@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
"\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-J-CRYPTO-ENG = "Journal of Cryptographic Engineering"}
@Article{Koc:2011:IBC,
author = "{\c{C}}etin Kaya Ko{\c{c}}",
title = "Introduction to the {{\booktitle{Journal of
Cryptographic Engineering}}}",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "1--3",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0007-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://cs.ucsb.edu/~koc/docs/j75.pdf;
http://link.springer.com/article/10.1007/s13389-011-0007-x;
http://link.springer.com/content/pdf/10.1007/s13389-011-0007-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kocher:2011:IDP,
author = "Paul Kocher and Joshua Jaffe and Benjamin Jun and
Pankaj Rohatgi",
title = "Introduction to differential power analysis",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "5--27",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0006-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0006-y;
http://link.springer.com/content/pdf/10.1007/s13389-011-0006-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Molter:2011:SPA,
author = "H. Gregor Molter and Marc St{\"o}ttinger and Abdulhadi
Shoufan and Falko Strenzke",
title = "A simple power analysis attack on a {McEliece}
cryptoprocessor",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "29--36",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0001-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0001-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guneysu:2011:UHC,
author = "Tim G{\"u}neysu",
title = "Utilizing hard cores of modern {FPGA} devices for
high-performance cryptography",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "37--55",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0002-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0002-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dominguez-Oviedo:2011:ALE,
author = "Agustin Dominguez-Oviedo and M. Anwar Hasan",
title = "Algorithm-level error detection for {Montgomery}
ladder-based {ECSM}",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "57--69",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0003-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0003-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Skorobogatov:2011:SMS,
author = "Sergei Skorobogatov",
title = "Synchronization method for {SCA} and fault attacks",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "71--77",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0004-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0004-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hocquet:2011:HPN,
author = "C{\'e}dric Hocquet and Dina Kamel and Francesco
Regazzoni and Jean-Didier Legat and Denis Flandre and
David Bol and Fran{\c{c}}ois-Xavier Standaert",
title = "Harvesting the potential of nano-{CMOS} for
lightweight cryptography: an ultra-low-voltage 65 nm
{AES} coprocessor for passive {RFID} tags",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "79--86",
month = apr,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0005-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0005-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCa,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "1",
pages = "??--??",
month = apr,
year = "2011",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:30 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Moreno:2011:SRB,
author = "Carlos Moreno and M. Anwar Hasan",
title = "{SPA}-resistant binary exponentiation with optimal
execution time",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "2",
pages = "87--99",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0008-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0008-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Beuchat:2011:LAU,
author = "Jean-Luc Beuchat and Eiji Okamoto and Teppei
Yamazaki",
title = "A low-area unified hardware architecture for the {AES}
and the cryptographic hash function {ECHO}",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "2",
pages = "101--121",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0009-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0009-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Doget:2011:USC,
author = "Julien Doget and Emmanuel Prouff and Matthieu Rivain
and Fran{\c{c}}ois-Xavier Standaert",
title = "Univariate side channel attacks and leakage modeling",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "2",
pages = "123--144",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0010-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0010-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Whitnall:2011:FEF,
author = "Carolyn Whitnall and Elisabeth Oswald",
title = "A fair evaluation framework for comparing side-channel
distinguishers",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "2",
pages = "145--160",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0011-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0011-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Goundar:2011:SMW,
author = "Raveen R. Goundar and Marc Joye and Atsuko Miyaji and
Matthieu Rivain and Alexandre Venelli",
title = "Scalar multiplication on {Weierstra{\ss}} elliptic
curves from Co-{$Z$} arithmetic",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "2",
pages = "161--176",
month = aug,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0012-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0012-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCb,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "2",
pages = "??--??",
month = aug,
year = "2011",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Katzenbeisser:2011:RPL,
author = "Stefan Katzenbeisser and {\"U}nal Kocaba{\v{s}} and
Vincent van der Leest and Ahmad-Reza Sadeghi and
Geert-Jan Schrijen and Christian Wachsmann",
title = "Recyclable {PUFs}: logically reconfigurable {PUFs}",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "177--186",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0016-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0016-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Taverne:2011:SSM,
author = "Jonathan Taverne and Armando Faz-Hern{\'a}ndez and
Diego F. Aranha and Francisco
Rodr{\'\i}guez-Henr{\'\i}quez and Darrel Hankerson and
Julio L{\'o}pez",
title = "Speeding scalar multiplication over binary elliptic
curves using the new carry-less multiplication
instruction",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "187--199",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0017-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0017-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Meloni:2011:HPG,
author = "Nicolas M{\'e}loni and Christophe Negre and M. Anwar
Hasan",
title = "High performance {GHASH} and impacts of a class of
unconventional bases",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "201--218",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0013-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0013-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Tunstall:2011:PCD,
author = "Michael Tunstall",
title = "Practical complexity differential cryptanalysis and
fault analysis of {AES}",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "219--230",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0018-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0018-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Medwed:2011:EAS,
author = "Marcel Medwed and Fran{\c{c}}ois-Xavier Standaert",
title = "Extractors against side-channel attacks: weak or
strong?",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "231--241",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0014-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0014-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Brier:2011:MFA,
author = "{\'E}ric Brier and David Naccache and Phong Q. Nguyen
and Mehdi Tibouchi",
title = "Modulus fault attacks against {RSA--CRT} signatures",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "243--253",
month = nov,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0015-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0015-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCc,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "3",
pages = "??--??",
month = nov,
year = "2011",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:31 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dichtl:2011:NMB,
author = "Markus Dichtl",
title = "A new method of black box power analysis and a fast
algorithm for optimal key search",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "255--264",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0019-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0019-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Endo:2011:CGC,
author = "Sho Endo and Takeshi Sugawara and Naofumi Homma and
Takafumi Aoki and Akashi Satoh",
title = "An on-chip glitchy-clock generator for testing fault
injection attacks",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "265--270",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0022-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0022-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Avanzi:2011:SCA,
author = "Roberto Avanzi and Simon Hoerder and Dan Page and
Michael Tunstall",
title = "Side-channel attacks on the {McEliece} and
{Niederreiter} public-key cryptosystems",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "271--281",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0024-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
note = "See erratum \cite{Avanzi:2012:ESC}.",
URL = "http://link.springer.com/article/10.1007/s13389-011-0024-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Strenzke:2011:MAS,
author = "Falko Strenzke",
title = "Message-aimed side channel and fault attacks against
public key cryptosystems with homomorphic properties",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "283--292",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0020-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0020-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hospodar:2011:MLS,
author = "Gabriel Hospodar and Benedikt Gierlichs and Elke {De
Mulder} and Ingrid Verbauwhede and Joos Vandewalle",
title = "Machine learning in side-channel analysis: a first
study",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "293--302",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0023-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0023-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lux:2011:TSD,
author = "Alexander Lux and Artem Starostin",
title = "A tool for static detection of timing channels in
{Java}",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "303--313",
month = dec,
year = "2011",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0021-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0021-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCd,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "1",
number = "4",
pages = "??--??",
month = dec,
year = "2011",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Grabher:2012:EMD,
author = "P. Grabher and J. Gro{\ss}sch{\"a}dl and S. Hoerder
and K. J{\"a}rvinen and D. Page and S. Tillich and M.
