Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.26",
%%%     date            = "08 August 2024",
%%%     time            = "08:52:25 MDT",
%%%     filename        = "jcryptoeng.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "21832 8393 31450 343490",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Journal of
%%%                        Cryptographic Engineering",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of Cryptographic Engineering (CODEN
%%%                        none, ISSN 2190-8508 (print), 2190-8516
%%%                        (electronic)), published by Springer.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        2011, and the journal currently appears
%%%                        quarterly.
%%%
%%%                        The journal has World-Wide Web sites at
%%%
%%%                            http://link.springer.com/journal/13389
%%%                            http://link.springer.com/journal/volumesAndIssues/13389
%%%                            http://www.springer.com/computer/security+and+cryptology/journal/13389
%%%
%%%                        At version 1.26, the year coverage looked
%%%                        like this:
%%%
%%%                             2011 (  28)    2016 (  23)    2021 (  29)
%%%                             2012 (  23)    2017 (  27)    2022 (  27)
%%%                             2013 (  22)    2018 (  24)    2023 (  31)
%%%                             2014 (  24)    2019 (  27)    2024 (  29)
%%%                             2015 (  21)    2020 (  23)
%%%
%%%                             Article:        358
%%%
%%%                             Total entries:  358
%%%
%%%                        Data for the bibliography have been collected
%%%                        primarily from the publisher Web site.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume''.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
    "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-CRYPTO-ENG          = "Journal of Cryptographic Engineering"}

%%% ====================================================================
%%% Bibliography entries, in publication order:
@Article{Koc:2011:IBC,
  author =       "{\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Introduction to the {{\booktitle{Journal of
                 Cryptographic Engineering}}}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "1--3",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0007-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://cs.ucsb.edu/~koc/docs/j75.pdf;
                 http://link.springer.com/article/10.1007/s13389-011-0007-x;
                 http://link.springer.com/content/pdf/10.1007/s13389-011-0007-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kocher:2011:IDP,
  author =       "Paul Kocher and Joshua Jaffe and Benjamin Jun and
                 Pankaj Rohatgi",
  title =        "Introduction to differential power analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "5--27",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0006-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0006-y;
                 http://link.springer.com/content/pdf/10.1007/s13389-011-0006-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Molter:2011:SPA,
  author =       "H. Gregor Molter and Marc St{\"o}ttinger and Abdulhadi
                 Shoufan and Falko Strenzke",
  title =        "A simple power analysis attack on a {McEliece}
                 cryptoprocessor",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "29--36",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0001-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0001-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guneysu:2011:UHC,
  author =       "Tim G{\"u}neysu",
  title =        "Utilizing hard cores of modern {FPGA} devices for
                 high-performance cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "37--55",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0002-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0002-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dominguez-Oviedo:2011:ALE,
  author =       "Agustin Dominguez-Oviedo and M. Anwar Hasan",
  title =        "Algorithm-level error detection for {Montgomery}
                 ladder-based {ECSM}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "57--69",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0003-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0003-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Skorobogatov:2011:SMS,
  author =       "Sergei Skorobogatov",
  title =        "Synchronization method for {SCA} and fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "71--77",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0004-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0004-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hocquet:2011:HPN,
  author =       "C{\'e}dric Hocquet and Dina Kamel and Francesco
                 Regazzoni and Jean-Didier Legat and Denis Flandre and
                 David Bol and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Harvesting the potential of nano-{CMOS} for
                 lightweight cryptography: an ultra-low-voltage 65 nm
                 {AES} coprocessor for passive {RFID} tags",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "79--86",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0005-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0005-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "??--??",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Moreno:2011:SRB,
  author =       "Carlos Moreno and M. Anwar Hasan",
  title =        "{SPA}-resistant binary exponentiation with optimal
                 execution time",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "87--99",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0008-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0008-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Beuchat:2011:LAU,
  author =       "Jean-Luc Beuchat and Eiji Okamoto and Teppei
                 Yamazaki",
  title =        "A low-area unified hardware architecture for the {AES}
                 and the cryptographic hash function {ECHO}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "101--121",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0009-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0009-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Doget:2011:USC,
  author =       "Julien Doget and Emmanuel Prouff and Matthieu Rivain
                 and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Univariate side channel attacks and leakage modeling",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "123--144",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0010-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0010-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Whitnall:2011:FEF,
  author =       "Carolyn Whitnall and Elisabeth Oswald",
  title =        "A fair evaluation framework for comparing side-channel
                 distinguishers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "145--160",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0011-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0011-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Goundar:2011:SMW,
  author =       "Raveen R. Goundar and Marc Joye and Atsuko Miyaji and
                 Matthieu Rivain and Alexandre Venelli",
  title =        "Scalar multiplication on {Weierstra{\ss}} elliptic
                 curves from Co-{$Z$} arithmetic",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "161--176",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0012-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0012-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "??--??",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Katzenbeisser:2011:RPL,
  author =       "Stefan Katzenbeisser and {\"U}nal Kocaba{\v{s}} and
                 Vincent van der Leest and Ahmad-Reza Sadeghi and
                 Geert-Jan Schrijen and Christian Wachsmann",
  title =        "Recyclable {PUFs}: logically reconfigurable {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "177--186",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0016-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0016-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Taverne:2011:SSM,
  author =       "Jonathan Taverne and Armando Faz-Hern{\'a}ndez and
                 Diego F. Aranha and Francisco
                 Rodr{\'\i}guez-Henr{\'\i}quez and Darrel Hankerson and
                 Julio L{\'o}pez",
  title =        "Speeding scalar multiplication over binary elliptic
                 curves using the new carry-less multiplication
                 instruction",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "187--199",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0017-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0017-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Meloni:2011:HPG,
  author =       "Nicolas M{\'e}loni and Christophe Negre and M. Anwar
                 Hasan",
  title =        "High performance {GHASH} and impacts of a class of
                 unconventional bases",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "201--218",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0013-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0013-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Tunstall:2011:PCD,
  author =       "Michael Tunstall",
  title =        "Practical complexity differential cryptanalysis and
                 fault analysis of {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "219--230",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0018-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0018-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Medwed:2011:EAS,
  author =       "Marcel Medwed and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Extractors against side-channel attacks: weak or
                 strong?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "231--241",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0014-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0014-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Brier:2011:MFA,
  author =       "{\'E}ric Brier and David Naccache and Phong Q. Nguyen
                 and Mehdi Tibouchi",
  title =        "Modulus fault attacks against {RSA--CRT} signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "243--253",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0015-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0015-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "??--??",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dichtl:2011:NMB,
  author =       "Markus Dichtl",
  title =        "A new method of black box power analysis and a fast
                 algorithm for optimal key search",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "255--264",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0019-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0019-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Endo:2011:CGC,
  author =       "Sho Endo and Takeshi Sugawara and Naofumi Homma and
                 Takafumi Aoki and Akashi Satoh",
  title =        "An on-chip glitchy-clock generator for testing fault
                 injection attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "265--270",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0022-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0022-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Avanzi:2011:SCA,
  author =       "Roberto Avanzi and Simon Hoerder and Dan Page and
                 Michael Tunstall",
  title =        "Side-channel attacks on the {McEliece} and
                 {Niederreiter} public-key cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "271--281",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0024-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See erratum \cite{Avanzi:2012:ESC}.",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0024-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Strenzke:2011:MAS,
  author =       "Falko Strenzke",
  title =        "Message-aimed side channel and fault attacks against
                 public key cryptosystems with homomorphic properties",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "283--292",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0020-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0020-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hospodar:2011:MLS,
  author =       "Gabriel Hospodar and Benedikt Gierlichs and Elke {De
                 Mulder} and Ingrid Verbauwhede and Joos Vandewalle",
  title =        "Machine learning in side-channel analysis: a first
                 study",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "293--302",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0023-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0023-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lux:2011:TSD,
  author =       "Alexander Lux and Artem Starostin",
  title =        "A tool for static detection of timing channels in
                 {Java}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "303--313",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0021-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0021-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCd,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "??--??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Grabher:2012:EMD,
  author =       "P. Grabher and J. Gro{\ss}sch{\"a}dl and S. Hoerder
                 and K. J{\"a}rvinen and D. Page and S. Tillich and M.
                 W{\'o}jcik",
  title =        "An exploration of mechanisms for dynamic cryptographic
                 instruction set extension",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "1--18",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0025-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0025-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gouvea:2012:ESI,
  author =       "Conrado P. L. Gouv{\^e}a and Leonardo B. Oliveira and
                 Julio L{\'o}pez",
  title =        "Efficient software implementation of public-key
                 cryptography on sensor networks using the {MSP430X}
                 microcontroller",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "19--29",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0029-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0029-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gueron:2012:ESI,
  author =       "Shay Gueron",
  title =        "Efficient software implementations of modular
                 exponentiation",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "31--43",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0031-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0031-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carlet:2012:AAS,
  author =       "Claude Carlet and Jean-Charles Faug{\`e}re and
                 Christopher Goyet and Gu{\'e}na{\"e}l Renault",
  title =        "Analysis of the algebraic side channel attack",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "45--62",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0028-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0028-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Elaabid:2012:PT,
  author =       "M. Abdelaziz Elaabid and Sylvain Guilley",
  title =        "Portability of templates",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "63--74",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0030-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0030-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Avanzi:2012:ESC,
  author =       "Roberto Avanzi and Simon Hoerder and Dan Page and
                 Michael Tunstall",
  title =        "Erratum to: Side-channel attacks on the {McEliece} and
                 {Niederreiter} public-key cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "75--75",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-011-0026-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See \cite{Avanzi:2011:SCA}.",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0026-7;
                 http://link.springer.com/content/pdf/10.1007/s13389-011-0026-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2012:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "??--??",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bernstein:2012:HSH,
  author =       "Daniel J. Bernstein and Niels Duif and Tanja Lange and
                 Peter Schwabe and Bo-Yin Yang",
  title =        "High-speed high-security signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "77--89",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0027-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0027-1;
                 http://link.springer.com/content/pdf/10.1007/s13389-012-0027-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hasan:2012:SMS,
  author =       "M. Anwar Hasan and Christophe Negre",
  title =        "Sequential multiplier with sub-linear gate
                 complexity",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "91--97",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0035-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0035-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yen:2012:MEA,
  author =       "Sung-Ming Yen and Chien-Ning Chen and SangJae Moon",
  title =        "Multi-exponentiation algorithm based on binary {GCD}
                 computation and its application to side-channel
                 countermeasure",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "99--110",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0032-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0032-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Roche:2012:HOG,
  author =       "Thomas Roche and Emmanuel Prouff",
  title =        "Higher-order glitch free implementation of the {AES}
                 using {Secure Multi--Party Computation} protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "111--127",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0033-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0033-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bringer:2012:PAA,
  author =       "Julien Bringer and Herv{\'e} Chabanne and Thanh Ha
                 Le",
  title =        "Protecting {AES} against side-channel analysis using
                 wire-tap codes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "129--141",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0034-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0034-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2012:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "??--??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kasper:2012:SCB,
  author =       "Markus Kasper and Amir Moradi and Georg T. Becker and
                 Oliver Mischke and Tim G{\"u}neysu and Christof Paar
                 and Wayne Burleson",
  title =        "Side channels as building blocks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "143--159",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0040-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0040-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mather:2012:PSC,
  author =       "Luke Mather and Elisabeth Oswald",
  title =        "Pinpointing side-channel information leaks in web
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "161--177",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0036-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0036-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Trujillo-Olaya:2012:APV,
  author =       "Vladimir Trujillo-Olaya and Timothy Sherwood and
                 {\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Analysis of performance versus security in hardware
                 realizations of small elliptic curves for lightweight
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "179--188",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0039-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0039-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Shariati:2012:AEE,
  author =       "Saloomeh Shariati and Fran{\c{c}}ois-Xavier Standaert
                 and Laurent Jacques and Benoit Macq",
  title =        "Analysis and experimental evaluation of image-based
                 {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "189--206",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0041-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0041-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Anonymous:2012:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "??--??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rolt:2012:SAS,
  author =       "Jean Da Rolt and Amitabh Das and Santosh Ghosh and
                 Giorgio {Di Natale} and Marie-Lise Flottes and Bruno
                 Rouzeyre and Ingrid Verbauwhede",
  title =        "Scan attacks on side-channel and fault attack
                 resistant public-key implementations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "207--219",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0045-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0045-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Baldwin:2012:CES,
  author =       "Brian Baldwin and Raveen R. Goundar and Mark Hamilton
                 and William P. Marnane",
  title =        "Co-{$Z$} {ECC} scalar multiplications for hardware,
                 software and hardware-software co-design on embedded
                 systems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "221--240",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0042-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0042-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gueron:2012:PMS,
  author =       "Shay Gueron and Vlad Krasnov",
  title =        "Parallelizing message schedules to accelerate the
                 computations of hash functions",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "241--253",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0037-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0037-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Koeberl:2012:PDA,
  author =       "Patrick Koeberl and Jiangtao Li and Roel Maes and
                 Anand Rajan and Claire Vishik and Marcin W{\'o}jcik and
                 Wei Wu",
  title =        "A practical device authentication scheme using {SRAM}
                 {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "255--269",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0043-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0043-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Anonymous:2012:HCd,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Prouff:2013:ICS,
  author =       "Emmanuel Prouff and Patrick Schaumont",
  title =        "Introduction to the {CHES 2012} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0055-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0055-5;
                 http://link.springer.com/content/pdf/10.1007/s13389-013-0055-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schlosser:2013:SPE,
  author =       "Alexander Schl{\"o}sser and Dmitry Nedospasov and
                 Juliane Kr{\"a}mer and Susanna Orlic and Jean-Pierre
                 Seifert",
  title =        "Simple photonic emission analysis of {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "3--15",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0053-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0053-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ruhrmair:2013:PUP,
  author =       "Ulrich R{\"u}hrmair and Marten van Dijk",
  title =        "On the practical use of physical unclonable functions
                 in oblivious transfer and bit commitment protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "17--28",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0052-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0052-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Heyse:2013:CBC,
  author =       "Stefan Heyse and Tim G{\"u}neysu",
  title =        "Code-based cryptography on reconfigurable hardware:
                 tweaking {Niederreiter} encryption for performance",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "29--43",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0056-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0056-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gerard:2013:UOL,
  author =       "Beno{\^\i}t G{\'e}rard and Fran{\c{c}}ois-Xavier
                 Standaert",
  title =        "Unified and optimized linear collision attacks and
                 their application in a non-profiled setting: extended
                 version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "45--58",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0051-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0051-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Fouque:2013:ARC,
  author =       "Pierre-Alain Fouque and Nicolas Guillermin and
                 Delphine Leresteux and Mehdi Tibouchi and
                 Jean-Christophe Zapalowicz",
  title =        "Attacking {RSA--CRT} signatures with faults on
                 {Montgomery} multiplication",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "59--72",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0050-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0050-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "??--??",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ali:2013:DFA,
  author =       "Sk Subidh Ali and Debdeep Mukhopadhyay and Michael
                 Tunstall",
  title =        "Differential fault analysis of {AES}: towards reaching
                 its limits",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "73--97",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0046-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0046-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Montminy:2013:ICD,
  author =       "David P. Montminy and Rusty O. Baldwin and Michael A.
