pairing","authors":"D. Koshelev","doi":"10.1007/s13389-023-00331-3","DOIUrl":"https://doi.org/10.1007/s13389-023-00331-3","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44371116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-31DOI: 10.1007/s13389-023-00329-x
Dúnia Marchiori, Ricardo Felipe Custódio, D. Panario, Lucia Moura
{"title":"Probabilistic root finding in code-based cryptography","authors":"Dúnia Marchiori, Ricardo Felipe Custódio, D. Panario, Lucia Moura","doi":"10.1007/s13389-023-00329-x","DOIUrl":"https://doi.org/10.1007/s13389-023-00329-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49646399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-06DOI: 10.1007/s13389-023-00327-z
Oswa M. Amro, V. Mishra, R. Negi, Urbi Chatterjee
{"title":"CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler","authors":"Oswa M. Amro, V. Mishra, R. Negi, Urbi Chatterjee","doi":"10.1007/s13389-023-00327-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00327-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48532276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-26DOI: 10.1007/s13389-023-00326-0
Iftekhar Salam, Wei-Chuen Yau, R. Phan, J. Pieprzyk
{"title":"Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128","authors":"Iftekhar Salam, Wei-Chuen Yau, R. Phan, J. Pieprzyk","doi":"10.1007/s13389-023-00326-0","DOIUrl":"https://doi.org/10.1007/s13389-023-00326-0","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"265 - 281"},"PeriodicalIF":1.9,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41928796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-20DOI: 10.1007/s13389-023-00319-z
Tamon Asano, T. Sugawara
{"title":"Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version","authors":"Tamon Asano, T. Sugawara","doi":"10.1007/s13389-023-00319-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00319-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46037119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-13DOI: 10.1007/s13389-023-00325-1
P. G. M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
{"title":"Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference","authors":"P. G. M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha","doi":"10.1007/s13389-023-00325-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00325-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"295 - 310"},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46092711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-02DOI: 10.1007/s13389-023-00324-2
C. Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang
{"title":"Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit","authors":"C. Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang","doi":"10.1007/s13389-023-00324-2","DOIUrl":"https://doi.org/10.1007/s13389-023-00324-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41632710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}