W{\'o}jcik",
title = "An exploration of mechanisms for dynamic cryptographic
instruction set extension",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "1--18",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0025-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-011-0025-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gouvea:2012:ESI,
author = "Conrado P. L. Gouv{\^e}a and Leonardo B. Oliveira and
Julio L{\'o}pez",
title = "Efficient software implementation of public-key
cryptography on sensor networks using the {MSP430X}
microcontroller",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "19--29",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0029-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0029-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gueron:2012:ESI,
author = "Shay Gueron",
title = "Efficient software implementations of modular
exponentiation",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "31--43",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0031-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0031-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2012:AAS,
author = "Claude Carlet and Jean-Charles Faug{\`e}re and
Christopher Goyet and Gu{\'e}na{\"e}l Renault",
title = "Analysis of the algebraic side channel attack",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "45--62",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0028-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0028-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Elaabid:2012:PT,
author = "M. Abdelaziz Elaabid and Sylvain Guilley",
title = "Portability of templates",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "63--74",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0030-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0030-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Avanzi:2012:ESC,
author = "Roberto Avanzi and Simon Hoerder and Dan Page and
Michael Tunstall",
title = "Erratum to: Side-channel attacks on the {McEliece} and
{Niederreiter} public-key cryptosystems",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "75--75",
month = may,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-011-0026-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
note = "See \cite{Avanzi:2011:SCA}.",
URL = "http://link.springer.com/article/10.1007/s13389-011-0026-7;
http://link.springer.com/content/pdf/10.1007/s13389-011-0026-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2012:HCa,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "1",
pages = "??--??",
month = may,
year = "2012",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bernstein:2012:HSH,
author = "Daniel J. Bernstein and Niels Duif and Tanja Lange and
Peter Schwabe and Bo-Yin Yang",
title = "High-speed high-security signatures",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "2",
pages = "77--89",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0027-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0027-1;
http://link.springer.com/content/pdf/10.1007/s13389-012-0027-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hasan:2012:SMS,
author = "M. Anwar Hasan and Christophe Negre",
title = "Sequential multiplier with sub-linear gate
complexity",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "2",
pages = "91--97",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0035-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0035-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yen:2012:MEA,
author = "Sung-Ming Yen and Chien-Ning Chen and SangJae Moon",
title = "Multi-exponentiation algorithm based on binary {GCD}
computation and its application to side-channel
countermeasure",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "2",
pages = "99--110",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0032-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0032-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Roche:2012:HOG,
author = "Thomas Roche and Emmanuel Prouff",
title = "Higher-order glitch free implementation of the {AES}
using {Secure Multi--Party Computation} protocols",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "2",
pages = "111--127",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0033-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0033-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bringer:2012:PAA,
author = "Julien Bringer and Herv{\'e} Chabanne and Thanh Ha
Le",
title = "Protecting {AES} against side-channel analysis using
wire-tap codes",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "2",
pages = "129--141",
month = sep,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0034-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0034-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2012:HCb,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "2",
pages = "??--??",
month = sep,
year = "2012",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:32 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kasper:2012:SCB,
author = "Markus Kasper and Amir Moradi and Georg T. Becker and
Oliver Mischke and Tim G{\"u}neysu and Christof Paar
and Wayne Burleson",
title = "Side channels as building blocks",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "3",
pages = "143--159",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0040-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0040-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mather:2012:PSC,
author = "Luke Mather and Elisabeth Oswald",
title = "Pinpointing side-channel information leaks in web
applications",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "3",
pages = "161--177",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0036-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0036-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Trujillo-Olaya:2012:APV,
author = "Vladimir Trujillo-Olaya and Timothy Sherwood and
{\c{C}}etin Kaya Ko{\c{c}}",
title = "Analysis of performance versus security in hardware
realizations of small elliptic curves for lightweight
applications",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "3",
pages = "179--188",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0039-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0039-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Shariati:2012:AEE,
author = "Saloomeh Shariati and Fran{\c{c}}ois-Xavier Standaert
and Laurent Jacques and Benoit Macq",
title = "Analysis and experimental evaluation of image-based
{PUFs}",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "3",
pages = "189--206",
month = oct,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0041-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0041-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Anonymous:2012:HCc,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "3",
pages = "??--??",
month = oct,
year = "2012",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rolt:2012:SAS,
author = "Jean Da Rolt and Amitabh Das and Santosh Ghosh and
Giorgio {Di Natale} and Marie-Lise Flottes and Bruno
Rouzeyre and Ingrid Verbauwhede",
title = "Scan attacks on side-channel and fault attack
resistant public-key implementations",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "4",
pages = "207--219",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0045-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0045-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Baldwin:2012:CES,
author = "Brian Baldwin and Raveen R. Goundar and Mark Hamilton
and William P. Marnane",
title = "Co-{$Z$} {ECC} scalar multiplications for hardware,
software and hardware-software co-design on embedded
systems",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "4",
pages = "221--240",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0042-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0042-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gueron:2012:PMS,
author = "Shay Gueron and Vlad Krasnov",
title = "Parallelizing message schedules to accelerate the
computations of hash functions",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "4",
pages = "241--253",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0037-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0037-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koeberl:2012:PDA,
author = "Patrick Koeberl and Jiangtao Li and Roel Maes and
Anand Rajan and Claire Vishik and Marcin W{\'o}jcik and
Wei Wu",
title = "A practical device authentication scheme using {SRAM}
{PUFs}",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "4",
pages = "255--269",
month = nov,
year = "2012",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0043-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0043-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Anonymous:2012:HCd,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "2",
number = "4",
pages = "??--??",
month = nov,
year = "2012",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:33 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Prouff:2013:ICS,
author = "Emmanuel Prouff and Patrick Schaumont",
title = "Introduction to the {CHES 2012} special issue",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "1--1",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0055-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0055-5;
http://link.springer.com/content/pdf/10.1007/s13389-013-0055-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schlosser:2013:SPE,
author = "Alexander Schl{\"o}sser and Dmitry Nedospasov and
Juliane Kr{\"a}mer and Susanna Orlic and Jean-Pierre
Seifert",
title = "Simple photonic emission analysis of {AES}",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "3--15",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0053-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0053-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ruhrmair:2013:PUP,
author = "Ulrich R{\"u}hrmair and Marten van Dijk",
title = "On the practical use of physical unclonable functions
in oblivious transfer and bit commitment protocols",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "17--28",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0052-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0052-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Heyse:2013:CBC,
author = "Stefan Heyse and Tim G{\"u}neysu",
title = "Code-based cryptography on reconfigurable hardware:
tweaking {Niederreiter} encryption for performance",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "29--43",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0056-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0056-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gerard:2013:UOL,
author = "Beno{\^\i}t G{\'e}rard and Fran{\c{c}}ois-Xavier
Standaert",
title = "Unified and optimized linear collision attacks and
their application in a non-profiled setting: extended
version",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "45--58",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0051-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0051-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Fouque:2013:ARC,
author = "Pierre-Alain Fouque and Nicolas Guillermin and
Delphine Leresteux and Mehdi Tibouchi and
Jean-Christophe Zapalowicz",
title = "Attacking {RSA--CRT} signatures with faults on
{Montgomery} multiplication",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "59--72",
month = apr,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0050-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0050-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCa,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "1",
pages = "??--??",
month = apr,
year = "2013",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ali:2013:DFA,
author = "Sk Subidh Ali and Debdeep Mukhopadhyay and Michael
Tunstall",
title = "Differential fault analysis of {AES}: towards reaching
its limits",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "2",
pages = "73--97",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0046-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0046-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Montminy:2013:ICD,
author = "David P. Montminy and Rusty O. Baldwin and Michael A.
Temple and Eric D. Laspe",
title = "Improving cross-device attacks using zero-mean
unit-variance normalization",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "2",
pages = "99--110",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0038-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0038-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Akinyele:2013:CFR,
author = "Joseph A. Akinyele and Christina Garman and Ian Miers
and Matthew W. Pagano and Michael Rushanan and Matthew
Green and Aviel D. Rubin",
title = "{Charm}: a framework for rapidly prototyping
cryptosystems",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "2",
pages = "111--128",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0057-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0057-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kurdziel:2013:MPO,
author = "Michael T. Kurdziel and Marcin Lukowiak and Michael A.
Sanfilippo",
title = "Minimizing performance overhead in memory encryption",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "2",
pages = "129--138",
month = jun,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0047-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0047-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCb,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "2",
pages = "??--??",
month = jun,
year = "2013",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mohamed:2013:IAS,
author = "Mohamed Saied Emam Mohamed and Stanislav Bulygin and
Michael Zohner and Annelie Heuser and Michael Walter
and Johannes Buchmann",
title = "Improved algebraic side-channel attack on {AES}",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "3",
pages = "139--156",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0059-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0059-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Christofi:2013:FVC,
author = "Maria Christofi and Boutheina Chetali and Louis Goubin
and David Vigilant",
title = "Formal verification of a {CRT--RSA} implementation
against fault attacks",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "3",
pages = "157--167",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0049-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0049-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Briais:2013:FST,
author = "S{\'e}bastien Briais and Jean-Luc Danger and Sylvain
Guilley",
title = "A formal study of two physical countermeasures against
side channel attacks",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "3",
pages = "169--180",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0054-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0054-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Brown:2013:TTC,
author = "Mark Brown",
title = "Toward a taxonomy of communications security models",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "3",
pages = "181--195",
month = sep,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0058-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0058-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCc,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "3",
pages = "??--??",
month = sep,
year = "2013",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:34 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yamamoto:2013:VEP,
author = "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh",
title = "Variety enhancement of {PUF} responses using the
locations of random outputting {RS} latches",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "4",
pages = "197--211",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-012-0044-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-012-0044-0;
http://link.springer.com/content/pdf/10.1007/s13389-012-0044-0.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Bhasin:2013:CHA,
author = "Shivam Bhasin and Sylvain Guilley and Annelie Heuser
and Jean-Luc Danger",
title = "From cryptography to hardware: analyzing and
protecting embedded {Xilinx} {BRAM} for cryptographic
applications",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "4",
pages = "213--225",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0048-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0048-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kamal:2013:SHI,
author = "Abdel Alim Kamal and Amr M. Youssef",
title = "Strengthening hardware implementations of
{NTRUEncrypt} against fault analysis attacks",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "4",
pages = "227--240",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0061-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0061-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Danger:2013:SSC,
author = "Jean-Luc Danger and Sylvain Guilley and Philippe
Hoogvorst and C{\'e}dric Murdica and David Naccache",
title = "A synthesis of side-channel attacks on elliptic curve
cryptography in smart-cards",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "4",
pages = "241--265",
month = nov,
year = "2013",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0062-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0062-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCd,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "3",
number = "4",
pages = "??--??",
month = nov,
year = "2013",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bertoni:2014:ICS,
author = "Guido Bertoni and Jean-S{\'e}bastien Coron",
title = "Introduction to the {CHES 2013} special issue",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "1--1",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0076-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0076-8;
http://link.springer.com/content/pdf/10.1007/s13389-014-0076-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Oliveira:2014:TFP,
author = "Thomaz Oliveira and Julio L{\'o}pez and Diego F.