                 Temple and Eric D. Laspe",
  title =        "Improving cross-device attacks using zero-mean
                 unit-variance normalization",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "99--110",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0038-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0038-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Akinyele:2013:CFR,
  author =       "Joseph A. Akinyele and Christina Garman and Ian Miers
                 and Matthew W. Pagano and Michael Rushanan and Matthew
                 Green and Aviel D. Rubin",
  title =        "{Charm}: a framework for rapidly prototyping
                 cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "111--128",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0057-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0057-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kurdziel:2013:MPO,
  author =       "Michael T. Kurdziel and Marcin Lukowiak and Michael A.
                 Sanfilippo",
  title =        "Minimizing performance overhead in memory encryption",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "129--138",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0047-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0047-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mohamed:2013:IAS,
  author =       "Mohamed Saied Emam Mohamed and Stanislav Bulygin and
                 Michael Zohner and Annelie Heuser and Michael Walter
                 and Johannes Buchmann",
  title =        "Improved algebraic side-channel attack on {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "139--156",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0059-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0059-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Christofi:2013:FVC,
  author =       "Maria Christofi and Boutheina Chetali and Louis Goubin
                 and David Vigilant",
  title =        "Formal verification of a {CRT--RSA} implementation
                 against fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "157--167",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0049-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0049-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Briais:2013:FST,
  author =       "S{\'e}bastien Briais and Jean-Luc Danger and Sylvain
                 Guilley",
  title =        "A formal study of two physical countermeasures against
                 side channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "169--180",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0054-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0054-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Brown:2013:TTC,
  author =       "Mark Brown",
  title =        "Toward a taxonomy of communications security models",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "181--195",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0058-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0058-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yamamoto:2013:VEP,
  author =       "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
                 and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh",
  title =        "Variety enhancement of {PUF} responses using the
                 locations of random outputting {RS} latches",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "197--211",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-012-0044-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0044-0;
                 http://link.springer.com/content/pdf/10.1007/s13389-012-0044-0.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Bhasin:2013:CHA,
  author =       "Shivam Bhasin and Sylvain Guilley and Annelie Heuser
                 and Jean-Luc Danger",
  title =        "From cryptography to hardware: analyzing and
                 protecting embedded {Xilinx} {BRAM} for cryptographic
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "213--225",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0048-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0048-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kamal:2013:SHI,
  author =       "Abdel Alim Kamal and Amr M. Youssef",
  title =        "Strengthening hardware implementations of
                 {NTRUEncrypt} against fault analysis attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "227--240",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0061-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0061-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Danger:2013:SSC,
  author =       "Jean-Luc Danger and Sylvain Guilley and Philippe
                 Hoogvorst and C{\'e}dric Murdica and David Naccache",
  title =        "A synthesis of side-channel attacks on elliptic curve
                 cryptography in smart-cards",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "241--265",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0062-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0062-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCd,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bertoni:2014:ICS,
  author =       "Guido Bertoni and Jean-S{\'e}bastien Coron",
  title =        "Introduction to the {CHES 2013} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "1--1",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0076-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0076-8;
                 http://link.springer.com/content/pdf/10.1007/s13389-014-0076-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Oliveira:2014:TFP,
  author =       "Thomaz Oliveira and Julio L{\'o}pez and Diego F.
                 Aranha and Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "Two is the fastest prime: lambda coordinates for
                 binary elliptic curves",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "3--17",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0069-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0069-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Becker:2014:SDL,
  author =       "Georg T. Becker and Francesco Regazzoni and Christof
                 Paar and Wayne P. Burleson",
  title =        "Stealthy dopant-level hardware {Trojans}: extended
                 version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "19--31",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0068-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0068-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{DeMulder:2014:UBS,
  author =       "Elke {De Mulder} and Michael Hutter and Mark E. Marson
                 and Peter Pearson",
  title =        "Using {Bleichenbacher}'s solution to the hidden number
                 problem to attack nonce leaks in $ 384$-bit {ECDSA}:
                 extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "33--45",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0072-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0072-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Grosso:2014:MVM,
  author =       "Vincent Grosso and Fran{\c{c}}ois-Xavier Standaert and
                 Sebastian Faust",
  title =        "Masking vs. multiparty computation: how large is the
                 gap for {AES}?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "47--57",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0073-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0073-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sugawara:2014:MSC,
  author =       "Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki
                 and Mitsuru Shiozaki and Takeshi Fujino",
  title =        "On measurable side-channel leaks inside {ASIC} design
                 primitives",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "59--73",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0078-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0078-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "??--??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Almeida:2014:LPB,
  author =       "Leonardo C. Almeida and Ewerton R. Andrade and Paulo
                 S. L. M. Barreto and Marcos A. {Simplicio, Jr.}",
  title =        "{Lyra}: password-based key derivation with tunable
                 memory and processing costs",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "75--89",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0063-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0063-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Negre:2014:EBP,
  author =       "Chistophe Negre",
  title =        "Efficient binary polynomial multiplication based on
                 optimized {Karatsuba} reconstruction",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "91--106",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0066-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0066-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carlet:2014:ASC,
  author =       "Claude Carlet and Jean-Luc Danger and Sylvain Guilley
                 and Emmanuel Prouff Houssem Maghrebi",
  title =        "Achieving side-channel high-order correlation immunity
                 with leakage squeezing",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "107--121",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0067-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0067-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Biasi:2014:SEC,
  author =       "Felipe P. Biasi and Paulo S. L. M. Barreto and Rafael
                 Misoczki and Wilson V. Ruggiero",
  title =        "Scaling efficient code-based cryptosystems for
                 embedded platforms",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "123--134",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0070-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0070-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Paul:2014:DSC,
  author =       "Goutam Paul and Anupam Chattopadhyay",
  title =        "Designing stream ciphers with scalable data-widths: a
                 case study with {HC-128}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "135--143",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0071-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0071-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Moro:2014:FVS,
  author =       "N. Moro and K. Heydemann and E. Encrenaz and B.
                 Robisson",
  title =        "Formal verification of a software countermeasure
                 against instruction skip attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "145--156",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0077-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0077-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Belaid:2014:TFR,
  author =       "Sonia Bela{\"\i}d and Fabrizio {De Santis} and Johann
                 Heyszl and Stefan Mangard and Marcel Medwed and
                 J{\o}rn-Marc Schmidt and Fran{\c{c}}ois-Xavier
                 Standaert and Stefan Tillich",
  title =        "Towards fresh re-keying with leakage-resilient {PRFs}:
                 cipher design principles and analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "157--171",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0079-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0079-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rauzy:2014:FPC,
  author =       "Pablo Rauzy and Sylvain Guilley",
  title =        "A formal proof of countermeasures against fault
                 injection attacks on {CRT--RSA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "173--185",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0065-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0065-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kamel:2014:ULI,
  author =       "Dina Kamel and Mathieu Renauld and Denis Flandre and
                 Fran{\c{c}}ois-Xavier Standaert",
  title =        "Understanding the limitations and improving the
                 relevance of {SPICE} simulations in side-channel
                 security evaluations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "187--195",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0080-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0080-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Tiran:2014:MLF,
  author =       "S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and
                 P. Maurine",
  title =        "A model of the leakage in the frequency domain and its
                 application to {CPA} and {DPA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "197--212",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0074-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0074-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schindler:2014:PAP,
  author =       "Werner Schindler and Andreas Wiemers",
  title =        "Power attacks in the presence of exponent blinding",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "213--236",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0081-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0081-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Karati:2014:NAB,
  author =       "Sabyasachi Karati and Abhijit Das and Dipanwita
                 Roychowdhury and Bhargav Bellur and Debojyoti
                 Bhattacharya and Aravind Iyer",
  title =        "New algorithms for batch verification of standard
                 {ECDSA} signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "237--258",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0082-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0082-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Clavier:2014:PIS,
  author =       "Christophe Clavier and Jean-Luc Danger and Guillaume
                 Duc and M. Abdelaziz Elaabid and Beno{\^\i}t G{\'e}rard
                 and Sylvain Guilley and Annelie Heuser and Michael
                 Kasper and Yang Li and Victor Lomn{\'e} and Daisuke
                 Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent
                 Sauvage and Werner Schindler and et al",
  title =        "Practical improvements of side-channel attacks on
                 {AES}: feedback from the 2nd {DPA} contest",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "259--274",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0075-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0075-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bos:2014:CTM,
  author =       "Joppe W. Bos",
  title =        "Constant time modular inversion",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "275--281",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0084-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0084-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HC,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Templin:2015:NPA,
  author =       "Joshua R. Templin and Jason R. Hamlet",
  title =        "A new power-aware {FPGA} design metric",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "1--11",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-013-0060-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0060-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Banik:2015:IDF,
  author =       "Subhadeep Banik and Subhamoy Maitra and Santanu
                 Sarkar",
  title =        "Improved differential fault attack on {MICKEY 2.0}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "13--29",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0083-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0083-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Faz-Hernandez:2015:ESA,
  author =       "Armando Faz-Hern{\'a}ndez and Patrick Longa and Ana H.
