Pub Date : 2023-01-19DOI: 10.1007/s13389-023-00309-1
J. Bajard, Kazuhide Fukushima, T. Plantard, Arnaud Sipasseuth
{"title":"Fast verification and public key storage optimization for unstructured lattice-based signatures","authors":"J. Bajard, Kazuhide Fukushima, T. Plantard, Arnaud Sipasseuth","doi":"10.1007/s13389-023-00309-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00309-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-16"},"PeriodicalIF":1.9,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44646784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-18DOI: 10.1007/s13389-023-00310-8
Guilhem Lacombe, D. Féliot, Etienne Boespflug, Marie-Laure Potet
{"title":"Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities","authors":"Guilhem Lacombe, D. Féliot, Etienne Boespflug, Marie-Laure Potet","doi":"10.1007/s13389-023-00310-8","DOIUrl":"https://doi.org/10.1007/s13389-023-00310-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-18"},"PeriodicalIF":1.9,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44473387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-03DOI: 10.1007/s13389-022-00307-9
Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
{"title":"Spatial dependency analysis to extract information from side-channel mixtures: extended version","authors":"Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine","doi":"10.1007/s13389-022-00307-9","DOIUrl":"https://doi.org/10.1007/s13389-022-00307-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135604587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-15DOI: 10.1007/s13389-022-00305-x
Wei Cheng, Yi Liu, S. Guilley, O. Rioul
{"title":"Toward finding best linear codes for side-channel protections (extended version)","authors":"Wei Cheng, Yi Liu, S. Guilley, O. Rioul","doi":"10.1007/s13389-022-00305-x","DOIUrl":"https://doi.org/10.1007/s13389-022-00305-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46685234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-11DOI: 10.1007/s13389-022-00306-w
Calvin Deutschbein, Andres Meza, Francesco Restuccia, R. Kastner, C. Sturton
{"title":"Isadora: automated information-flow property generation for hardware security verification","authors":"Calvin Deutschbein, Andres Meza, Francesco Restuccia, R. Kastner, C. Sturton","doi":"10.1007/s13389-022-00306-w","DOIUrl":"https://doi.org/10.1007/s13389-022-00306-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47429077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}