Aranha and Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
title = "Two is the fastest prime: lambda coordinates for
binary elliptic curves",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "3--17",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0069-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0069-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Becker:2014:SDL,
author = "Georg T. Becker and Francesco Regazzoni and Christof
Paar and Wayne P. Burleson",
title = "Stealthy dopant-level hardware {Trojans}: extended
version",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "19--31",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0068-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0068-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{DeMulder:2014:UBS,
author = "Elke {De Mulder} and Michael Hutter and Mark E. Marson
and Peter Pearson",
title = "Using {Bleichenbacher}'s solution to the hidden number
problem to attack nonce leaks in $ 384$-bit {ECDSA}:
extended version",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "33--45",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0072-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0072-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Grosso:2014:MVM,
author = "Vincent Grosso and Fran{\c{c}}ois-Xavier Standaert and
Sebastian Faust",
title = "Masking vs. multiparty computation: how large is the
gap for {AES}?",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "47--57",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0073-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0073-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sugawara:2014:MSC,
author = "Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki
and Mitsuru Shiozaki and Takeshi Fujino",
title = "On measurable side-channel leaks inside {ASIC} design
primitives",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "59--73",
month = apr,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0078-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0078-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HCa,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "1",
pages = "??--??",
month = apr,
year = "2014",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:35 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Almeida:2014:LPB,
author = "Leonardo C. Almeida and Ewerton R. Andrade and Paulo
S. L. M. Barreto and Marcos A. {Simplicio, Jr.}",
title = "{Lyra}: password-based key derivation with tunable
memory and processing costs",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "2",
pages = "75--89",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0063-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0063-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Negre:2014:EBP,
author = "Chistophe Negre",
title = "Efficient binary polynomial multiplication based on
optimized {Karatsuba} reconstruction",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "2",
pages = "91--106",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0066-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0066-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2014:ASC,
author = "Claude Carlet and Jean-Luc Danger and Sylvain Guilley
and Emmanuel Prouff Houssem Maghrebi",
title = "Achieving side-channel high-order correlation immunity
with leakage squeezing",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "2",
pages = "107--121",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0067-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0067-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Biasi:2014:SEC,
author = "Felipe P. Biasi and Paulo S. L. M. Barreto and Rafael
Misoczki and Wilson V. Ruggiero",
title = "Scaling efficient code-based cryptosystems for
embedded platforms",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "2",
pages = "123--134",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0070-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0070-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Paul:2014:DSC,
author = "Goutam Paul and Anupam Chattopadhyay",
title = "Designing stream ciphers with scalable data-widths: a
case study with {HC-128}",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "2",
pages = "135--143",
month = jun,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0071-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0071-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HCb,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "2",
pages = "??--??",
month = jun,
year = "2014",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Moro:2014:FVS,
author = "N. Moro and K. Heydemann and E. Encrenaz and B.
Robisson",
title = "Formal verification of a software countermeasure
against instruction skip attacks",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "3",
pages = "145--156",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0077-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0077-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Belaid:2014:TFR,
author = "Sonia Bela{\"\i}d and Fabrizio {De Santis} and Johann
Heyszl and Stefan Mangard and Marcel Medwed and
J{\o}rn-Marc Schmidt and Fran{\c{c}}ois-Xavier
Standaert and Stefan Tillich",
title = "Towards fresh re-keying with leakage-resilient {PRFs}:
cipher design principles and analysis",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "3",
pages = "157--171",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0079-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0079-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rauzy:2014:FPC,
author = "Pablo Rauzy and Sylvain Guilley",
title = "A formal proof of countermeasures against fault
injection attacks on {CRT--RSA}",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "3",
pages = "173--185",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0065-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0065-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kamel:2014:ULI,
author = "Dina Kamel and Mathieu Renauld and Denis Flandre and
Fran{\c{c}}ois-Xavier Standaert",
title = "Understanding the limitations and improving the
relevance of {SPICE} simulations in side-channel
security evaluations",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "3",
pages = "187--195",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0080-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0080-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Tiran:2014:MLF,
author = "S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and
P. Maurine",
title = "A model of the leakage in the frequency domain and its
application to {CPA} and {DPA}",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "3",
pages = "197--212",
month = sep,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0074-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0074-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HCc,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "3",
pages = "??--??",
month = sep,
year = "2014",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Aug 20 18:51:36 MDT 2014",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schindler:2014:PAP,
author = "Werner Schindler and Andreas Wiemers",
title = "Power attacks in the presence of exponent blinding",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "4",
pages = "213--236",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0081-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Feb 10 08:19:07 MST 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0081-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Karati:2014:NAB,
author = "Sabyasachi Karati and Abhijit Das and Dipanwita
Roychowdhury and Bhargav Bellur and Debojyoti
Bhattacharya and Aravind Iyer",
title = "New algorithms for batch verification of standard
{ECDSA} signatures",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "4",
pages = "237--258",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0082-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Feb 10 08:19:07 MST 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0082-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Clavier:2014:PIS,
author = "Christophe Clavier and Jean-Luc Danger and Guillaume
Duc and M. Abdelaziz Elaabid and Beno{\^\i}t G{\'e}rard
and Sylvain Guilley and Annelie Heuser and Michael
Kasper and Yang Li and Victor Lomn{\'e} and Daisuke
Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent
Sauvage and Werner Schindler and et al",
title = "Practical improvements of side-channel attacks on
{AES}: feedback from the 2nd {DPA} contest",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "4",
pages = "259--274",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0075-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Feb 10 08:19:07 MST 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0075-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bos:2014:CTM,
author = "Joppe W. Bos",
title = "Constant time modular inversion",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "4",
pages = "275--281",
month = nov,
year = "2014",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0084-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Feb 10 08:19:07 MST 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0084-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HC,
author = "Anonymous",
title = "Help \& Contacts",
journal = j-J-CRYPTO-ENG,
volume = "4",
number = "4",
pages = "??--??",
month = nov,
year = "2014",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Feb 10 08:19:07 MST 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Templin:2015:NPA,
author = "Joshua R. Templin and Jason R. Hamlet",
title = "A new power-aware {FPGA} design metric",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "1",
pages = "1--11",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-013-0060-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-013-0060-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Banik:2015:IDF,
author = "Subhadeep Banik and Subhamoy Maitra and Santanu
Sarkar",
title = "Improved differential fault attack on {MICKEY 2.0}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "1",
pages = "13--29",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0083-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0083-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Faz-Hernandez:2015:ESA,
author = "Armando Faz-Hern{\'a}ndez and Patrick Longa and Ana H.