                 S{\'a}nchez",
  title =        "Efficient and secure algorithms for {GLV}-based scalar
                 multiplication and their implementation on {GLV--GLS}
                 curves (extended version)",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "31--52",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0085-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0085-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{OFlynn:2015:SSC,
  author =       "Colin O'Flynn and Zhizhang Chen",
  title =        "Synchronous sampling and clock recovery of internal
                 oscillators for side channel analysis and fault
                 injection",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "53--69",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0087-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0087-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Batina:2015:ICS,
  author =       "Lejla Batina and M. J. B. Robshaw",
  title =        "Introduction to the {CHES 2014} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "71--72",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0098-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0098-x;
                 http://link.springer.com/content/pdf/10.1007/s13389-015-0098-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Coron:2015:FEP,
  author =       "Jean-S{\'e}bastien Coron and Arnab Roy and Srinivas
                 Vivek",
  title =        "Fast evaluation of polynomials over binary finite
                 fields and application to side-channel
                 countermeasures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "73--83",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0099-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0099-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sugawara:2015:RSD,
  author =       "Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii
                 and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki
                 and Takeshi Fujino",
  title =        "Reversing stealthy dopant-level circuits",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "85--94",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0102-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0102-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Genkin:2015:GYH,
  author =       "Daniel Genkin and Itamar Pipman and Eran Tromer",
  title =        "Get your hands off my laptop: physical side-channel
                 key-extraction attacks on {PCs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "95--112",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0100-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0100-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Vliegen:2015:PFE,
  author =       "Jo Vliegen and Nele Mentens and Dirk Koch and Dries
                 Schellekens and Ingrid Verbauwhede",
  title =        "Practical feasibility evaluation and improvement of a
                 pay-per-use licensing scheme for hardware {IP} cores in
                 {Xilinx} {FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "113--122",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0088-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0088-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lerman:2015:MLA,
  author =       "Liran Lerman and Gianluca Bontempi and Olivier
                 Markowitch",
  title =        "A machine learning approach against a masked {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "123--139",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0089-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0089-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gueron:2015:FPF,
  author =       "Shay Gueron and Vlad Krasnov",
  title =        "Fast prime field elliptic-curve cryptography with $
                 256$-bit primes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "141--151",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0090-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0090-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guo:2015:SAC,
  author =       "Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin
                 and Ramesh Karri",
  title =        "Security analysis of concurrent error detection
                 against differential fault analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "153--169",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0092-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0092-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Perin:2015:VHC,
  author =       "Guilherme Perin and Laurent Imbert and Philippe
                 Maurine and Lionel Torres",
  title =        "Vertical and horizontal correlation attacks on
                 {RNS}-based exponentiations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "171--185",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0095-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0095-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yamamoto:2015:NME,
  author =       "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
                 and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh
                 and Naoya Torii",
  title =        "A new method for enhancing variety and maintaining
                 reliability of {PUF} responses and its evaluation on
                 {ASICs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "187--199",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-014-0091-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0091-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Hutter:2015:MMA,
  author =       "Michael Hutter and Peter Schwabe",
  title =        "Multiprecision multiplication on {AVR} revisited",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "201--214",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0093-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0093-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "AVR ATmega 8-bit microcontroller; Karatsuba
                 multiplication; microcontroller; multiple-precision
                 multiplication",
}

@Article{Bluhm:2015:FSI,
  author =       "Manuel Bluhm and Shay Gueron",
  title =        "Fast software implementation of binary elliptic curve
                 cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "215--226",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0094-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0094-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "Binary elliptic curve; Binary field arithmetic; ECDHE;
                 ECDSA; Intel AVX pclmulqdq instruction; Mul\&add;
                 Scalar multiplication; Side-channel protection",
}

@Article{Fei:2015:SBS,
  author =       "Yunsi Fei and A. Adam Ding and Jian Lao and Liwei
                 Zhang",
  title =        "A statistics-based success rate model for {DPA} and
                 {CPA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "227--243",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0107-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0107-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hamlet:2015:TOI,
  author =       "Jason R. Hamlet and Robert W. Brocato",
  title =        "Throughput-optimized implementations of {QUAD}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "245--254",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0109-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0109-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lerman:2015:BVD,
  author =       "Liran Lerman and Gianluca Bontempi and Olivier
                 Markowitch",
  title =        "The bias-variance decomposition in profiled attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "255--267",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0106-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0106-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bongiovanni:2015:DVT,
  author =       "Simone Bongiovanni and Francesco Centurelli and
                 Giuseppe Scotti and Alessandro Trifiletti",
  title =        "Design and validation through a frequency-based metric
                 of a new countermeasure to protect nanometer {ICs} from
                 side-channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "269--288",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0096-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0096-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cenk:2015:SNR,
  author =       "Murat Cenk and M. Anwar Hasan",
  title =        "Some new results on binary polynomial multiplication",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "289--303",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0101-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0101-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Konheim:2016:ATM,
  author =       "Alan G. Konheim",
  title =        "Automated teller machines: their history and
                 authentication protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "1--29",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0104-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0104-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Aldaya:2016:ABT,
  author =       "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
                 Sarmiento and Santiago S{\'a}nchez-Solano",
  title =        "{AES T-Box} tampering attack",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "31--48",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0103-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0103-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ferradi:2016:WOC,
  author =       "Houda Ferradi and R{\'e}mi G{\'e}raud and David
                 Naccache and Assia Tria",
  title =        "When organized crime applies academic results: a
                 forensic analysis of an in-card listening device",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "49--59",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0112-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0112-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bayon:2016:FME,
  author =       "Pierre Bayon and Lilian Bossuet and Alain Aubert and
                 Viktor Fischer",
  title =        "Fault model of electromagnetic attacks targeting ring
                 oscillator-based true random number generators",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "61--74",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0113-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0113-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saarinen:2016:BAC,
  author =       "Markku-Juhani O. Saarinen",
  title =        "The {BRUTUS} automatic cryptanalytic framework",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "75--82",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0114-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0114-1;
                 http://link.springer.com/content/pdf/10.1007/s13389-015-0114-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guneysu:2016:ICS,
  author =       "Tim G{\"u}neysu and Helena Handschuh",
  title =        "Introduction to the {CHES 2015} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "83--84",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0130-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0130-9;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0130-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schneider:2016:LAM,
  author =       "Tobias Schneider and Amir Moradi",
  title =        "Leakage assessment methodology",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "85--99",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0120-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0120-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schindler:2016:EEB,
  author =       "Werner Schindler",
  title =        "Exclusive exponent blinding is not enough to prevent
                 any timing attack on {RSA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "101--119",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0124-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0124-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Maes:2016:SKG,
  author =       "Roel Maes and Vincent van der Leest and Erik van der
                 Sluis and Frans Willems",
  title =        "Secure key generation from biased {PUFs}: extended
                 version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "121--137",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0125-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0125-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Reparaz:2016:MRL,
  author =       "Oscar Reparaz and Sujoy Sinha Roy and Ruan de Clercq
                 and Frederik Vercauteren and Ingrid Verbauwhede",
  title =        "Masking ring-{LWE}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "139--153",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0126-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0126-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Coisel:2016:ICD,
  author =       "Iwen Coisel and Ignacio Sanchez",
  title =        "Improved cryptanalysis of the {DECT} standard cipher",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "155--169",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0127-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0127-4;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0127-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lemire:2016:FBU,
  author =       "Daniel Lemire and Owen Kaser",
  title =        "Faster $ 64$-bit universal hashing using carry-less
                 multiplications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "171--185",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0110-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0110-5;
                 http://link.springer.com/article/10.1007/s13389-015-0110-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Goundar:2016:IFA,
  author =       "Raveen R. Goundar and Marc Joye",
  title =        "Inversion-free arithmetic on elliptic curves through
                 isomorphisms",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "187--199",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0131-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0131-8;
                 http://link.springer.com/article/10.1007/s13389-016-0131-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rauzy:2016:FPS,
  author =       "Pablo Rauzy and Sylvain Guilley and Zakaria Najm",
  title =        "Formally proved security of assembly code against
                 power analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "201--216",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0105-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0105-2;
                 http://link.springer.com/article/10.1007/s13389-015-0105-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Robisson:2016:PFC,
  author =       "Bruno Robisson and H{\'e}l{\`e}ne {Le Bouder}",
  title =        "Physical functions: the common factor of side-channel
                 and fault attacks?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "217--227",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0111-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0111-4;
                 http://link.springer.com/article/10.1007/s13389-015-0111-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Galindo:2016:ILR,
  author =       "David Galindo and Johann Gro{\ss}sch{\"a}dl and Zhe
                 Liu and Praveen Kumar Vadnala and Srinivas Vivek",
  title =        "Implementation of a leakage-resilient {ElGamal} key
                 encapsulation mechanism",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "229--238",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0121-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0121-x;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ngo:2016:MTA,
  author =       "Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and
                 Sylvain Guilley and Jean-Luc Danger",
  title =        "Method taking into account process dispersion to
                 detect hardware {Trojan Horse} by side-channel
                 analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "239--247",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0129-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0129-2;
                 http://link.springer.com/article/10.1007/s13389-016-0129-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ganji:2016:PLA,
  author =       "Fatemeh Ganji and Shahin Tajik and Jean-Pierre
                 Seifert",
  title =        "{PAC} learning of arbiter {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "249--258",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0119-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0119-4;
                 http://link.springer.com/article/10.1007/s13389-016-0119-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Bos:2016:SEC,
  author =       "Joppe W. Bos and Craig Costello and Patrick Longa and
                 Michael Naehrig",
  title =        "Selecting elliptic curves for cryptography: an
                 efficiency and security analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "259--286",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0097-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0097-y;
                 http://link.springer.com/article/10.1007/s13389-015-0097-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Wenger:2016:HBF,
  author =       "Erich Wenger and Paul Wolfger",
  title =        "Harder, better, faster, stronger: elliptic curve
                 discrete logarithm computations on {FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "287--297",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-015-0108-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0108-z;
                 http://link.springer.com/article/10.1007/s13389-015-0108-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Khalid:2016:RRP,
  author =       "Ayesha Khalid and Muhammad Hassan and Goutam Paul and
                 Anupam Chattopadhyay",
  title =        "{RunFein}: a rapid prototyping framework for {Feistel}
                 and {SPN}-based block ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "299--323",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0116-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0116-7;
                 http://link.springer.com/article/10.1007/s13389-016-0116-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Moein:2016:HAA,
  author =       "Samer Moein and Fayez Gebali and T. Aaron Gulliver",
  title =        "Hardware attacks: an algebraic approach",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "325--337",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0117-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0117-6;
                 http://link.springer.com/article/10.1007/s13389-016-0117-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ghafar:2016:SRV,
  author =       "Amir Hamzah Abd Ghafar and Muhammad Rezal Kamel
                 Ariffin",
  title =        "{SPA} on {Rabin} variant with public key {$ N = p^2 q
                 $}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "339--346",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0118-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0118-5;
                 http://link.springer.com/article/10.1007/s13389-016-0118-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carbone:2017:MIA,
  author =       "Mathieu Carbone and Yannick Teglia and Gilles R.
