Pub Date : 2021-07-13DOI: 10.1007/s13389-021-00268-5
Leonid Azriel, Julian Speith, Nils Albartus, R. Ginosar, A. Mendelson, C. Paar
{"title":"A survey of algorithmic methods in IC reverse engineering","authors":"Leonid Azriel, Julian Speith, Nils Albartus, R. Ginosar, A. Mendelson, C. Paar","doi":"10.1007/s13389-021-00268-5","DOIUrl":"https://doi.org/10.1007/s13389-021-00268-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"299 - 315"},"PeriodicalIF":1.9,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00268-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48220814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-02DOI: 10.1007/s13389-021-00264-9
L. P. Perin, Gustavo Zambonin, Ricardo Felipe Custódio, Lucia Moura, D. Panario
{"title":"Improved constant-sum encodings for hash-based signatures","authors":"L. P. Perin, Gustavo Zambonin, Ricardo Felipe Custódio, Lucia Moura, D. Panario","doi":"10.1007/s13389-021-00264-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00264-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"329 - 351"},"PeriodicalIF":1.9,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00264-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47409421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-01DOI: 10.1007/s13389-021-00266-7
K. Heydemann, Letitia Li
{"title":"Correction to: Editorial about PROOFS 2019","authors":"K. Heydemann, Letitia Li","doi":"10.1007/s13389-021-00266-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00266-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"197"},"PeriodicalIF":1.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00266-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41774079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-12DOI: 10.1007/s13389-021-00261-y
K. Nath, P. Sarkar
{"title":"Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels","authors":"K. Nath, P. Sarkar","doi":"10.1007/s13389-021-00261-y","DOIUrl":"https://doi.org/10.1007/s13389-021-00261-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"107 - 121"},"PeriodicalIF":1.9,"publicationDate":"2021-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00261-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47034816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-05DOI: 10.1007/s13389-021-00260-z
J. Bajard, S. Duquesne
{"title":"Montgomery-friendly primes and applications to cryptography","authors":"J. Bajard, S. Duquesne","doi":"10.1007/s13389-021-00260-z","DOIUrl":"https://doi.org/10.1007/s13389-021-00260-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"399 - 415"},"PeriodicalIF":1.9,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00260-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47618361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-20DOI: 10.1007/s13389-021-00258-7
James Howe, Marco Martinoli, E. Oswald, F. Regazzoni
{"title":"Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware","authors":"James Howe, Marco Martinoli, E. Oswald, F. Regazzoni","doi":"10.1007/s13389-021-00258-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00258-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"317 - 327"},"PeriodicalIF":1.9,"publicationDate":"2021-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00258-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48160243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-16DOI: 10.1007/s13389-021-00257-8
Rodrigo Abarzúa, C. Valencia, Julio López
{"title":"Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC","authors":"Rodrigo Abarzúa, C. Valencia, Julio López","doi":"10.1007/s13389-021-00257-8","DOIUrl":"https://doi.org/10.1007/s13389-021-00257-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"71 - 102"},"PeriodicalIF":1.9,"publicationDate":"2021-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00257-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43672129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-13DOI: 10.1007/s13389-021-00256-9
B. Buhrow, B. Gilbert, C. Haider
{"title":"Parallel modular multiplication using 512-bit advanced vector instructions","authors":"B. Buhrow, B. Gilbert, C. Haider","doi":"10.1007/s13389-021-00256-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00256-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"95 - 105"},"PeriodicalIF":1.9,"publicationDate":"2021-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00256-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42839984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}