S{\'a}nchez",
title = "Efficient and secure algorithms for {GLV}-based scalar
multiplication and their implementation on {GLV--GLS}
curves (extended version)",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "1",
pages = "31--52",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0085-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0085-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{OFlynn:2015:SSC,
author = "Colin O'Flynn and Zhizhang Chen",
title = "Synchronous sampling and clock recovery of internal
oscillators for side channel analysis and fault
injection",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "1",
pages = "53--69",
month = apr,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0087-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0087-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Batina:2015:ICS,
author = "Lejla Batina and M. J. B. Robshaw",
title = "Introduction to the {CHES 2014} special issue",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "71--72",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0098-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0098-x;
http://link.springer.com/content/pdf/10.1007/s13389-015-0098-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Coron:2015:FEP,
author = "Jean-S{\'e}bastien Coron and Arnab Roy and Srinivas
Vivek",
title = "Fast evaluation of polynomials over binary finite
fields and application to side-channel
countermeasures",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "73--83",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0099-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0099-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sugawara:2015:RSD,
author = "Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii
and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki
and Takeshi Fujino",
title = "Reversing stealthy dopant-level circuits",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "85--94",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0102-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0102-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Genkin:2015:GYH,
author = "Daniel Genkin and Itamar Pipman and Eran Tromer",
title = "Get your hands off my laptop: physical side-channel
key-extraction attacks on {PCs}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "95--112",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0100-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0100-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Vliegen:2015:PFE,
author = "Jo Vliegen and Nele Mentens and Dirk Koch and Dries
Schellekens and Ingrid Verbauwhede",
title = "Practical feasibility evaluation and improvement of a
pay-per-use licensing scheme for hardware {IP} cores in
{Xilinx} {FPGAs}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "113--122",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0088-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0088-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lerman:2015:MLA,
author = "Liran Lerman and Gianluca Bontempi and Olivier
Markowitch",
title = "A machine learning approach against a masked {AES}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "123--139",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0089-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0089-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gueron:2015:FPF,
author = "Shay Gueron and Vlad Krasnov",
title = "Fast prime field elliptic-curve cryptography with $
256$-bit primes",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "2",
pages = "141--151",
month = jun,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0090-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0090-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guo:2015:SAC,
author = "Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin
and Ramesh Karri",
title = "Security analysis of concurrent error detection
against differential fault analysis",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "3",
pages = "153--169",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0092-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0092-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Perin:2015:VHC,
author = "Guilherme Perin and Laurent Imbert and Philippe
Maurine and Lionel Torres",
title = "Vertical and horizontal correlation attacks on
{RNS}-based exponentiations",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "3",
pages = "171--185",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0095-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0095-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yamamoto:2015:NME,
author = "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh
and Naoya Torii",
title = "A new method for enhancing variety and maintaining
reliability of {PUF} responses and its evaluation on
{ASICs}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "3",
pages = "187--199",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-014-0091-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-014-0091-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Hutter:2015:MMA,
author = "Michael Hutter and Peter Schwabe",
title = "Multiprecision multiplication on {AVR} revisited",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "3",
pages = "201--214",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0093-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0093-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "AVR ATmega 8-bit microcontroller; Karatsuba
multiplication; microcontroller; multiple-precision
multiplication",
}
@Article{Bluhm:2015:FSI,
author = "Manuel Bluhm and Shay Gueron",
title = "Fast software implementation of binary elliptic curve
cryptography",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "3",
pages = "215--226",
month = sep,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0094-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Aug 8 10:42:46 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0094-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "Binary elliptic curve; Binary field arithmetic; ECDHE;
ECDSA; Intel AVX pclmulqdq instruction; Mul\&add;
Scalar multiplication; Side-channel protection",
}
@Article{Fei:2015:SBS,
author = "Yunsi Fei and A. Adam Ding and Jian Lao and Liwei
Zhang",
title = "A statistics-based success rate model for {DPA} and
{CPA}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "4",
pages = "227--243",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0107-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Oct 19 14:22:58 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0107-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hamlet:2015:TOI,
author = "Jason R. Hamlet and Robert W. Brocato",
title = "Throughput-optimized implementations of {QUAD}",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "4",
pages = "245--254",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0109-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Oct 19 14:22:58 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0109-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lerman:2015:BVD,
author = "Liran Lerman and Gianluca Bontempi and Olivier
Markowitch",
title = "The bias-variance decomposition in profiled attacks",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "4",
pages = "255--267",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0106-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Oct 19 14:22:58 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0106-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bongiovanni:2015:DVT,
author = "Simone Bongiovanni and Francesco Centurelli and
Giuseppe Scotti and Alessandro Trifiletti",
title = "Design and validation through a frequency-based metric
of a new countermeasure to protect nanometer {ICs} from
side-channel attacks",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "4",
pages = "269--288",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0096-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Oct 19 14:22:58 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0096-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cenk:2015:SNR,
author = "Murat Cenk and M. Anwar Hasan",
title = "Some new results on binary polynomial multiplication",
journal = j-J-CRYPTO-ENG,
volume = "5",
number = "4",
pages = "289--303",
month = nov,
year = "2015",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0101-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Oct 19 14:22:58 MDT 2015",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0101-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Konheim:2016:ATM,
author = "Alan G. Konheim",
title = "Automated teller machines: their history and
authentication protocols",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "1",
pages = "1--29",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0104-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Apr 7 09:34:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0104-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aldaya:2016:ABT,
author = "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
Sarmiento and Santiago S{\'a}nchez-Solano",
title = "{AES T-Box} tampering attack",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "1",
pages = "31--48",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0103-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Apr 7 09:34:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0103-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ferradi:2016:WOC,
author = "Houda Ferradi and R{\'e}mi G{\'e}raud and David
Naccache and Assia Tria",
title = "When organized crime applies academic results: a
forensic analysis of an in-card listening device",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "1",
pages = "49--59",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0112-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Apr 7 09:34:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0112-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bayon:2016:FME,
author = "Pierre Bayon and Lilian Bossuet and Alain Aubert and
Viktor Fischer",
title = "Fault model of electromagnetic attacks targeting ring
oscillator-based true random number generators",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "1",
pages = "61--74",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0113-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Apr 7 09:34:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0113-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saarinen:2016:BAC,
author = "Markku-Juhani O. Saarinen",
title = "The {BRUTUS} automatic cryptanalytic framework",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "1",
pages = "75--82",
month = apr,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0114-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Apr 7 09:34:40 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-015-0114-1;
http://link.springer.com/content/pdf/10.1007/s13389-015-0114-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guneysu:2016:ICS,
author = "Tim G{\"u}neysu and Helena Handschuh",
title = "Introduction to the {CHES 2015} special issue",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "2",
pages = "83--84",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0130-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon May 30 07:49:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0130-9;
http://link.springer.com/content/pdf/10.1007/s13389-016-0130-9.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schneider:2016:LAM,
author = "Tobias Schneider and Amir Moradi",
title = "Leakage assessment methodology",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "2",
pages = "85--99",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0120-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon May 30 07:49:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0120-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schindler:2016:EEB,
author = "Werner Schindler",
title = "Exclusive exponent blinding is not enough to prevent
any timing attack on {RSA}",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "2",
pages = "101--119",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0124-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon May 30 07:49:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0124-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Maes:2016:SKG,
author = "Roel Maes and Vincent van der Leest and Erik van der
Sluis and Frans Willems",
title = "Secure key generation from biased {PUFs}: extended
version",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "2",
pages = "121--137",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0125-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon May 30 07:49:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0125-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Reparaz:2016:MRL,
author = "Oscar Reparaz and Sujoy Sinha Roy and Ruan de Clercq
and Frederik Vercauteren and Ingrid Verbauwhede",