                 Ducharme and Philippe Maurine",
  title =        "Mutual information analysis: higher-order statistical
                 moments, efficiency and efficacy",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "1--17",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0123-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0123-8;
                 http://link.springer.com/article/10.1007/s13389-016-0123-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guilley:2017:EAP,
  author =       "Sylvain Guilley",
  title =        "Editorial about {PROOFS 2015}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "19--20",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0140-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0140-7;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0140-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Idrissi:2017:TCM,
  author =       "Noreddine El Janati {El Idrissi} and Guillaume
                 Bouffard and Jean-Louis Lanet and Said {El Hajji}",
  title =        "Trust can be misplaced",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "21--34",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0142-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0142-5;
                 http://link.springer.com/article/10.1007/s13389-016-0142-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Nashimoto:2017:BOA,
  author =       "Shoei Nashimoto and Naofumi Homma and Yu-ichi Hayashi
                 and Junko Takahashi and Hitoshi Fuji and Takafumi
                 Aoki",
  title =        "Buffer overflow attack with multiple fault injection
                 and a proven countermeasure",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "35--46",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0136-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0136-3;
                 http://link.springer.com/article/10.1007/s13389-016-0136-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Robisson:2017:SSM,
  author =       "Bruno Robisson and Michel Agoyan and Patrick Soquet
                 and S{\'e}bastien Le-Henaff and Franck Wajsb{\"u}rt and
                 Pirouz Bazargan-Sabet and Guillaume Phan",
  title =        "Smart security management in secure devices",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "47--61",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0143-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0143-4;
                 http://link.springer.com/article/10.1007/s13389-016-0143-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lugou:2017:STU,
  author =       "Florian Lugou and Ludovic Apvrille and Aur{\'e}lien
                 Francillon",
  title =        "{SMASHUP}: a toolchain for unified verification of
                 hardware\slash software co-designs",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "63--74",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0145-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0145-2;
                 http://link.springer.com/article/10.1007/s13389-016-0145-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Azzi:2017:ULC,
  author =       "Sabine Azzi and Bruno Barras and Maria Christofi and
                 David Vigilant",
  title =        "Using linear codes as a fault countermeasure for
                 nonlinear operations: application to {AES} and formal
                 verification",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "75--85",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0138-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0138-1;
                 http://link.springer.com/article/10.1007/s13389-016-0138-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sauvage:2017:MLF,
  author =       "Laurent Sauvage and Tarik Graba and Thibault
                 Porteboeuf",
  title =        "Multi-level formal verification",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "1",
  pages =        "87--95",
  month =        apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0144-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun Apr 2 17:26:33 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0144-3;
                 http://link.springer.com/article/10.1007/s13389-016-0144-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gierlichs:2017:ICS,
  author =       "Benedikt Gierlichs and Axel Y. Poschmann",
  title =        "Introduction to the {CHES 2016} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "2",
  pages =        "97--98",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0158-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jun 24 12:13:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/content/pdf/10.1007/s13389-017-0158-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yarom:2017:CTA,
  author =       "Yuval Yarom and Daniel Genkin and Nadia Heninger",
  title =        "{CacheBleed}: a timing attack on {OpenSSL}
                 constant-time {RSA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "2",
  pages =        "99--112",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jun 24 12:13:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ganji:2017:HNM,
  author =       "Fatemeh Ganji and Shahin Tajik and Fabian
                 F{\"a}{\ss}ler and Jean-Pierre Seifert",
  title =        "Having no mathematical model may not secure {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "2",
  pages =        "113--128",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jun 24 12:13:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Durvaux:2017:TEL,
  author =       "Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois-Xavier
                 Standaert and Santos Merino {Del Pozo}",
  title =        "Towards easy leakage certification: extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "2",
  pages =        "129--147",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jun 24 12:13:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Boss:2017:SBS,
  author =       "Erik Boss and Vincent Grosso and Tim G{\"u}neysu and
                 Gregor Leander and Amir Moradi and Tobias Schneider",
  title =        "Strong $8$-bit {Sboxes} with efficient masking in
                 hardware extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "2",
  pages =        "149--165",
  month =        jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jun 24 12:13:17 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bottinelli:2017:CAC,
  author =       "Paul Bottinelli and Joppe W. Bos",
  title =        "Computational aspects of correlation power analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "3",
  pages =        "167--181",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0122-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Aug 25 11:38:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0122-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ordas:2017:EFI,
  author =       "S. Ordas and L. Guillaume-Sage and P. Maurine",
  title =        "Electromagnetic fault injection: the curse of
                 flip-flops",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "3",
  pages =        "183--197",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0128-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Aug 25 11:38:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0128-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Swierczynski:2017:IPH,
  author =       "Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe
                 and Amir Moradi and Christof Paar",
  title =        "Interdiction in practice --- Hardware {Trojan} against
                 a high-security {USB} flash drive",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "3",
  pages =        "199--211",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0132-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Aug 25 11:38:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0132-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mayhew:2017:OHL,
  author =       "Matthew Mayhew and Radu Muresan",
  title =        "An overview of hardware-level statistical power
                 analysis attack countermeasures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "3",
  pages =        "213--244",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0133-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Aug 25 11:38:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0133-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Negre:2017:ERM,
  author =       "Christophe Negre and Thomas Plantard",
  title =        "Efficient regular modular exponentiation using
                 multiplicative half-size splitting",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "3",
  pages =        "245--253",
  month =        sep,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0134-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Aug 25 11:38:26 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0134-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schindler:2017:GPA,
  author =       "Werner Schindler and Andreas Wiemers",
  title =        "Generic power attacks on {RSA} with {CRT} and exponent
                 blinding: new results",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "255--272",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0146-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0146-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Aldaya:2017:SVB,
  author =       "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
                 Sarmiento and Santiago S{\'a}nchez-Solano",
  title =        "{SPA} vulnerabilities of the binary extended
                 {Euclidean} algorithm",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "273--285",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0135-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 23 09:04:19 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0135-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Pasalic:2017:EIG,
  author =       "Enes Pasalic and Anupam Chattopadhyay and WeiGuo
                 Zhang",
  title =        "Efficient implementation of generalized
                 {Maiorana--McFarland} class of cryptographic
                 functions",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "287--295",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0139-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0139-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Homma:2017:IPS,
  author =       "Naofumi Homma",
  title =        "Introduction to the {PROOFS 2016} special section",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "297--298",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0173-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0173-6;
                 https://link.springer.com/content/pdf/10.1007/s13389-017-0173-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bhattacharya:2017:FFA,
  author =       "Sarani Bhattacharya and Debdeep Mukhopadhyay",
  title =        "Formal fault analysis of branch predictors: attacking
                 countermeasures of asymmetric key ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "299--310",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0165-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0165-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Breier:2017:SAS,
  author =       "Jakub Breier and Dirmanto Jap and Shivam Bhasin",
  title =        "A study on analyzing side-channel resistant encoding
                 schemes with respect to fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "311--320",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0166-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0166-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dugardin:2017:UME,
  author =       "Margaux Dugardin and Sylvain Guilley and Martin Moreau
                 and Zakaria Najm and Pablo Rauzy",
  title =        "Using modular extension to provably protect {Edwards}
                 curves against fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "321--330",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0167-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0167-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bruneau:2017:OSC,
  author =       "Nicolas Bruneau and Sylvain Guilley and Annelie Heuser
                 and Damien Marion and Olivier Rioul",
  title =        "Optimal side-channel attacks for multivariate leakages
                 and multiple models",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "331--341",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0170-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0170-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Picek:2017:TAV,
  author =       "Stjepan Picek and Annelie Heuser and Sylvain Guilley",
  title =        "Template attack versus {Bayes} classifier",
  journal =      j-J-CRYPTO-ENG,
  volume =       "7",
  number =       "4",
  pages =        "343--351",
  month =        nov,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0172-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0172-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ge:2018:SMT,
  author =       "Qian Ge and Yuval Yarom and David Cock and Gernot
                 Heiser",
  title =        "A survey of microarchitectural timing attacks and
                 countermeasures on contemporary hardware",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "1",
  pages =        "1--27",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0141-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0141-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chakraborti:2018:TUT,
  author =       "Avik Chakraborti and Anupam Chattopadhyay and Muhammad
                 Hassan and Mridul Nandi",
  title =        "{TriviA} and {uTriviA}: two fast and secure
                 authenticated encryption schemes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "1",
  pages =        "29--48",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0137-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0137-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chakraborty:2018:DED,
  author =       "Debrup Chakraborty and Cuauhtemoc Mancillas L{\'o}pez
                 and Palash Sarkar",
  title =        "Disk encryption: do we need to preserve length?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "1",
  pages =        "49--69",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-016-0147-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0147-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saarinen:2018:ACB,
  author =       "Markku-Juhani O. Saarinen",
  title =        "Arithmetic coding and blinding countermeasures for
                 lattice signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "1",
  pages =        "71--84",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0149-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0149-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ferradi:2018:RPN,
  author =       "Houda Ferradi and R{\'e}mi G{\'e}raud and Diana Maimut
                 and David Naccache and Amaury de Wargny",
  title =        "Regulating the pace of {von Neumann} correctors",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "1",
  pages =        "85--91",
  month =        apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0153-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0153-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Fischer:2018:ICS,
  author =       "Wieland Fischer and Naofumi Homma",
  title =        "Introduction to the {CHES 2017} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "2",
  pages =        "93--94",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0189-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0189-6;
                 https://link.springer.com/content/pdf/10.1007/s13389-018-0189-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chou:2018:MRT,
  author =       "Tung Chou",
  title =        "{McBits} revisited: toward a fast constant-time
                 code-based {KEM}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "2",
  pages =        "95--107",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0186-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0186-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gross:2018:UMA,
  author =       "Hannes Gross and Stefan Mangard",
  title =        "A unified masking approach",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "2",
  pages =        "109--124",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0184-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0184-y;
                 https://link.springer.com/content/pdf/10.1007/s13389-018-0184-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Immler:2018:YRC,
  author =       "Vincent Immler and Robert Specht and Florian
                 Unterstein",
  title =        "Your rails cannot hide from localized {EM}: how
                 dual-rail logic fails on {FPGAs} --- extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "2",
  pages =        "125--139",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0185-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0185-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hatzivasilis:2018:RLB,
  author =       "George Hatzivasilis and Konstantinos Fysarakis and
                 Ioannis Papaefstathiou and Charalampos Manifavas",
  title =        "A review of lightweight block ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "2",
  pages =        "141--184",
  month =        jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0160-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sun May 27 08:23:24 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0160-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rodriguez-Henriquez:2018:SIH,
  author =       "Francisco Rodr{\'\i}guez-Henr{\'\i}quez and Erkay
                 Savas",
  title =        "Special issue in honor of {Peter Lawrence
                 Montgomery}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "185--187",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0168-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0168-3;
                 https://link.springer.com/content/pdf/10.1007/s13389-017-0168-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bajard:2018:MRW,
  author =       "Jean-Claude Bajard and Julien Eynard and Nabil
                 Merkiche",
  title =        "{Montgomery} reduction within the context of residue
                 number system arithmetic",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "189--200",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0154-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0154-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Savas:2018:MI,
  author =       "Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}",
  title =        "{Montgomery} inversion",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "201--210",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0161-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0161-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dai:2018:SAM,
  author =       "Wangchen Dai and Ray C. C. Cheung",
  title =        "Spectral arithmetic in {Montgomery} modular
                 multiplication",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "211--226",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0151-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0151-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Costello:2018:MCT,
  author =       "Craig Costello and Benjamin Smith",
  title =        "{Montgomery} curves and their arithmetic",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "227--240",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0157-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0157-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Oliveira:2018:MLB,
  author =       "Thomaz Oliveira and Julio L{\'o}pez and Francisco
                 Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
  title =        "The {Montgomery} ladder on binary elliptic curves",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "241--258",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0163-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0163-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cenk:2018:KLF,
  author =       "Murat Cenk",
  title =        "{Karatsuba}-like formulae and their associated
                 techniques",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "3",
  pages =        "259--269",
  month =        sep,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0155-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0155-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Farias:2018:CSE,
  author =       "Luckas A. Farias and Bruno C. Albertini and Paulo S.
