Pub Date : 2022-09-17DOI: 10.1007/s13389-022-00299-6
Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, N. Homma
{"title":"Homomorphic encryption for stochastic computing","authors":"Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, N. Homma","doi":"10.1007/s13389-022-00299-6","DOIUrl":"https://doi.org/10.1007/s13389-022-00299-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"251-263"},"PeriodicalIF":1.9,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42449306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-12DOI: 10.1007/s13389-022-00300-2
Chip-Hong Chang, S. Katzenbeisser, U. Rührmair, P. Schaumont
{"title":"The ASHES 2020 special issue at JCEN","authors":"Chip-Hong Chang, S. Katzenbeisser, U. Rührmair, P. Schaumont","doi":"10.1007/s13389-022-00300-2","DOIUrl":"https://doi.org/10.1007/s13389-022-00300-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"369 - 370"},"PeriodicalIF":1.9,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44407950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-06DOI: 10.1007/s13389-022-00298-7
Yaxin Cui, Hong Xu, Lin Tan, Huajin Chen, Wenfeng Qi
{"title":"Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64","authors":"Yaxin Cui, Hong Xu, Lin Tan, Huajin Chen, Wenfeng Qi","doi":"10.1007/s13389-022-00298-7","DOIUrl":"https://doi.org/10.1007/s13389-022-00298-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"223-234"},"PeriodicalIF":1.9,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46874772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-02DOI: 10.1007/s13389-022-00296-9
D. Koshelev
{"title":"Subgroup membership testing on elliptic curves via the Tate pairing","authors":"D. Koshelev","doi":"10.1007/s13389-022-00296-9","DOIUrl":"https://doi.org/10.1007/s13389-022-00296-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"125-128"},"PeriodicalIF":1.9,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42031974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-24DOI: 10.1007/s13389-022-00297-8
Juan Di Mauro, Eduardo Salazar, H. Scolnik
{"title":"Design and implementation of a novel cryptographically secure pseudorandom number generator","authors":"Juan Di Mauro, Eduardo Salazar, H. Scolnik","doi":"10.1007/s13389-022-00297-8","DOIUrl":"https://doi.org/10.1007/s13389-022-00297-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"255 - 265"},"PeriodicalIF":1.9,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46826484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-16DOI: 10.1007/s13389-022-00290-1
A. Kundu, Aikata, Banashri Karmakar, Dhiman Saha
{"title":"Fault analysis of the PRINCE family of lightweight ciphers","authors":"A. Kundu, Aikata, Banashri Karmakar, Dhiman Saha","doi":"10.1007/s13389-022-00290-1","DOIUrl":"https://doi.org/10.1007/s13389-022-00290-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"475 - 494"},"PeriodicalIF":1.9,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47392490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-20DOI: 10.1007/s13389-022-00293-y
Gora Adj, Jesús-Javier Chi-Domínguez, F. Rodríguez-Henríquez
{"title":"Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols","authors":"Gora Adj, Jesús-Javier Chi-Domínguez, F. Rodríguez-Henríquez","doi":"10.1007/s13389-022-00293-y","DOIUrl":"https://doi.org/10.1007/s13389-022-00293-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"89-106"},"PeriodicalIF":1.9,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-16DOI: 10.1007/s13389-022-00295-w
R. Mukherjee, S. Rajendran, R. Chakraborty
{"title":"A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention","authors":"R. Mukherjee, S. Rajendran, R. Chakraborty","doi":"10.1007/s13389-022-00295-w","DOIUrl":"https://doi.org/10.1007/s13389-022-00295-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"495-522"},"PeriodicalIF":1.9,"publicationDate":"2022-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43031350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-23DOI: 10.1007/s13389-022-00289-8
Jacob Fustos, M. Bechtel, H. Yun
{"title":"A framework for leaking secrets to past instructions","authors":"Jacob Fustos, M. Bechtel, H. Yun","doi":"10.1007/s13389-022-00289-8","DOIUrl":"https://doi.org/10.1007/s13389-022-00289-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"461 - 473"},"PeriodicalIF":1.9,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47870282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-11DOI: 10.1007/s13389-022-00288-9
A. Giron, Ricardo Felipe Custódio, F. Rodríguez-Henríquez
{"title":"Post-quantum hybrid key exchange: a systematic mapping study","authors":"A. Giron, Ricardo Felipe Custódio, F. Rodríguez-Henríquez","doi":"10.1007/s13389-022-00288-9","DOIUrl":"https://doi.org/10.1007/s13389-022-00288-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"71-88"},"PeriodicalIF":1.9,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47164909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}