title = "Masking ring-{LWE}",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "2",
pages = "139--153",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0126-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon May 30 07:49:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0126-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Coisel:2016:ICD,
author = "Iwen Coisel and Ignacio Sanchez",
title = "Improved cryptanalysis of the {DECT} standard cipher",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "2",
pages = "155--169",
month = jun,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0127-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon May 30 07:49:01 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0127-4;
http://link.springer.com/content/pdf/10.1007/s13389-016-0127-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lemire:2016:FBU,
author = "Daniel Lemire and Owen Kaser",
title = "Faster $ 64$-bit universal hashing using carry-less
multiplications",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "171--185",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0110-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0110-5;
http://link.springer.com/article/10.1007/s13389-015-0110-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Goundar:2016:IFA,
author = "Raveen R. Goundar and Marc Joye",
title = "Inversion-free arithmetic on elliptic curves through
isomorphisms",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "187--199",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0131-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0131-8;
http://link.springer.com/article/10.1007/s13389-016-0131-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rauzy:2016:FPS,
author = "Pablo Rauzy and Sylvain Guilley and Zakaria Najm",
title = "Formally proved security of assembly code against
power analysis",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "201--216",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0105-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0105-2;
http://link.springer.com/article/10.1007/s13389-015-0105-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robisson:2016:PFC,
author = "Bruno Robisson and H{\'e}l{\`e}ne {Le Bouder}",
title = "Physical functions: the common factor of side-channel
and fault attacks?",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "217--227",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0111-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0111-4;
http://link.springer.com/article/10.1007/s13389-015-0111-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Galindo:2016:ILR,
author = "David Galindo and Johann Gro{\ss}sch{\"a}dl and Zhe
Liu and Praveen Kumar Vadnala and Srinivas Vivek",
title = "Implementation of a leakage-resilient {ElGamal} key
encapsulation mechanism",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "229--238",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0121-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0121-x;
http://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ngo:2016:MTA,
author = "Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and
Sylvain Guilley and Jean-Luc Danger",
title = "Method taking into account process dispersion to
detect hardware {Trojan Horse} by side-channel
analysis",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "239--247",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0129-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0129-2;
http://link.springer.com/article/10.1007/s13389-016-0129-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ganji:2016:PLA,
author = "Fatemeh Ganji and Shahin Tajik and Jean-Pierre
Seifert",
title = "{PAC} learning of arbiter {PUFs}",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "3",
pages = "249--258",
month = sep,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0119-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Mon Sep 12 08:05:12 MDT 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0119-4;
http://link.springer.com/article/10.1007/s13389-016-0119-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Bos:2016:SEC,
author = "Joppe W. Bos and Craig Costello and Patrick Longa and
Michael Naehrig",
title = "Selecting elliptic curves for cryptography: an
efficiency and security analysis",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "4",
pages = "259--286",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0097-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Nov 17 07:32:46 MST 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0097-y;
http://link.springer.com/article/10.1007/s13389-015-0097-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wenger:2016:HBF,
author = "Erich Wenger and Paul Wolfger",
title = "Harder, better, faster, stronger: elliptic curve
discrete logarithm computations on {FPGAs}",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "4",
pages = "287--297",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-015-0108-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Nov 17 07:32:46 MST 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0108-z;
http://link.springer.com/article/10.1007/s13389-015-0108-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Khalid:2016:RRP,
author = "Ayesha Khalid and Muhammad Hassan and Goutam Paul and
Anupam Chattopadhyay",
title = "{RunFein}: a rapid prototyping framework for {Feistel}
and {SPN}-based block ciphers",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "4",
pages = "299--323",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0116-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Nov 17 07:32:46 MST 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0116-7;
http://link.springer.com/article/10.1007/s13389-016-0116-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Moein:2016:HAA,
author = "Samer Moein and Fayez Gebali and T. Aaron Gulliver",
title = "Hardware attacks: an algebraic approach",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "4",
pages = "325--337",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0117-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Nov 17 07:32:46 MST 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0117-6;
http://link.springer.com/article/10.1007/s13389-016-0117-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ghafar:2016:SRV,
author = "Amir Hamzah Abd Ghafar and Muhammad Rezal Kamel
Ariffin",
title = "{SPA} on {Rabin} variant with public key {$ N = p^2 q
$}",
journal = j-J-CRYPTO-ENG,
volume = "6",
number = "4",
pages = "339--346",
month = nov,
year = "2016",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0118-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Nov 17 07:32:46 MST 2016",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0118-5;
http://link.springer.com/article/10.1007/s13389-016-0118-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carbone:2017:MIA,
author = "Mathieu Carbone and Yannick Teglia and Gilles R.
Ducharme and Philippe Maurine",
title = "Mutual information analysis: higher-order statistical
moments, efficiency and efficacy",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "1--17",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0123-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0123-8;
http://link.springer.com/article/10.1007/s13389-016-0123-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guilley:2017:EAP,
author = "Sylvain Guilley",
title = "Editorial about {PROOFS 2015}",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "19--20",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0140-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0140-7;
http://link.springer.com/content/pdf/10.1007/s13389-016-0140-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Idrissi:2017:TCM,
author = "Noreddine El Janati {El Idrissi} and Guillaume
Bouffard and Jean-Louis Lanet and Said {El Hajji}",
title = "Trust can be misplaced",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "21--34",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0142-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0142-5;
http://link.springer.com/article/10.1007/s13389-016-0142-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nashimoto:2017:BOA,
author = "Shoei Nashimoto and Naofumi Homma and Yu-ichi Hayashi
and Junko Takahashi and Hitoshi Fuji and Takafumi
Aoki",
title = "Buffer overflow attack with multiple fault injection
and a proven countermeasure",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "35--46",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0136-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0136-3;
http://link.springer.com/article/10.1007/s13389-016-0136-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robisson:2017:SSM,
author = "Bruno Robisson and Michel Agoyan and Patrick Soquet
and S{\'e}bastien Le-Henaff and Franck Wajsb{\"u}rt and
Pirouz Bazargan-Sabet and Guillaume Phan",
title = "Smart security management in secure devices",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "47--61",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0143-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0143-4;
http://link.springer.com/article/10.1007/s13389-016-0143-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lugou:2017:STU,
author = "Florian Lugou and Ludovic Apvrille and Aur{\'e}lien
Francillon",
title = "{SMASHUP}: a toolchain for unified verification of
hardware\slash software co-designs",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "63--74",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0145-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0145-2;
http://link.springer.com/article/10.1007/s13389-016-0145-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Azzi:2017:ULC,
author = "Sabine Azzi and Bruno Barras and Maria Christofi and
David Vigilant",
title = "Using linear codes as a fault countermeasure for
nonlinear operations: application to {AES} and formal
verification",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "75--85",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0138-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0138-1;
http://link.springer.com/article/10.1007/s13389-016-0138-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sauvage:2017:MLF,
author = "Laurent Sauvage and Tarik Graba and Thibault
Porteboeuf",
title = "Multi-level formal verification",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "1",
pages = "87--95",
month = apr,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0144-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun Apr 2 17:26:33 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0144-3;
http://link.springer.com/article/10.1007/s13389-016-0144-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gierlichs:2017:ICS,
author = "Benedikt Gierlichs and Axel Y. Poschmann",
title = "Introduction to the {CHES 2016} special issue",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "2",
pages = "97--98",
month = jun,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0158-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jun 24 12:13:17 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/content/pdf/10.1007/s13389-017-0158-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yarom:2017:CTA,
author = "Yuval Yarom and Daniel Genkin and Nadia Heninger",
title = "{CacheBleed}: a timing attack on {OpenSSL}
constant-time {RSA}",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "2",
pages = "99--112",
month = jun,
year = "2017",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jun 24 12:13:17 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ganji:2017:HNM,
author = "Fatemeh Ganji and Shahin Tajik and Fabian
F{\"a}{\ss}ler and Jean-Pierre Seifert",
title = "Having no mathematical model may not secure {PUFs}",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "2",
pages = "113--128",
month = jun,
year = "2017",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jun 24 12:13:17 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Durvaux:2017:TEL,
author = "Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois-Xavier
Standaert and Santos Merino {Del Pozo}",
title = "Towards easy leakage certification: extended version",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "2",
pages = "129--147",
month = jun,
year = "2017",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jun 24 12:13:17 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Boss:2017:SBS,
author = "Erik Boss and Vincent Grosso and Tim G{\"u}neysu and
Gregor Leander and Amir Moradi and Tobias Schneider",
title = "Strong $8$-bit {Sboxes} with efficient masking in
hardware extended version",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "2",
pages = "149--165",
month = jun,
year = "2017",
CODEN = "????",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jun 24 12:13:17 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bottinelli:2017:CAC,
author = "Paul Bottinelli and Joppe W. Bos",
title = "Computational aspects of correlation power analysis",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "3",