                 L. M. Barreto",
  title =        "A class of safe and efficient binary {Edwards}
                 curves",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "271--283",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0174-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0174-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Jarvinen:2018:ATA,
  author =       "Kimmo J{\"a}rvinen and Sujoy Sinha Roy and Ingrid
                 Verbauwhede",
  title =        "Arithmetic of $ \tau $-adic expansions for lightweight
                 {Koblitz} curve cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "285--300",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0182-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0182-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lerman:2018:TAV,
  author =       "Liran Lerman and Romain Poussier and Olivier
                 Markowitch and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Template attacks versus machine learning revisited and
                 the curse of dimensionality in side-channel analysis:
                 extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "301--313",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0162-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0162-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{DeVale:2018:ADI,
  author =       "John DeVale and Ryan Rakvic and Kevin Rudd",
  title =        "Another dimension in integrated circuit trust",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "315--326",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0164-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0164-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Karmakar:2018:SBS,
  author =       "Sandip Karmakar and Dipanwita Roy Chowdhury",
  title =        "Scan-based side channel attack on stream ciphers and
                 its prevention",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "327--340",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0178-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0178-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Skoric:2018:TDS,
  author =       "Boris Skori{\'c}",
  title =        "A trivial debiasing scheme for {Helper Data Systems}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "341--349",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0183-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0183-z;
                 https://link.springer.com/content/pdf/10.1007/s13389-018-0183-z.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dosso:2018:EAC,
  author =       "Yssouf Dosso and Fabien Herbaut and Nicolas M{\'e}loni
                 and Pascal V{\'e}ron",
  title =        "{Euclidean} addition chains scalar multiplication on
                 curves with efficient endomorphism",
  journal =      j-J-CRYPTO-ENG,
  volume =       "8",
  number =       "4",
  pages =        "351--367",
  month =        nov,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0190-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:50 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0190-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hutchinson:2019:CMD,
  author =       "Aaron Hutchinson and Koray Karabina",
  title =        "Constructing multidimensional differential addition
                 chains and their applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "1",
  pages =        "1--19",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0177-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0177-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Batina:2019:OTA,
  author =       "Lejla Batina and {\L}ukasz Chmielewski and Louiza
                 Papachristodoulou and Peter Schwabe and Michael
                 Tunstall",
  title =        "Online template attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "1",
  pages =        "21--36",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0171-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0171-8;
                 https://link.springer.com/content/pdf/10.1007/s13389-017-0171-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Diop:2019:TPH,
  author =       "Ibrahima Diop and Yanis Linge and Thomas Ordas and
                 Pierre-Yvan Liardet and Philippe Maurine",
  title =        "From theory to practice: horizontal attacks on
                 protected implementations of modular exponentiations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "1",
  pages =        "37--52",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0181-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0181-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saha:2019:IDF,
  author =       "Dhiman Saha and Dipanwita Roy Chowdhury",
  title =        "Internal differential fault analysis of parallelizable
                 ciphers in the counter-mode",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "1",
  pages =        "53--67",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0179-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0179-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Banik:2019:CCC,
  author =       "Subhadeep Banik and Andrey Bogdanov and Francesco
                 Regazzoni",
  title =        "Compact circuits for combined {AES} encryption\slash
                 decryption",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "1",
  pages =        "69--83",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0176-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0176-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Konheim:2019:HFI,
  author =       "Alan G. Konheim",
  title =        "{Horst Feistel}: the inventor of {LUCIFER}, the
                 cryptographic algorithm that changed cryptology",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "1",
  pages =        "85--100",
  month =        apr,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0198-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0198-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ueno:2019:HEG,
  author =       "Rei Ueno and Naofumi Homma and Yasuyuki Nogami and
                 Takafumi Aoki",
  title =        "Highly efficient {$ \textit {GF}(2^8) $} inversion
                 circuit based on hybrid {GF} representations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "2",
  pages =        "101--113",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0187-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0187-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Robert:2019:EFB,
  author =       "Jean-Marc Robert and Christophe Negre and Thomas
                 Plantard",
  title =        "Efficient Fixed-base exponentiation and scalar
                 multiplication based on a multiplicative splitting
                 exponent recoding",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "2",
  pages =        "115--136",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0196-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0196-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Unterluggauer:2019:MME,
  author =       "Thomas Unterluggauer and Mario Werner and Stefan
                 Mangard",
  title =        "{MEAS}: memory encryption and authentication secure
                 against side-channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "2",
  pages =        "137--158",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0180-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0180-2;
                 https://link.springer.com/content/pdf/10.1007/s13389-018-0180-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Peccerillo:2019:PBA,
  author =       "Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin
                 Kaya Ko{\c{c}}",
  title =        "Parallel bitsliced {AES} through {PHAST}: a
                 single-source high-performance library for multi-cores
                 and {GPUs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "2",
  pages =        "159--171",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-017-0175-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-017-0175-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hutter:2019:CTH,
  author =       "Michael Hutter and Michael Tunstall",
  title =        "Constant-time higher-order {Boolean}-to-arithmetic
                 masking",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "2",
  pages =        "173--184",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0191-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0191-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Herbert:2019:DIL,
  author =       "Vincent Herbert and Bhaskar Biswas and Caroline
                 Fontaine",
  title =        "Design and implementation of low-depth pairing-based
                 homomorphic encryption scheme",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "2",
  pages =        "185--201",
  month =        jun,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0192-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:51 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0192-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saha:2019:AFE,
  author =       "Sayandeep Saha and Ujjawal Kumar and Debdeep
                 Mukhopadhyay and Pallab Dasgupta",
  title =        "An automated framework for exploitable fault
                 identification in block ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "203--219",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00203-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00203-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Wisiol:2019:WAL,
  author =       "Nils Wisiol and Marian Margraf",
  title =        "Why attackers lose: design and security analysis of
                 arbitrarily large {XOR} arbiter {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "221--230",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00204-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00204-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{BenElOuahma:2019:SCR,
  author =       "In{\`e}s {Ben El Ouahma} and Quentin L. Meunier and
                 Karine Heydemann and Emmanuelle Encrenaz",
  title =        "Side-channel robustness analysis of masked assembly
                 codes using a symbolic approach",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "231--242",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00205-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00205-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Baumann:2019:VSL,
  author =       "Christoph Baumann and Oliver Schwarz and Mads Dam",
  title =        "On the verification of system-level information flow
                 properties for virtualized execution platforms",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "243--261",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00216-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00216-4;
                 https://link.springer.com/content/pdf/10.1007/s13389-019-00216-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Das:2019:AGH,
  author =       "Poulami Das and Debapriya Basu Roy and Debdeep
                 Mukhopadhyay",
  title =        "Automatic generation of {HCCA}-resistant scalar
                 multiplication algorithm by proper sequencing of field
                 multiplier operands",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "263--275",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00219-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00219-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Geraud:2019:MRN,
  author =       "R{\'e}mi G{\'e}raud and David Naccache",
  title =        "Mixed-radix {Naccache--Stern} encryption",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "277--282",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0188-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0188-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dinu:2019:TLB,
  author =       "Daniel Dinu and Yann {Le Corre} and Dmitry
                 Khovratovich and L{\'e}o Perrin and Johann
                 Gro{\ss}sch{\"a}dl and Alex Biryukov",
  title =        "Triathlon of lightweight block ciphers for the
                 {Internet of Things}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "283--302",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0193-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0193-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carlet:2019:PDS,
  author =       "Claude Carlet and Abderrahman Daif and Sylvain Guilley
                 and C{\'e}dric Tavernier",
  title =        "Polynomial direct sum masking to protect against both
                 {SCA} and {FIA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "3",
  pages =        "303--312",
  month =        sep,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0194-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Oct 2 11:24:52 MDT 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0194-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kawamura:2019:RMR,
  author =       "Shinichi Kawamura and Yuichi Komano and Hideo Shimizu
                 and Tomoko Yonemura",
  title =        "{RNS} {Montgomery} reduction algorithms using
                 quadratic residuosity",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "313--331",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0195-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0195-8;
                 https://link.springer.com/content/pdf/10.1007/s13389-018-0195-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saldamli:2019:UMM,
  author =       "Gokay Saldamli and Yoo-Jin Baek",
  title =        "Uniform {Montgomery} multiplier",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "333--339",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00213-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00213-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Drucker:2019:TSO,
  author =       "Nir Drucker and Shay Gueron",
  title =        "A toolbox for software optimization of {QC--MDPC}
                 code-based cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "341--357",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-00200-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-00200-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Banegas:2019:NCI,
  author =       "Gustavo Banegas and Ricardo Cust{\'o}dio and Daniel
                 Panario",
  title =        "A new class of irreducible pentanomials for
                 polynomial-based multipliers in binary fields",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "359--373",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-0197-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-0197-6;
                 https://link.springer.com/content/pdf/10.1007/s13389-018-0197-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cianfriglia:2019:KAR,
  author =       "Marco Cianfriglia and Stefano Guarino and Massimo
                 Bernaschi and Flavio Lombardi and Marco Pedicini",
  title =        "Kite attack: reshaping the cube attack for a flexible
                 {GPU}-based maxterm search",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "375--392",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00217-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00217-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Levina:2019:PMS,
  author =       "Alla Levina and Roman Mostovoi and Daria Sleptsova and
                 Lavrentii Tcvetkov",
  title =        "Physical model of sensitive data leakage from
                 {PC}-based cryptographic systems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "393--400",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00215-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00215-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Wu:2019:FUE,
  author =       "Tao Wu and Ruomei Wang",
  title =        "Fast unified elliptic curve point multiplication for
                 {NIST} prime curves on {FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "9",
  number =       "4",
  pages =        "401--410",
  month =        nov,
  year =         "2019",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00211-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Nov 30 08:02:44 MST 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00211-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389w",
}

@Article{Jauvart:2020:ISC,
  author =       "Damien Jauvart and Nadia El Mrabet and Jacques J. A.
                 Fournier and Louis Goubin",
  title =        "Improving side-channel attacks against pairing-based
                 cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "1",
  pages =        "1--16",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-00201-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 8 10:09:54 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-00201-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Barthe:2020:IPM,
  author =       "Gilles Barthe and Sonia Bela{\"\i}d and Fran{\c{c}}ois
                 Dupressoir and Pierre-Alain Fouque and Benjamin
                 Gr{\'e}goire and Fran{\c{c}}ois-Xavier Standaert and
                 Pierre-Yves Strub",
  title =        "Improved parallel mask refreshing algorithms: generic
                 solutions with parametrized non-interference and
                 automated optimizations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "1",
  pages =        "17--26",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-018-00202-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 8 10:09:54 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-018-00202-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Abarzua:2020:SVA,
  author =       "Rodrigo Abarz{\'u}a and Santi Mart{\'\i}nez and
                 Valeria Mendoza and Nicolas Th{\'e}riault",
  title =        "Same value analysis on {Edwards} curves",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "1",
  pages =        "27--48",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00206-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 8 10:09:54 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00206-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Goubin:2020:HRS,
  author =       "Louis Goubin and Pascal Paillier and Matthieu Rivain
                 and Junwei Wang",
  title =        "How to reveal the secrets of an obscure white-box
                 implementation",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "1",
  pages =        "49--66",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00207-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 8 10:09:54 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00207-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Willers:2020:FDC,
  author =       "Oliver Willers and Christopher Huth and Jorge Guajardo
                 and Helmut Seidel and Peter Deutsch",
  title =        "On the feasibility of deriving cryptographic keys from
                 {MEMS} sensors",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "1",
  pages =        "67--83",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00208-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 8 10:09:54 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00208-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Zhou:2020:DLM,
  author =       "Yuanyuan Zhou and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Deep learning mitigates but does not annihilate the
                 need of aligned traces and a generalized {ResNet} model
                 for side-channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "1",
  pages =        "85--95",
  month =        apr,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00209-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 8 10:09:54 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00209-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bos:2020:FMA,
  author =       "Joppe W. Bos and Simon J. Friedberger",
  title =        "Faster modular arithmetic for isogeny-based crypto on
                 embedded devices",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "2",
  pages =        "97--109",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00214-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jul 25 08:32:22 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00214-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Didier:2020:EMO,
  author =       "Laurent-St{\'e}phane Didier and Fangan-Yssouf Dosso
                 and Pascal V{\'e}ron",
  title =        "Efficient modular operations using the adapted modular
                 number system",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "2",
  pages =        "111--133",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00221-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jul 25 08:32:22 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00221-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hettwer:2020:AML,
  author =       "Benjamin Hettwer and Stefan Gehrer and Tim
                 G{\"u}neysu",
  title =        "Applications of machine learning techniques in
                 side-channel attacks: a survey",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "2",
  pages =        "135--162",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00212-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jul 25 08:32:22 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00212-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Benadjila:2020:DLS,
  author =       "Ryad Benadjila and Emmanuel Prouff and R{\'e}mi
                 Strullu and Eleonora Cagli and C{\'e}cile Dumas",
  title =        "Deep learning for side-channel analysis and
                 introduction to {ASCAD} database",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "2",
  pages =        "163--188",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00220-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jul 25 08:32:22 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00220-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Orumiehchiha:2020:DFA,
  author =       "Mohammad Ali Orumiehchiha and Saeed Rostami and Elham
                 Shakour and Josef Pieprzyk",
  title =        "A differential fault attack on the {WG} family of
                 stream ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "2",
  pages =        "189--195",
  month =        jun,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00222-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Jul 25 08:32:22 MDT 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00222-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Piccoli:2020:PMB,
  author =       "Alessandro {De Piccoli} and Andrea Visconti and
                 Ottavio Giulio Rizzo",
  title =        "Polynomial multiplication over binary finite fields:
                 new upper bounds",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "3",
  pages =        "197--210",
  month =        sep,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00210-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:04 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00210-w",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cruz:2020:ESS,
  author =       "Rafael J. Cruz and Antonio Guimar{\~a}es and Diego F.
