default search action
Journal of Cryptographic Engineering, Volume 2
Volume 2, Number 1, May 2012
- Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wójcik:
An exploration of mechanisms for dynamic cryptographic instruction set extension. 1-18 - Conrado Porto Lopes Gouvêa, Leonardo B. Oliveira, Julio López:
Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. 19-29 - Shay Gueron:
Efficient software implementations of modular exponentiation. 31-43 - Claude Carlet, Jean-Charles Faugère, Christopher Goyet, Guénaël Renault:
Analysis of the algebraic side channel attack. 45-62 - M. Abdelaziz Elaabid, Sylvain Guilley:
Portability of templates. 63-74 - Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall:
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems. 75
Volume 2, Number 2, September 2012
- Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang:
High-speed high-security signatures. 77-89 - M. Anwar Hasan, Christophe Nègre:
Sequential multiplier with sub-linear gate complexity. 91-97 - Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon:
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure. 99-110 - Thomas Roche, Emmanuel Prouff:
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version. 111-127 - Julien Bringer, Hervé Chabanne, Thanh-Ha Le:
Protecting AES against side-channel analysis using wire-tap codes. 129-141
Volume 2, Number 3, October 2012
- Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne P. Burleson:
Side channels as building blocks. 143-159 - Luke Mather, Elisabeth Oswald:
Pinpointing side-channel information leaks in web applications. 161-177 - Vladimir Trujillo-Olaya, Timothy Sherwood, Çetin Kaya Koç:
Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications. 179-188 - Saloomeh Shariati, François-Xavier Standaert, Laurent Jacques, Benoît Macq:
Analysis and experimental evaluation of image-based PUFs. 189-206
Volume 2, Number 4, November 2012
- Jean DaRolt, Amitabh Das, Santosh Ghosh, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede:
Scan attacks on side-channel and fault attack resistant public-key implementations. 207-219 - Brian Baldwin, Raveen R. Goundar, Mark Hamilton, William P. Marnane:
Co-Z ECC scalar multiplications for hardware, software and hardware-software co-design on embedded systems. 221-240 - Shay Gueron, Vlad Krasnov:
Parallelizing message schedules to accelerate the computations of hash functions. 241-253 - Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik, Wei Wu:
A practical device authentication scheme using SRAM PUFs. 255-269
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.