pages = "167--181",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0122-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Aug 25 11:38:26 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0122-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ordas:2017:EFI,
author = "S. Ordas and L. Guillaume-Sage and P. Maurine",
title = "Electromagnetic fault injection: the curse of
flip-flops",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "3",
pages = "183--197",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0128-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Aug 25 11:38:26 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0128-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Swierczynski:2017:IPH,
author = "Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe
and Amir Moradi and Christof Paar",
title = "Interdiction in practice --- Hardware {Trojan} against
a high-security {USB} flash drive",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "3",
pages = "199--211",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0132-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Aug 25 11:38:26 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0132-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mayhew:2017:OHL,
author = "Matthew Mayhew and Radu Muresan",
title = "An overview of hardware-level statistical power
analysis attack countermeasures",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "3",
pages = "213--244",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0133-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Aug 25 11:38:26 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0133-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Negre:2017:ERM,
author = "Christophe Negre and Thomas Plantard",
title = "Efficient regular modular exponentiation using
multiplicative half-size splitting",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "3",
pages = "245--253",
month = sep,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0134-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Aug 25 11:38:26 MDT 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0134-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schindler:2017:GPA,
author = "Werner Schindler and Andreas Wiemers",
title = "Generic power attacks on {RSA} with {CRT} and exponent
blinding: new results",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "255--272",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0146-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0146-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aldaya:2017:SVB,
author = "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
Sarmiento and Santiago S{\'a}nchez-Solano",
title = "{SPA} vulnerabilities of the binary extended
{Euclidean} algorithm",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "273--285",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0135-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Nov 23 09:04:19 MST 2017",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0135-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Pasalic:2017:EIG,
author = "Enes Pasalic and Anupam Chattopadhyay and WeiGuo
Zhang",
title = "Efficient implementation of generalized
{Maiorana--McFarland} class of cryptographic
functions",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "287--295",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0139-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0139-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Homma:2017:IPS,
author = "Naofumi Homma",
title = "Introduction to the {PROOFS 2016} special section",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "297--298",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0173-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0173-6;
https://link.springer.com/content/pdf/10.1007/s13389-017-0173-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bhattacharya:2017:FFA,
author = "Sarani Bhattacharya and Debdeep Mukhopadhyay",
title = "Formal fault analysis of branch predictors: attacking
countermeasures of asymmetric key ciphers",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "299--310",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0165-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0165-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Breier:2017:SAS,
author = "Jakub Breier and Dirmanto Jap and Shivam Bhasin",
title = "A study on analyzing side-channel resistant encoding
schemes with respect to fault attacks",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "311--320",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0166-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0166-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dugardin:2017:UME,
author = "Margaux Dugardin and Sylvain Guilley and Martin Moreau
and Zakaria Najm and Pablo Rauzy",
title = "Using modular extension to provably protect {Edwards}
curves against fault attacks",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "321--330",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0167-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0167-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bruneau:2017:OSC,
author = "Nicolas Bruneau and Sylvain Guilley and Annelie Heuser
and Damien Marion and Olivier Rioul",
title = "Optimal side-channel attacks for multivariate leakages
and multiple models",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "331--341",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0170-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0170-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Picek:2017:TAV,
author = "Stjepan Picek and Annelie Heuser and Sylvain Guilley",
title = "Template attack versus {Bayes} classifier",
journal = j-J-CRYPTO-ENG,
volume = "7",
number = "4",
pages = "343--351",
month = nov,
year = "2017",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0172-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0172-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ge:2018:SMT,
author = "Qian Ge and Yuval Yarom and David Cock and Gernot
Heiser",
title = "A survey of microarchitectural timing attacks and
countermeasures on contemporary hardware",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "1",
pages = "1--27",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0141-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0141-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chakraborti:2018:TUT,
author = "Avik Chakraborti and Anupam Chattopadhyay and Muhammad
Hassan and Mridul Nandi",
title = "{TriviA} and {uTriviA}: two fast and secure
authenticated encryption schemes",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "1",
pages = "29--48",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0137-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0137-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chakraborty:2018:DED,
author = "Debrup Chakraborty and Cuauhtemoc Mancillas L{\'o}pez
and Palash Sarkar",
title = "Disk encryption: do we need to preserve length?",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "1",
pages = "49--69",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-016-0147-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-016-0147-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saarinen:2018:ACB,
author = "Markku-Juhani O. Saarinen",
title = "Arithmetic coding and blinding countermeasures for
lattice signatures",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "1",
pages = "71--84",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0149-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0149-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ferradi:2018:RPN,
author = "Houda Ferradi and R{\'e}mi G{\'e}raud and Diana Maimut
and David Naccache and Amaury de Wargny",
title = "Regulating the pace of {von Neumann} correctors",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "1",
pages = "85--91",
month = apr,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0153-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0153-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Fischer:2018:ICS,
author = "Wieland Fischer and Naofumi Homma",
title = "Introduction to the {CHES 2017} special issue",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "2",
pages = "93--94",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0189-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0189-6;
https://link.springer.com/content/pdf/10.1007/s13389-018-0189-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chou:2018:MRT,
author = "Tung Chou",
title = "{McBits} revisited: toward a fast constant-time
code-based {KEM}",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "2",
pages = "95--107",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0186-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0186-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gross:2018:UMA,
author = "Hannes Gross and Stefan Mangard",
title = "A unified masking approach",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "2",
pages = "109--124",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0184-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0184-y;
https://link.springer.com/content/pdf/10.1007/s13389-018-0184-y.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Immler:2018:YRC,
author = "Vincent Immler and Robert Specht and Florian
Unterstein",
title = "Your rails cannot hide from localized {EM}: how
dual-rail logic fails on {FPGAs} --- extended version",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "2",
pages = "125--139",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0185-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0185-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hatzivasilis:2018:RLB,
author = "George Hatzivasilis and Konstantinos Fysarakis and
Ioannis Papaefstathiou and Charalampos Manifavas",
title = "A review of lightweight block ciphers",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "2",
pages = "141--184",
month = jun,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0160-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sun May 27 08:23:24 MDT 2018",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0160-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rodriguez-Henriquez:2018:SIH,
author = "Francisco Rodr{\'\i}guez-Henr{\'\i}quez and Erkay
Savas",
title = "Special issue in honor of {Peter Lawrence
Montgomery}",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "185--187",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0168-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0168-3;
https://link.springer.com/content/pdf/10.1007/s13389-017-0168-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bajard:2018:MRW,
author = "Jean-Claude Bajard and Julien Eynard and Nabil
Merkiche",
title = "{Montgomery} reduction within the context of residue
number system arithmetic",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "189--200",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0154-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0154-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Savas:2018:MI,
author = "Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}",
title = "{Montgomery} inversion",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "201--210",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0161-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0161-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dai:2018:SAM,
author = "Wangchen Dai and Ray C. C. Cheung",
title = "Spectral arithmetic in {Montgomery} modular
multiplication",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "211--226",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0151-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0151-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Costello:2018:MCT,
author = "Craig Costello and Benjamin Smith",
title = "{Montgomery} curves and their arithmetic",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "227--240",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0157-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0157-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Oliveira:2018:MLB,
author = "Thomaz Oliveira and Julio L{\'o}pez and Francisco
Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
title = "The {Montgomery} ladder on binary elliptic curves",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "241--258",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0163-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0163-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cenk:2018:KLF,
author = "Murat Cenk",
title = "{Karatsuba}-like formulae and their associated
techniques",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "3",
pages = "259--269",
month = sep,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0155-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0155-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Farias:2018:CSE,
author = "Luckas A. Farias and Bruno C. Albertini and Paulo S.