                 Aranha",
  title =        "Efficient and secure software implementations of
                 {Fantomas}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "3",
  pages =        "211--228",
  month =        sep,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-019-00218-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:04 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-019-00218-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hiller:2020:REC,
  author =       "Matthias Hiller and Ludwig K{\"u}rzinger and Georg
                 Sigl",
  title =        "Review of error correction for {PUFs} and evaluation
                 on state-of-the-art {FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "3",
  pages =        "229--247",
  month =        sep,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00223-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:04 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00223-w;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00223-w.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Schoinianakis:2020:RAS,
  author =       "Dimitrios Schoinianakis",
  title =        "Residue arithmetic systems in cryptography: a survey
                 on modern security applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "3",
  pages =        "249--267",
  month =        sep,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00231-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:04 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00231-w",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Wiemers:2020:RSR,
  author =       "Andreas Wiemers",
  title =        "A remark on a success rate model for side-channel
                 attack analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "3",
  pages =        "269--274",
  month =        sep,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00235-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:04 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00235-6;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00235-6.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Richter:2020:TAN,
  author =       "Bastian Richter and Amir Moradi",
  title =        "Template attacks on nano-scale {CMOS} devices",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "3",
  pages =        "275--285",
  month =        sep,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00225-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:04 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00225-8;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00225-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Batina:2020:PE,
  author =       "Lejla Batina and Nele Mentens",
  title =        "{PROOFS} 2018 Editorial",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "4",
  pages =        "287--287",
  month =        nov,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00248-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00248-1;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00248-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Alam:2020:IAH,
  author =       "Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen
                 Kadiyala and Siew-Kei Lam and Thambipillai Srikanthan",
  title =        "Improving accuracy of {HPC}-based malware
                 classification for embedded platforms using gradient
                 descent optimization",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "4",
  pages =        "289--303",
  month =        nov,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00232-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00232-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sijacic:2020:TEA,
  author =       "Danilo Sijaci{\'c} and Josep Balasch and Bohan Yang
                 and Santosh Ghosh and Ingrid Verbauwhede",
  title =        "Towards efficient and automated side-channel
                 evaluations at design time",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "4",
  pages =        "305--319",
  month =        nov,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00233-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00233-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gay:2020:ECS,
  author =       "Mael Gay and Batya Karp and Osnat Keren and Ilia
                 Polian",
  title =        "Error control scheme for malicious and natural faults
                 in cryptographic modules",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "4",
  pages =        "321--336",
  month =        nov,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00234-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00234-7;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00234-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ouladj:2020:PTA,
  author =       "Maamar Ouladj and Nadia {El Mrabet} and Sylvain
                 Guilley and Philippe Guillot and Gilles
                 Mill{\'e}rioux",
  title =        "On the power of template attacks in highly
                 multivariate context",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "4",
  pages =        "337--354",
  month =        nov,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00239-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00239-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Baksi:2020:IIC,
  author =       "Anubhab Baksi and Dhiman Saha and Sumanta Sarkar",
  title =        "To infect or not to infect: a critical analysis of
                 infective countermeasures in fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "10",
  number =       "4",
  pages =        "355--374",
  month =        nov,
  year =         "2020",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00224-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00224-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yeo:2021:IAA,
  author =       "Sze Ling Yeo and Duc-Phong Le and Khoongming Khoo",
  title =        "Improved algebraic attacks on lightweight block
                 ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "1",
  pages =        "1--19",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00237-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00237-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Resende:2021:FUP,
  author =       "Amanda Cristina Davi Resende and Diego de Freitas
                 Aranha",
  title =        "Faster unbalanced {Private Set Intersection} in the
                 semi-honest setting",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "1",
  pages =        "21--38",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00242-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00242-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bronchain:2021:RRT,
  author =       "Olivier Bronchain and Tobias Schneider and
                 Fran{\c{c}}ois-Xavier Standaert",
  title =        "Reducing risks through simplicity: high side-channel
                 security for lazy engineers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "1",
  pages =        "39--55",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00241-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00241-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Pereira:2021:OPA,
  author =       "Geovandro Pereira and Javad Doliskani and David Jao",
  title =        "$x$-only point addition formula and faster compressed
                 {SIKE}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "1",
  pages =        "57--69",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00245-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00245-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Abarzua:2021:SPS,
  author =       "Rodrigo Abarz{\'u}a and Claudio Valencia and Julio
                 L{\'o}pez",
  title =        "Survey on performance and security problems of
                 countermeasures for passive side-channel attacks on
                 {ECC}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "1",
  pages =        "71--102",
  month =        apr,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00257-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri May 7 08:20:05 MDT 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00257-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Heydemann:2021:EAP,
  author =       "Karine Heydemann and Letitia Li",
  title =        "Editorial about {PROOFS 2019}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "103--104",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00236-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See correction \cite{Heydemann:2021:CEA}.",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00236-5;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00236-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ganji:2021:RPC,
  author =       "Fatemeh Ganji and Shahin Tajik and Pascal Stauss and
                 Jean-Pierre Seifert and Mark Tehranipoor and Domenic
                 Forte",
  title =        "Rock'n'roll {PUFs}: crafting provably secure {PUFs}
                 from less secure ones (extended version)",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "105--118",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00226-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00226-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Cheng:2021:DFI,
  author =       "Wei Cheng and Claude Carlet and Kouassi Goli and
                 Jean-Luc Danger and Sylvain Guilley",
  title =        "Detecting faults in inner product masking scheme",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "119--133",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00227-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00227-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Perianin:2021:EEA,
  author =       "Thomas Perianin and Sebastien Carr{\'e} and Victor
                 Dyseryn and Adrien Facon and Sylvain Guilley",
  title =        "End-to-end automated cache-timing attack driven by
                 machine learning",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "135--146",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00228-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00228-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Keren:2021:IRC,
  author =       "Osnat Keren and Ilia Polian",
  title =        "{IPM-RED}: combining higher-order masking with robust
                 error detection",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "147--160",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00229-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00229-4;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00229-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ueno:2021:MCS,
  author =       "Rei Ueno and Junko Takahashi and Yu-ichi Hayashi and
                 Naofumi Homma",
  title =        "A method for constructing sliding windows leak from
                 noisy cache timing information",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "161--170",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00230-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00230-x;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00230-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kamel:2021:SCA,
  author =       "Dina Kamel and Davide Bellizia and Olivier Bronchain
                 and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Side-channel analysis of a learning parity with
                 physical noise processor",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "171--179",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00238-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00238-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Jacobson:2021:RWK,
  author =       "Michael John {Jacobson, Jr.} and Prabhat Kushwaha",
  title =        "Removable weak keys for discrete logarithm-based
                 cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "181--195",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00250-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00250-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Heydemann:2021:CEA,
  author =       "Karine Heydemann and Letitia Li",
  title =        "Correction to: {Editorial} about {PROOFS 2019}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "2",
  pages =        "197--197",
  month =        jun,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00266-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See \cite{Heydemann:2021:EAP}.",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00266-7;
                 https://link.springer.com/content/pdf/10.1007/s13389-021-00266-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chang:2021:ASI,
  author =       "Chip-Hong Chang and Daniel E. Holcomb and Ulrich
                 R{\"u}hrmair and Patrick Schaumont",
  title =        "The {ASHES 2019} special issue at {JCEN}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "199--200",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00270-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00270-x;
                 https://link.springer.com/content/pdf/10.1007/s13389-021-00270-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Shiozaki:2021:SEA,
  author =       "Mitsuru Shiozaki and Takeshi Fujino",
  title =        "Simple electromagnetic analysis attack based on
                 geometric leak on {ASIC} implementation of
                 ring-oscillator {PUF}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "201--212",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00240-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00240-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Zhang:2021:NTG,
  author =       "Yuqiao Zhang and Ayush Jain and Pinchen Cui and Ziqi
                 Zhou and Ujjwal Guin",
  title =        "A novel topology-guided attack and its countermeasure
                 towards secure logic locking",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "213--226",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00243-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00243-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gu:2021:LSC,
  author =       "Chongyan Gu and Chip-Hong Chang and Weiqiang Liu and
                 Neil Hanley and Jack Miskelly and M{\'a}ire O'Neill",
  title =        "A large-scale comprehensive evaluation of single-slice
                 ring oscillator and {PicoPUF} bit cells on 28-nm
                 {Xilinx FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "227--238",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00244-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00244-5;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00244-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "physically unclonable functions (PUFs)",
}

@Article{Bandara:2021:ACD,
  author =       "Sahan Bandara and Michel A. Kinsy",
  title =        "Adaptive caches as a defense mechanism against cache
                 side-channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "239--255",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00246-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00246-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Unterstein:2021:SSU,
  author =       "Florian Unterstein and Nisha Jacob and Neil Hanley and
                 Chongyan Gu and Johann Heyszl",
  title =        "{SCA} secure and updatable crypto engines for {FPGA
                 SoC} bitstream decryption: extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "257--272",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00247-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00247-2;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ramezanpour:2021:FIM,
  author =       "Keyvan Ramezanpour and Paul Ampadu and William Diehl",
  title =        "Fault intensity map analysis with neural network key
                 distinguisher",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "273--288",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00249-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00249-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Nashimoto:2021:LCD,
  author =       "Shoei Nashimoto and Daisuke Suzuki and Noriyuki Miura
                 and Tatsuya Machida and Kohei Matsuda and Makoto
                 Nagata",
  title =        "Low-cost distance-spoofing attack on {FMCW} radar and
                 its feasibility study on countermeasure",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "289--298",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00252-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00252-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Azriel:2021:SAM,
  author =       "Leonid Azriel and Julian Speith and Nils Albartus and
                 Ran Ginosar and Avi Mendelson and Christof Paar",
  title =        "A survey of algorithmic methods in {IC} reverse
                 engineering",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "3",
  pages =        "299--315",
  month =        sep,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00268-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:55 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00268-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Howe:2021:EPI,
  author =       "James Howe and Marco Martinoli and Elisabeth Oswald
                 and Francesco Regazzoni",
  title =        "Exploring Parallelism to Improve the Performance of
                 {FrodoKEM} in Hardware",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "4",
  pages =        "317--327",
  month =        nov,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00258-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:56 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00258-7;
                 https://link.springer.com/content/pdf/10.1007/s13389-021-00258-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Perin:2021:ICS,
  author =       "Lucas Pandolfo Perin and Gustavo Zambonin and Ricardo
                 Cust{\'o}dio and Lucia Moura and Daniel Panario",
  title =        "Improved constant-sum encodings for hash-based
                 signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "4",
  pages =        "329--351",
  month =        nov,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00264-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:56 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00264-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Trouchkine:2021:EFI,
  author =       "Thomas Trouchkine and S{\'e}banjila Kevin Bukasa and
                 Mathieu Escouteloup and Ronan Lashermes and Guillaume
                 Bouffard",
  title =        "Electromagnetic fault injection against a complex
                 {CPU}, toward new micro-architectural fault models",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "4",
  pages =        "353--367",
  month =        nov,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00259-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:56 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00259-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mittmann:2021:TAL,
  author =       "Johannes Mittmann and Werner Schindler",
  title =        "Timing attacks and local timing attacks against
                 {Barrett}'s modular multiplication algorithm",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "4",
  pages =        "369--397",
  month =        nov,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00254-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:56 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-020-00254-3;
                 https://link.springer.com/content/pdf/10.1007/s13389-020-00254-3.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bajard:2021:MFP,
  author =       "Jean Claude Bajard and Sylvain Duquesne",
  title =        "{Montgomery}-friendly primes and applications to
                 cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "4",
  pages =        "399--415",
  month =        nov,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00260-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:56 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00260-z",
  abstract =     "This paper deals with Montgomery-friendly primes
                 designed for the modular reduction algorithm of
                 Montgomery. These numbers are scattered in the
                 literature and their properties are partially
                 exploited. We exhibit a large family of
                 Montgomery-friendly primes which give rise to efficient
                 modular reduction algorithms. We develop two main
                 outcomes. The first one is dedicated directly to
                 cryptography, in particular for isogeny-based
                 approaches and more generally to elliptic curves
                 cryptography (ECC). We suggest more appropriate finite
                 fields and curves in terms of complexity for the
                 recommended security levels, for both isogeny-based
                 cryptography and ECC. The second issue is mainly
                 arithmetic (even if its main use is cryptography), and
                 we propose families of alternative RNS bases. We show
                 that, for dedicated architectures with word operators,
                 we can reach, for a same or better complexity, larger
                 RNS bases with Montgomery-friendly pairwise co-primes
                 than the RNS bases generally used in the literature
                 with pseudo-Mersenne numbers.",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lombardia:2021:SSL,
  author =       "Sergio Rold{\'a}n Lombard{\'\i}a and Fatih Balli and
                 Subhadeep Banik",
  title =        "Six shades lighter: a bit-serial implementation of the
                 {AES} family",
  journal =      j-J-CRYPTO-ENG,
  volume =       "11",
  number =       "4",
  pages =        "417--439",
  month =        nov,
  year =         "2021",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00265-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Feb 2 10:55:56 MST 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-021-00265-8;
                 https://link.springer.com/content/pdf/10.1007/s13389-021-00265-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Molteni:2022:RCR,
  author =       "Maria Chiara Molteni and Vittorio Zaccaria",
  title =        "A relation calculus for reasoning about $t$-probing
                 security",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "1",
  pages =        "1--14",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00286-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Apr 16 13:18:32 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00286-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bozilov:2022:OTI,
  author =       "Dusan Bozilov and Miroslav Knezevi{\'c} and Ventzislav
                 Nikov",
  title =        "Optimized threshold implementations: securing
                 cryptographic accelerators for low-energy and
                 low-latency applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "1",
  pages =        "15--51",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00276-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Apr 16 13:18:32 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00276-5",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Caforio:2022:MSV,
  author =       "Andrea Caforio and Fatih Balli and Subhadeep Banik",
  title =        "Melting {SNOW-V}: improved lightweight architectures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "1",
  pages =        "53--73",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00251-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Apr 16 13:18:32 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-020-00251-6",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ouladj:2022:SAP,
  author =       "Maamar Ouladj and Sylvain Guilley and Farid Mokrane",
  title =        "Spectral approach to process the (multivariate)
                 high-order template attack against any masking scheme",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "1",
  pages =        "75--93",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-020-00253-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Apr 16 13:18:32 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-020-00253-4",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Buhrow:2022:PMM,
  author =       "Benjamin Buhrow and Barry Gilbert and Clifton Haider",
  title =        "Parallel modular multiplication using 512-bit advanced
                 vector instructions",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "1",
  pages =        "95--105",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00256-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Apr 16 13:18:32 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00256-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Nath:2022:SET,
  author =       "Kaushik Nath and Palash Sarkar",
  title =        "Security and efficiency trade-offs for elliptic curve
                 {Diffie--Hellman} at the 128-bit and 224-bit security
                 levels",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "1",
  pages =        "107--121",
  month =        apr,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00261-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Apr 16 13:18:32 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00261-y",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Brunetta:2022:MCD,
  author =       "Carlo Brunetta and Pablo Picazo-Sanchez",
  title =        "Modelling cryptographic distinguishers using machine
                 learning",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "2",
  pages =        "123--135",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00262-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 3 10:37:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00262-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Winderickx:2022:DEA,
  author =       "Jori Winderickx and An Braeken and Nele Mentens",
  title =        "In-depth energy analysis of security algorithms and
                 protocols for the {Internet of Things}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "2",
  pages =        "137--149",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00274-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 3 10:37:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00274-7",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{David:2022:REB,
  author =       "Liron David and Avishai Wool",
  title =        "Rank estimation with bounded error via exponential
                 sampling",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "2",
  pages =        "151--168",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00269-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 3 10:37:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00269-4",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Le:2022:IFA,
  author =       "Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani",
  title =        "Improved fault analysis on {SIMECK} ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "2",
  pages =        "169--180",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00263-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 3 10:37:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00263-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gross:2022:BTM,
  author =       "Mathieu Gross and Nisha Jacob and Georg Sigl",
  title =        "Breaking {TrustZone} memory isolation and secure boot
                 through malicious hardware on a modern {FPGA-SoC}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "2",
  pages =        "181--196",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00273-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 3 10:37:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00273-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Liu:2022:CTA,
  author =       "Fanghui Liu and Waldemar Cruz and Laurent Michel",
  title =        "A comprehensive tolerant algebraic side-channel attack
                 over modern ciphers using constraint programming",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "2",
  pages =        "197--228",
  month =        jun,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00280-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 3 10:37:26 MDT 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00280-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Engels:2022:CVR,
  author =       "Susanne Engels and Max Hoffmann and Christof Paar",
  title =        "A critical view on the real-world security of logic
                 locking",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "229--244",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00294-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00294-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dutertre:2022:PPF,
  author =       "Jean-Max Dutertre and Amir-Pasha Mirbaha and David
                 Naccache and Assia Tria",
  title =        "Photonic power firewalls",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "245--254",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00291-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00291-0",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{DiMauro:2022:DIN,
  author =       "Juan {Di Mauro} and Eduardo Salazar and Hugo D.