L. M. Barreto",
title = "A class of safe and efficient binary {Edwards}
curves",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "271--283",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0174-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0174-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jarvinen:2018:ATA,
author = "Kimmo J{\"a}rvinen and Sujoy Sinha Roy and Ingrid
Verbauwhede",
title = "Arithmetic of $ \tau $-adic expansions for lightweight
{Koblitz} curve cryptography",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "285--300",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0182-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0182-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lerman:2018:TAV,
author = "Liran Lerman and Romain Poussier and Olivier
Markowitch and Fran{\c{c}}ois-Xavier Standaert",
title = "Template attacks versus machine learning revisited and
the curse of dimensionality in side-channel analysis:
extended version",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "301--313",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0162-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0162-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{DeVale:2018:ADI,
author = "John DeVale and Ryan Rakvic and Kevin Rudd",
title = "Another dimension in integrated circuit trust",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "315--326",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0164-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0164-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Karmakar:2018:SBS,
author = "Sandip Karmakar and Dipanwita Roy Chowdhury",
title = "Scan-based side channel attack on stream ciphers and
its prevention",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "327--340",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0178-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0178-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Skoric:2018:TDS,
author = "Boris Skori{\'c}",
title = "A trivial debiasing scheme for {Helper Data Systems}",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "341--349",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0183-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0183-z;
https://link.springer.com/content/pdf/10.1007/s13389-018-0183-z.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dosso:2018:EAC,
author = "Yssouf Dosso and Fabien Herbaut and Nicolas M{\'e}loni
and Pascal V{\'e}ron",
title = "{Euclidean} addition chains scalar multiplication on
curves with efficient endomorphism",
journal = j-J-CRYPTO-ENG,
volume = "8",
number = "4",
pages = "351--367",
month = nov,
year = "2018",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0190-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:50 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0190-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hutchinson:2019:CMD,
author = "Aaron Hutchinson and Koray Karabina",
title = "Constructing multidimensional differential addition
chains and their applications",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "1",
pages = "1--19",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0177-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0177-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Batina:2019:OTA,
author = "Lejla Batina and {\L}ukasz Chmielewski and Louiza
Papachristodoulou and Peter Schwabe and Michael
Tunstall",
title = "Online template attacks",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "1",
pages = "21--36",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0171-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0171-8;
https://link.springer.com/content/pdf/10.1007/s13389-017-0171-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Diop:2019:TPH,
author = "Ibrahima Diop and Yanis Linge and Thomas Ordas and
Pierre-Yvan Liardet and Philippe Maurine",
title = "From theory to practice: horizontal attacks on
protected implementations of modular exponentiations",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "1",
pages = "37--52",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0181-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0181-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saha:2019:IDF,
author = "Dhiman Saha and Dipanwita Roy Chowdhury",
title = "Internal differential fault analysis of parallelizable
ciphers in the counter-mode",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "1",
pages = "53--67",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0179-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0179-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Banik:2019:CCC,
author = "Subhadeep Banik and Andrey Bogdanov and Francesco
Regazzoni",
title = "Compact circuits for combined {AES} encryption\slash
decryption",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "1",
pages = "69--83",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0176-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0176-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Konheim:2019:HFI,
author = "Alan G. Konheim",
title = "{Horst Feistel}: the inventor of {LUCIFER}, the
cryptographic algorithm that changed cryptology",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "1",
pages = "85--100",
month = apr,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0198-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0198-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ueno:2019:HEG,
author = "Rei Ueno and Naofumi Homma and Yasuyuki Nogami and
Takafumi Aoki",
title = "Highly efficient {$ \textit {GF}(2^8) $} inversion
circuit based on hybrid {GF} representations",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "2",
pages = "101--113",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0187-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0187-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robert:2019:EFB,
author = "Jean-Marc Robert and Christophe Negre and Thomas
Plantard",
title = "Efficient Fixed-base exponentiation and scalar
multiplication based on a multiplicative splitting
exponent recoding",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "2",
pages = "115--136",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0196-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0196-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Unterluggauer:2019:MME,
author = "Thomas Unterluggauer and Mario Werner and Stefan
Mangard",
title = "{MEAS}: memory encryption and authentication secure
against side-channel attacks",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "2",
pages = "137--158",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0180-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0180-2;
https://link.springer.com/content/pdf/10.1007/s13389-018-0180-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Peccerillo:2019:PBA,
author = "Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin
Kaya Ko{\c{c}}",
title = "Parallel bitsliced {AES} through {PHAST}: a
single-source high-performance library for multi-cores
and {GPUs}",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "2",
pages = "159--171",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-017-0175-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-017-0175-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hutter:2019:CTH,
author = "Michael Hutter and Michael Tunstall",
title = "Constant-time higher-order {Boolean}-to-arithmetic
masking",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "2",
pages = "173--184",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0191-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0191-z",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Herbert:2019:DIL,
author = "Vincent Herbert and Bhaskar Biswas and Caroline
Fontaine",
title = "Design and implementation of low-depth pairing-based
homomorphic encryption scheme",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "2",
pages = "185--201",
month = jun,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0192-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:51 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0192-y",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saha:2019:AFE,
author = "Sayandeep Saha and Ujjawal Kumar and Debdeep
Mukhopadhyay and Pallab Dasgupta",
title = "An automated framework for exploitable fault
identification in block ciphers",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "203--219",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00203-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00203-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wisiol:2019:WAL,
author = "Nils Wisiol and Marian Margraf",
title = "Why attackers lose: design and security analysis of
arbitrarily large {XOR} arbiter {PUFs}",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "221--230",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00204-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00204-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{BenElOuahma:2019:SCR,
author = "In{\`e}s {Ben El Ouahma} and Quentin L. Meunier and
Karine Heydemann and Emmanuelle Encrenaz",
title = "Side-channel robustness analysis of masked assembly
codes using a symbolic approach",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "231--242",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00205-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00205-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Baumann:2019:VSL,
author = "Christoph Baumann and Oliver Schwarz and Mads Dam",
title = "On the verification of system-level information flow
properties for virtualized execution platforms",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "243--261",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00216-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00216-4;
https://link.springer.com/content/pdf/10.1007/s13389-019-00216-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Das:2019:AGH,
author = "Poulami Das and Debapriya Basu Roy and Debdeep
Mukhopadhyay",
title = "Automatic generation of {HCCA}-resistant scalar
multiplication algorithm by proper sequencing of field
multiplier operands",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "263--275",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00219-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00219-1",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Geraud:2019:MRN,
author = "R{\'e}mi G{\'e}raud and David Naccache",
title = "Mixed-radix {Naccache--Stern} encryption",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "277--282",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0188-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0188-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dinu:2019:TLB,
author = "Daniel Dinu and Yann {Le Corre} and Dmitry
Khovratovich and L{\'e}o Perrin and Johann
Gro{\ss}sch{\"a}dl and Alex Biryukov",
title = "Triathlon of lightweight block ciphers for the
{Internet of Things}",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "283--302",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0193-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0193-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2019:PDS,
author = "Claude Carlet and Abderrahman Daif and Sylvain Guilley
and C{\'e}dric Tavernier",
title = "Polynomial direct sum masking to protect against both
{SCA} and {FIA}",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "3",
pages = "303--312",
month = sep,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0194-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Oct 2 11:24:52 MDT 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0194-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kawamura:2019:RMR,
author = "Shinichi Kawamura and Yuichi Komano and Hideo Shimizu
and Tomoko Yonemura",
title = "{RNS} {Montgomery} reduction algorithms using
quadratic residuosity",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "313--331",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0195-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0195-8;
https://link.springer.com/content/pdf/10.1007/s13389-018-0195-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saldamli:2019:UMM,
author = "Gokay Saldamli and Yoo-Jin Baek",
title = "Uniform {Montgomery} multiplier",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "333--339",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00213-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00213-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Drucker:2019:TSO,
author = "Nir Drucker and Shay Gueron",
title = "A toolbox for software optimization of {QC--MDPC}
code-based cryptosystems",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "341--357",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-00200-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-00200-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Banegas:2019:NCI,
author = "Gustavo Banegas and Ricardo Cust{\'o}dio and Daniel
Panario",
title = "A new class of irreducible pentanomials for
polynomial-based multipliers in binary fields",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "359--373",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-0197-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-0197-6;
https://link.springer.com/content/pdf/10.1007/s13389-018-0197-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cianfriglia:2019:KAR,
author = "Marco Cianfriglia and Stefano Guarino and Massimo
Bernaschi and Flavio Lombardi and Marco Pedicini",
title = "Kite attack: reshaping the cube attack for a flexible
{GPU}-based maxterm search",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "375--392",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00217-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00217-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Levina:2019:PMS,
author = "Alla Levina and Roman Mostovoi and Daria Sleptsova and
Lavrentii Tcvetkov",
title = "Physical model of sensitive data leakage from
{PC}-based cryptographic systems",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "393--400",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00215-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00215-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wu:2019:FUE,
author = "Tao Wu and Ruomei Wang",
title = "Fast unified elliptic curve point multiplication for
{NIST} prime curves on {FPGAs}",
journal = j-J-CRYPTO-ENG,
volume = "9",
number = "4",
pages = "401--410",
month = nov,
year = "2019",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00211-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Nov 30 08:02:44 MST 2019",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00211-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389w",
}
@Article{Jauvart:2020:ISC,
author = "Damien Jauvart and Nadia El Mrabet and Jacques J. A.