                 Scolnik",
  title =        "Design and implementation of a novel cryptographically
                 secure pseudorandom number generator",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "255--265",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00297-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00297-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chowdhury:2022:PSP,
  author =       "Sreeja Chowdhury and Ana Covic and Rabin Yu Acharya
                 and Spencer Dupee and Fatemeh Ganji and Domenic Forte",
  title =        "Physical security in the post-quantum era",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "267--303",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00255-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00255-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mandal:2022:SNM,
  author =       "Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar
                 and Yosuke Todo",
  title =        "{Sycon}: a new milestone in designing {ASCON}-like
                 permutations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "305--327",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00272-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00272-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yeniaras:2022:FCT,
  author =       "Esra Yeniaras and Murat Cenk",
  title =        "Faster characteristic three polynomial multiplication
                 and its application to {NTRU} Prime decapsulation",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "329--348",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00282-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00282-7",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chavez-Saab:2022:SCS,
  author =       "Jorge Ch{\'a}vez-Saab and Jes{\'u}s-Javier
                 Chi-Dom{\'{\i}}nguez and Samuel Jaques and Francisco
                 Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
  title =        "The {SQALE} of {CSIDH}: sublinear {V{\'e}lu}
                 quantum-resistant isogeny action with low exponents",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "3",
  pages =        "349--368",
  month =        sep,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00271-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00271-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chang:2022:ASI,
  author =       "Chip-Hong Chang and Stefan Katzenbeisser and Ulrich
                 R{\"u}hrmair and Patrick Schaumont",
  title =        "The {ASHES 2020} special issue at {JCEN}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "369--370",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00300-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00300-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saarinen:2022:DRV,
  author =       "Markku-Juhani O. Saarinen and G. Richard Newell and
                 Ben Marshall",
  title =        "Development of the {RISC-V} entropy source interface",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "371--386",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00275-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/linux.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib;
                 https://www.math.utah.edu/pub/tex/bib/risc-v.bib;
                 https://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00275-6",
  abstract =     "The RISC-V true random number generator (TRNG)
                 architecture breaks with previous ISA TRNG practice by
                 splitting the entropy source (ES) component away from
                 cryptographic DRBGs into a separate privileged
                 interface, and in its use of polling. The modular
                 approach is suitable for the RISC-V hardware IP
                 ecosystem, allows a significantly smaller
                 implementation footprint on platforms that need it,
                 while directly supporting current standards compliance
                 testing methods. We describe the interface, its use in
                 cryptography, and offer additional discussion,
                 background, and rationale for various aspects of it.
                 The design was informed by lessons learned from earlier
                 mainstream ISAs, recently introduced SP 800-90B and
                 FIPS 140-3 entropy audit requirements, AIS 31 and
                 common criteria, current and emerging cryptographic
                 needs such as post-quantum cryptography, and the goal
                 of supporting a wide variety of RISC-V implementations
                 and applications. Many of the architectural choices
                 result from quantitative observations about random
                 number generators in secure microcontrollers, the Linux
                 kernel, and cryptographic libraries.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ruhrmair:2022:SFS,
  author =       "Ulrich R{\"u}hrmair",
  title =        "Secret-free security: a survey and tutorial",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "387--412",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00283-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00283-6",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Jin:2022:PAC,
  author =       "Chenglu Jin and Wayne Burleson and Marten van Dijk and
                 Ulrich R{\"u}hrmair",
  title =        "Programmable access-controlled and generic erasable
                 {PUF} design and its applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "413--432",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00284-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00284-z",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Jana:2022:DFA,
  author =       "Amit Jana and Anirban Nath and Goutam Paul and Dhiman
                 Saha",
  title =        "Differential fault analysis of {NORX} using variants
                 of coupon collector problem",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "433--459",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00285-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00285-y",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Fustos:2022:FLS,
  author =       "Jacob Fustos and Michael Bechtel and Heechul Yun",
  title =        "A framework for leaking secrets to past instructions",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "461--473",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00289-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00289-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kundu:2022:FAP,
  author =       "Anup Kumar Kundu and Aikata and Banashri Karmakar and
                 Dhiman Saha",
  title =        "Fault analysis of the {PRINCE} family of lightweight
                 ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "475--494",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00290-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00290-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mukherjee:2022:CSP,
  author =       "Rijoy Mukherjee and Sree Ranjani Rajendran and Rajat
                 Subhra Chakraborty",
  title =        "A comprehensive survey of physical and logic testing
                 techniques for {Hardware Trojan} detection and
                 prevention",
  journal =      j-J-CRYPTO-ENG,
  volume =       "12",
  number =       "4",
  pages =        "495--522",
  month =        nov,
  year =         "2022",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00295-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:09 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00295-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Wiemers:2023:IRS,
  author =       "Andreas Wiemers and Johannes Mittmann",
  title =        "Improving recent side-channel attacks against the
                 {DES} key schedule",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "1--17",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00279-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00279-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cicek:2023:NRW,
  author =       "Ihsan Cicek and Ahmad {Al Khas}",
  title =        "A new read-write collision-based {SRAM PUF}
                 implemented on {Xilinx FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "19--36",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00281-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00281-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Robert:2023:FMM,
  author =       "Jean-Marc Robert and Pascal V{\'e}ron",
  title =        "Faster multiplication over {$ \mathbb {F}_2 [X] $}
                 using {AVX512} instruction set and {VPCLMULQDQ}
                 instruction",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "37--55",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-021-00278-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-021-00278-3",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Attias:2023:RMM,
  author =       "Vidal Attias and Luigi Vigneri and Vassil Dimitrov",
  title =        "Rethinking modular multi-exponentiation in real-world
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "57--70",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00287-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00287-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Giron:2023:PQH,
  author =       "Alexandre Augusto Giron and Ricardo Cust{\'o}dio and
                 Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "Post-quantum hybrid key exchange: a systematic mapping
                 study",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "71--88",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00288-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00288-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Adj:2023:KBS,
  author =       "Gora Adj and Jes{\'u}s-Javier Chi-Dom{\'\i}nguez and
                 Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "{Karatsuba}-based square-root {V{\'e}lu}'s formulas
                 applied to two isogeny-based protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "89--106",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00293-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00293-y",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Nadikuda:2023:LAT,
  author =       "Pradeep Kumar Goud Nadikuda and Lakshmi Boppana",
  title =        "Low area-time complexity point multiplication
                 architecture for {ECC} over {$ {\rm GF}(2^m) $} using
                 polynomial basis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "107--123",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00302-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00302-0",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Koshelev:2023:SMT,
  author =       "Dmitrii Koshelev",
  title =        "Subgroup membership testing on elliptic curves via the
                 {Tate} pairing",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "1",
  pages =        "125--128",
  month =        apr,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00296-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See correction \cite{Koshelev:2024:CSM}.",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00296-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Masure:2023:SCA,
  author =       "Lo{\"\i}c Masure and R{\'e}mi Strullu",
  title =        "Side-channel analysis against {ANSSI}'s protected
                 {AES} implementation on {ARM}: end-to-end attacks with
                 multi-task learning",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "129--147",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00311-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00311-7",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Werner:2023:EEA,
  author =       "Vincent Werner and Laurent Maingault and Marie-Laure
                 Potet",
  title =        "An end-to-end approach to identify and exploit
                 multi-fault injection vulnerabilities on
                 microcontrollers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "149--165",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00292-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00292-z",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Peng:2023:SNP,
  author =       "Bo-Yuan Peng and Adrian Marotzke and Ming-Han Tsai and
                 Bo-Yin Yang and Ho-Lin Chen",
  title =        "Streamlined {NTRU} Prime on {FPGA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "167--186",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00303-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00303-z",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Debnath:2023:MIM,
  author =       "Sumit Kumar Debnath and Sihem Mesnager and Vikas
                 Srivastava and Saibal Kumar Pal and Nibedita Kundu",
  title =        "{Mul-IBS}: a multivariate identity-based signature
                 scheme compatible with {IoT}-based {NDN} architecture",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "187--199",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00308-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00308-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Joshi:2023:SSP,
  author =       "Priyanka Joshi and Bodhisatwa Mazumdar",
  title =        "{SPSA}: Semi-Permanent Stuck-At fault analysis of {AES
                 Rijndael SBox}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "201--222",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00301-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00301-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cui:2023:CEL,
  author =       "Yaxin Cui and Hong Xu and Lin Tan and Huajin Chen and
                 Wenfeng Qi",
  title =        "Construction of equivalent linear trails and multiple
                 linear attack on reduced-round {GIFT-64}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "223--234",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00298-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00298-7",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Luengo:2023:STS,
  author =       "Elena Almaraz Luengo and Bittor Ala{\~n}a Olivares and
                 Luis Javier Garc{\'{\i}}a Villalba and Julio
                 Hernandez-Castro and Darren Hurley-Smith",
  title =        "{StringENT} test suite: {ENT} battery revisited for
                 efficient {$P$} value computation",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "235--249",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00313-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00313-5",
  abstract =     "Random numbers play a key role in a wide variety of
                 applications, ranging from mathematical simulation to
                 cryptography. Generating random or pseudo-random
                 numbers is not an easy task, especially when hardware,
                 time and energy constraints are considered. In order to
                 assess whether generators behave in a random fashion,
                 there are several statistical test batteries. ENT is
                 one of the simplest and most popular, at least in part
                 due to its efficacy and speed. Nonetheless, only one of
                 the tests of this suite provides a $p$ value, which is
                 the most useful and standard way to determine whether
                 the randomness hypothesis holds, for a certain
                 significance level. As a consequence of this, rather
                 arbitrary and at times misleading bounds are set in
                 order to decide which intervals are acceptable for its
                 results. This paper introduces an extension of the
                 battery, named StringENT, which, while sticking to the
                 fast speed that makes ENT popular and useful, still
                 succeeds in providing $p$ values with which sound
                 decisions can be made about the randomness of a
                 sequence. It also highlights a flagrant randomness flaw
                 that the classical ENT battery is not capable of
                 detecting but the new StringENT notices, and introduces
                 two additional tests.",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Koseki:2023:HES,
  author =       "Ryusuke Koseki and Akira Ito and Rei Ueno and Mehdi
                 Tibouchi and Naofumi Homma",
  title =        "Homomorphic encryption for stochastic computing",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "2",
  pages =        "251--263",
  month =        jun,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00299-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Jun 2 12:32:10 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00299-6",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Salam:2023:DFA,
  author =       "Iftekhar Salam and Wei-Chuen Yau and Rapha{\"e}l C.-W.
                 Phan and Josef Pieprzyk",
  title =        "Differential fault attacks on the lightweight
                 authenticated encryption algorithm {CLX-128}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "265--281",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00326-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00326-0",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{LeGrow:2023:FMF,
  author =       "Jason T. LeGrow",
  title =        "A faster method for fault attack resistance in
                 static\slash ephemeral {CSIDH}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "283--294",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00318-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00318-0",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Alves:2023:PHT,
  author =       "Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and
                 Diego F. Aranha",
  title =        "Performance of hierarchical transforms in homomorphic
                 encryption: a case study on logistic regression
                 inference",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "295--310",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00325-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00325-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kerkhof:2023:NGL,
  author =       "Maikel Kerkhof and Lichao Wu and Guilherme Perin and
                 Stjepan Picek",
  title =        "No (good) loss no gain: systematic evaluation of loss
                 functions in deep learning-based side-channel
                 analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "311--324",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00320-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00320-6",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Salomon:2023:MLP,
  author =       "Dor Salomon and Itamar Levi",
  title =        "{MaskSIMD-lib}: on the performance gap of a generic
                 {C} optimized assembly and wide vector extensions for
                 masked software with an {Ascon}-$p$ test case",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "325--342",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00322-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00322-4",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Arshad:2023:ABE,
  author =       "Hamed Arshad and Pablo Picazo-Sanchez and Christian
                 Johansen and Gerardo Schneider",
  title =        "Attribute-based encryption with enforceable
                 obligations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "343--371",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00317-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00317-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bajard:2023:FVP,
  author =       "Jean-Claude Bajard and Kazuhide Fukushima and Thomas
                 Plantard and Arnaud Sipasseuth",
  title =        "Fast verification and public key storage optimization
                 for unstructured lattice-based signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "3",
  pages =        "373--388",
  month =        sep,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00309-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 10 16:09:48 MDT 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00309-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Chang:2023:ASI,
  author =       "Chip-Hong Chang and Stefan Katzenbeisser and Debdeep
                 Mukhopadhyay and Ulrich R{\"u}hrmair",
  title =        "The {ASHES 2021} special issue at {JCEN}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "389--390",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00338-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00338-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Deutschbein:2023:IAI,
  author =       "Calvin Deutschbein and Andres Meza and Francesco
                 Restuccia and Ryan Kastner and Cynthia Sturton",
  title =        "{Isadora}: automated information-flow property
                 generation for hardware security verification",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "391--407",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00306-w",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00306-w",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Vasselle:2023:SDA,
  author =       "Aur{\'e}lien Vasselle and Hugues Thiebeauld and
                 Philippe Maurine",
  title =        "Spatial dependency analysis to extract information
                 from side-channel mixtures: extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "409--425",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00307-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00307-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kuroda:2023:PAN,
  author =       "Kunihiro Kuroda and Yuta Fukuda and Kota Yoshida and
                 Takeshi Fujino",
  title =        "Practical aspects on non-profiled deep-learning
                 side-channel attacks against {AES} software
                 implementation with two types of masking
                 countermeasures including {RSM}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "427--442",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00312-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00312-6",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ngo:2023:SCA,
  author =       "Kalle Ngo and Elena Dubrova and Thomas Johansson",
  title =        "A side-channel attack on a masked and shuffled
                 software implementation of {Saber}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "443--460",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00315-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00315-3",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Imran:2023:HSS,
  author =       "Malik Imran and Felipe Almeida and Andrea Basso and
                 Sujoy Sinha Roy and Samuel Pagliarini",
  title =        "High-speed {SABER} key encapsulation mechanism in 65nm
                 {CMOS}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "461--471",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00316-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00316-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Komissarov:2023:SAA,
  author =       "Rony Komissarov and Sharon Vaisman and Avishai Wool",
  title =        "Spoofing attacks against vehicular {FMCW} radar",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "473--484",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00321-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00321-5",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Krachenfels:2023:TAD,
  author =       "Thilo Krachenfels and Jean-Pierre Seifert and Shahin
                 Tajik",
  title =        "{Trojan} awakener: detecting dormant malicious
                 hardware using laser logic state imaging (extended
                 version)",
  journal =      j-J-CRYPTO-ENG,
  volume =       "13",
  number =       "4",
  pages =        "485--499",
  month =        nov,
  year =         "2023",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00323-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Fri Apr 19 08:14:26 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00323-3",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Oberhansl:2024:UIS,
  author =       "Felix Oberhansl and Tim Fritzmann and Thomas
                 P{\"o}ppelmann and Debapriya Basu Roy and Georg Sigl",
  title =        "Uniform instruction set extensions for multiplications
                 in contemporary and post-quantum cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "1--18",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00332-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00332-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kumar:2024:RNC,
  author =       "Satyam Kumar and Sandip Kumar Mondal and Santanu
                 Sarkar and Takanori Isobe and Anubhab Baksi and Avishek
                 Adhikari",
  title =        "Restricted near collision attack on {Plantlet}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "19--34",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00336-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00336-y",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ribeiro:2024:SPQ,
  author =       "Leonardo A. D. S. Ribeiro and Jos{\'e} Paulo da Silva
                 Lima and Ruy J. G. B. de Queiroz and Amirton B. Chagas
                 and Jos{\'e} R. R. Junior and Jonysberg P. Quintino and
                 Fabio Q. B. da Silva and Andr{\'e} L. M. Santos",
  title =        "{SABER} post-quantum key encapsulation mechanism
                 {(KEM)}: evaluating performance in {ARM} and x64
                 architectures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "35--41",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00337-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00337-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cai:2024:ENA,
  author =       "Shiping Cai and Zhi Hu and Zheng-An Yao and Chang-An
                 Zhao",
  title =        "The elliptic net algorithm revisited",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "43--55",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00304-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00304-y",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Shao:2024:DSV,
  author =       "Cuiping Shao and Dongyan Zhao and Huiyun Li and Song
                 Cheng and Shunxian Gao and Liuqing Yang",
  title =        "Detection of security vulnerabilities in cryptographic
                 {ICs} against fault injection attacks based on
                 compressed sensing and basis pursuit",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "57--70",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00324-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00324-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Marchiori:2024:PRF,
  author =       "D{\'u}nia Marchiori and Ricardo Cust{\'o}dio and
                 Daniel Panario and Lucia Moura",
  title =        "Probabilistic root finding in code-based
                 cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "71--85",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00329-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00329-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gurler:2024:CGL,
  author =       "Elif Ozbay Gurler and Huseyin Hisil",
  title =        "Complete group law for genus 2 {Jacobians} on
                 {Jacobian} coordinates",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "87--101",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00351-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00351-7",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Joshi:2024:DRK,
  author =       "Priyanka Joshi and Bodhisatwa Mazumdar",
  title =        "Deep round key recovery attacks and countermeasure in
                 persistent fault model: a case study on {GIFT} and
                 {KLEIN}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "103--125",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00349-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00349-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Koshelev:2024:CSM,
  author =       "Dmitrii Koshelev",
  title =        "Correction to: {Subgroup} membership testing on
                 elliptic curves via the {Tate} pairing",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "127--128",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00331-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See \cite{Koshelev:2023:SMT}.",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00331-3",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Zhang:2024:EAP,
  author =       "Fan Zhang",
  title =        "Editorial about {PROOFS 2021}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "129--129",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00345-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00345-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cheng:2024:TFB,
  author =       "Wei Cheng and Yi Liu and Sylvain Guilley and Olivier
                 Rioul",
  title =        "Toward finding best linear codes for side-channel
                 protections (extended version)",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "131--145",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-022-00305-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-022-00305-x",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lacombe:2024:CSA,
  author =       "Guilhem Lacombe and David Feliot and Etienne Boespflug
                 and Marie-Laure Potet",
  title =        "Combining static analysis and dynamic symbolic
                 execution in a toolchain to detect fault injection
                 vulnerabilities",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "147--164",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00310-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00310-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Asano:2024:SBE,
  author =       "Tamon Asano and Takeshi Sugawara",
  title =        "Simulation-based evaluation of bit-interaction
                 side-channel leakage on {RISC-V}: extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "1",
  pages =        "165--180",
  month =        apr,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00319-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Jun 25 13:48:06 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/risc-v.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00319-z",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  remark =       "The information leakage attack described here is
                 successful against both ARM and the Western Digital
                 SweRV EH1 RISC-V processor.",
}

@Article{Guillen:2024:AFC,
  author =       "Luis Guillen",
  title =        "The Asymmetric five-card trick: working with variable
                 encoding in card-based protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "181--192",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00333-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00333-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sideris:2024:HAD,
  author =       "Argyrios Sideris and Theodora Sanida and Minas
                 Dasygenis",
  title =        "Hardware acceleration design of the {SHA-3} for high
                 throughput and low area on {FPGA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "193--205",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00334-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00334-0",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Viera:2024:TFM,
  author =       "Raphael Viera and Jean-Max Dutertre and Rodrigo Silva
                 Lima and Matthieu Pommies and Anthony Bertrand",
  title =        "Tampering with the flash memory of microcontrollers:
                 permanent fault injection via laser illumination during
                 read operations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "207--221",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00335-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00335-z",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carlet:2024:MMB,
  author =       "Claude Carlet and Abderrahman Daif and Sylvain Guilley
                 and C{\'e}dric Tavernier",
  title =        "A masking method based on orthonormal spaces,
                 protecting several bytes against both {SCA} and {FIA}
                 with a reduced cost",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "223--240",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00339-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00339-9",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Aydin:2024:LSH,
  author =       "Furkan Aydin and Aydin Aysu",
  title =        "Leaking secrets in homomorphic encryption with
                 side-channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "241--251",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00340-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00340-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{kumar:2024:QRN,
  author =       "Vaishnavi kumar and Padmapriya Pravinkumar",
  title =        "Quantum random number generator on {IBM QX}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "253--259",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00341-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 https://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00341-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Al-Muhammed:2024:BSC,
  author =       "Muhammed Jassem Al-Muhammed",
  title =        "Bit-sensitive chaos-based encryption technique with
                 nonparametric memory loss-based key hiding code
                 generation",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "261--279",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00343-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00343-z",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Seddigh:2024:BKM,
  author =       "Milad Seddigh and Mahdi Esfahani and Sarani
                 Bhattacharya and Mohammad Reza Aref and Hadi
                 Soleimany",
  title =        "Breaking {KASLR} on mobile devices without any use of
                 cache memory (extended version)",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "281--294",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-023-00344-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-023-00344-y",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Vollala:2024:EET,
  author =       "Satyanarayana Vollala",
  title =        "Energy efficient triple-modular exponential techniques
                 for batch verification schemes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "295--309",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00348-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00348-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Aljafar:2024:ULE,
  author =       "Muayad J. Aljafar and Florence Azais and Marie-Lise
                 Flottes and Samuel Pagliarini",
  title =        "Utilizing layout effects for analog logic locking",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "311--324",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00350-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00350-8",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Alshaer:2024:CLA,
  author =       "Ihab Alshaer and Gijs Burghoorn and Brice Colombier
                 and Christophe Deleuze and Vincent Beroulle and Paolo
                 Maistri",
  title =        "Cross-layer analysis of clock glitch fault injection
                 while fetching variable-length instructions",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "325--342",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00352-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00352-6",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kim:2024:MCA,
  author =       "Kwang Ho Kim and Sihem Mesnager and Kyong Il Pak",
  title =        "{Montgomery} curve arithmetic revisited",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "343--362",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00353-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00353-5",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Jana:2024:DFA,
  author =       "Amit Jana and Goutam Paul",
  title =        "Differential fault attack on {SPN}-based sponge and
                 {SIV}-like {AE} schemes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "363--381",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00354-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00354-4",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hu:2024:UGE,
  author =       "Jingwei Hu and Wen Wang and Kris Gaj and Donglong Chen
                 and Huaxiong Wang",
  title =        "Universal {Gaussian} elimination hardware for
                 cryptographic purposes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "383--397",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00355-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00355-3",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lashermes:2024:GSR,
  author =       "Ronan Lashermes and H{\'e}l{\`e}ne {Le Bouder}",
  title =        "Generic {SCARE}: reverse engineering without knowing
                 the algorithm nor the machine",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "399--414",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00356-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00356-2",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Salarifard:2024:EHA,
  author =       "Raziyeh Salarifard and Hadi Soleimany",
  title =        "An efficient hardware accelerator for {NTT}-based
                 polynomial multiplication using {FPGA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "14",
  number =       "2",
  pages =        "415--426",
  month =        jun,
  year =         "2024",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1007/s13389-024-00357-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Aug 8 07:34:12 MDT 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "https://link.springer.com/article/10.1007/s13389-024-00357-1",
  acknowledgement = ack-nhfb,
  ajournal =     "J. Crypto. Eng.",
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}