Fournier and Louis Goubin",
title = "Improving side-channel attacks against pairing-based
cryptography",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "1",
pages = "1--16",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-00201-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 8 10:09:54 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-00201-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Barthe:2020:IPM,
author = "Gilles Barthe and Sonia Bela{\"\i}d and Fran{\c{c}}ois
Dupressoir and Pierre-Alain Fouque and Benjamin
Gr{\'e}goire and Fran{\c{c}}ois-Xavier Standaert and
Pierre-Yves Strub",
title = "Improved parallel mask refreshing algorithms: generic
solutions with parametrized non-interference and
automated optimizations",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "1",
pages = "17--26",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-018-00202-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 8 10:09:54 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-018-00202-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Abarzua:2020:SVA,
author = "Rodrigo Abarz{\'u}a and Santi Mart{\'\i}nez and
Valeria Mendoza and Nicolas Th{\'e}riault",
title = "Same value analysis on {Edwards} curves",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "1",
pages = "27--48",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00206-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 8 10:09:54 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00206-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Goubin:2020:HRS,
author = "Louis Goubin and Pascal Paillier and Matthieu Rivain
and Junwei Wang",
title = "How to reveal the secrets of an obscure white-box
implementation",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "1",
pages = "49--66",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00207-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 8 10:09:54 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00207-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Willers:2020:FDC,
author = "Oliver Willers and Christopher Huth and Jorge Guajardo
and Helmut Seidel and Peter Deutsch",
title = "On the feasibility of deriving cryptographic keys from
{MEMS} sensors",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "1",
pages = "67--83",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00208-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 8 10:09:54 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00208-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Zhou:2020:DLM,
author = "Yuanyuan Zhou and Fran{\c{c}}ois-Xavier Standaert",
title = "Deep learning mitigates but does not annihilate the
need of aligned traces and a generalized {ResNet} model
for side-channel attacks",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "1",
pages = "85--95",
month = apr,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00209-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 8 10:09:54 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00209-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bos:2020:FMA,
author = "Joppe W. Bos and Simon J. Friedberger",
title = "Faster modular arithmetic for isogeny-based crypto on
embedded devices",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "2",
pages = "97--109",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00214-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jul 25 08:32:22 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00214-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Didier:2020:EMO,
author = "Laurent-St{\'e}phane Didier and Fangan-Yssouf Dosso
and Pascal V{\'e}ron",
title = "Efficient modular operations using the adapted modular
number system",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "2",
pages = "111--133",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00221-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jul 25 08:32:22 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00221-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hettwer:2020:AML,
author = "Benjamin Hettwer and Stefan Gehrer and Tim
G{\"u}neysu",
title = "Applications of machine learning techniques in
side-channel attacks: a survey",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "2",
pages = "135--162",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00212-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jul 25 08:32:22 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00212-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Benadjila:2020:DLS,
author = "Ryad Benadjila and Emmanuel Prouff and R{\'e}mi
Strullu and Eleonora Cagli and C{\'e}cile Dumas",
title = "Deep learning for side-channel analysis and
introduction to {ASCAD} database",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "2",
pages = "163--188",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00220-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jul 25 08:32:22 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00220-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Orumiehchiha:2020:DFA,
author = "Mohammad Ali Orumiehchiha and Saeed Rostami and Elham
Shakour and Josef Pieprzyk",
title = "A differential fault attack on the {WG} family of
stream ciphers",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "2",
pages = "189--195",
month = jun,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00222-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Jul 25 08:32:22 MDT 2020",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00222-x",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Piccoli:2020:PMB,
author = "Alessandro {De Piccoli} and Andrea Visconti and
Ottavio Giulio Rizzo",
title = "Polynomial multiplication over binary finite fields:
new upper bounds",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "3",
pages = "197--210",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00210-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:04 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00210-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cruz:2020:ESS,
author = "Rafael J. Cruz and Antonio Guimar{\~a}es and Diego F.
Aranha",
title = "Efficient and secure software implementations of
{Fantomas}",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "3",
pages = "211--228",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-019-00218-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:04 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-019-00218-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hiller:2020:REC,
author = "Matthias Hiller and Ludwig K{\"u}rzinger and Georg
Sigl",
title = "Review of error correction for {PUFs} and evaluation
on state-of-the-art {FPGAs}",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "3",
pages = "229--247",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00223-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:04 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00223-w;
https://link.springer.com/content/pdf/10.1007/s13389-020-00223-w.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Schoinianakis:2020:RAS,
author = "Dimitrios Schoinianakis",
title = "Residue arithmetic systems in cryptography: a survey
on modern security applications",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "3",
pages = "249--267",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00231-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:04 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00231-w",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wiemers:2020:RSR,
author = "Andreas Wiemers",
title = "A remark on a success rate model for side-channel
attack analysis",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "3",
pages = "269--274",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00235-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:04 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00235-6;
https://link.springer.com/content/pdf/10.1007/s13389-020-00235-6.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Richter:2020:TAN,
author = "Bastian Richter and Amir Moradi",
title = "Template attacks on nano-scale {CMOS} devices",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "3",
pages = "275--285",
month = sep,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00225-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:04 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00225-8;
https://link.springer.com/content/pdf/10.1007/s13389-020-00225-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Batina:2020:PE,
author = "Lejla Batina and Nele Mentens",
title = "{PROOFS} 2018 Editorial",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "4",
pages = "287--287",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00248-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00248-1;
https://link.springer.com/content/pdf/10.1007/s13389-020-00248-1.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Alam:2020:IAH,
author = "Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen
Kadiyala and Siew-Kei Lam and Thambipillai Srikanthan",
title = "Improving accuracy of {HPC}-based malware
classification for embedded platforms using gradient
descent optimization",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "4",
pages = "289--303",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00232-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00232-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sijacic:2020:TEA,
author = "Danilo Sijaci{\'c} and Josep Balasch and Bohan Yang
and Santosh Ghosh and Ingrid Verbauwhede",
title = "Towards efficient and automated side-channel
evaluations at design time",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "4",
pages = "305--319",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00233-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00233-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gay:2020:ECS,
author = "Mael Gay and Batya Karp and Osnat Keren and Ilia
Polian",
title = "Error control scheme for malicious and natural faults
in cryptographic modules",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "4",
pages = "321--336",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00234-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00234-7;
https://link.springer.com/content/pdf/10.1007/s13389-020-00234-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ouladj:2020:PTA,
author = "Maamar Ouladj and Nadia {El Mrabet} and Sylvain
Guilley and Philippe Guillot and Gilles
Mill{\'e}rioux",
title = "On the power of template attacks in highly
multivariate context",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "4",
pages = "337--354",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00239-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00239-2",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Baksi:2020:IIC,
author = "Anubhab Baksi and Dhiman Saha and Sumanta Sarkar",
title = "To infect or not to infect: a critical analysis of
infective countermeasures in fault attacks",
journal = j-J-CRYPTO-ENG,
volume = "10",
number = "4",
pages = "355--374",
month = nov,
year = "2020",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00224-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00224-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yeo:2021:IAA,
author = "Sze Ling Yeo and Duc-Phong Le and Khoongming Khoo",
title = "Improved algebraic attacks on lightweight block
ciphers",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "1",
pages = "1--19",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00237-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00237-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Resende:2021:FUP,
author = "Amanda Cristina Davi Resende and Diego de Freitas
Aranha",
title = "Faster unbalanced {Private Set Intersection} in the
semi-honest setting",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "1",
pages = "21--38",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00242-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00242-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bronchain:2021:RRT,
author = "Olivier Bronchain and Tobias Schneider and
Fran{\c{c}}ois-Xavier Standaert",
title = "Reducing risks through simplicity: high side-channel
security for lazy engineers",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "1",
pages = "39--55",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00241-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00241-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Pereira:2021:OPA,
author = "Geovandro Pereira and Javad Doliskani and David Jao",
title = "$x$-only point addition formula and faster compressed
{SIKE}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "1",
pages = "57--69",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00245-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00245-4",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Abarzua:2021:SPS,
author = "Rodrigo Abarz{\'u}a and Claudio Valencia and Julio
L{\'o}pez",
title = "Survey on performance and security problems of
countermeasures for passive side-channel attacks on
{ECC}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "1",
pages = "71--102",
month = apr,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00257-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri May 7 08:20:05 MDT 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00257-8",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Heydemann:2021:EAP,
author = "Karine Heydemann and Letitia Li",
title = "Editorial about {PROOFS 2019}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "103--104",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00236-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
note = "See correction \cite{Heydemann:2021:CEA}.",
URL = "http://link.springer.com/article/10.1007/s13389-020-00236-5;
https://link.springer.com/content/pdf/10.1007/s13389-020-00236-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ganji:2021:RPC,
author = "Fatemeh Ganji and Shahin Tajik and Pascal Stauss and
Jean-Pierre Seifert and Mark Tehranipoor and Domenic
Forte",
title = "Rock'n'roll {PUFs}: crafting provably secure {PUFs}
from less secure ones (extended version)",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "105--118",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00226-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00226-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Cheng:2021:DFI,
author = "Wei Cheng and Claude Carlet and Kouassi Goli and
Jean-Luc Danger and Sylvain Guilley",
title = "Detecting faults in inner product masking scheme",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "119--133",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00227-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00227-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Perianin:2021:EEA,
author = "Thomas Perianin and Sebastien Carr{\'e} and Victor
Dyseryn and Adrien Facon and Sylvain Guilley",
title = "End-to-end automated cache-timing attack driven by
machine learning",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "135--146",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00228-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00228-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Keren:2021:IRC,
author = "Osnat Keren and Ilia Polian",
title = "{IPM-RED}: combining higher-order masking with robust
error detection",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "147--160",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00229-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00229-4;
https://link.springer.com/content/pdf/10.1007/s13389-020-00229-4.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ueno:2021:MCS,
author = "Rei Ueno and Junko Takahashi and Yu-ichi Hayashi and
Naofumi Homma",
title = "A method for constructing sliding windows leak from
noisy cache timing information",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "161--170",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00230-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00230-x;
https://link.springer.com/content/pdf/10.1007/s13389-020-00230-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kamel:2021:SCA,
author = "Dina Kamel and Davide Bellizia and Olivier Bronchain
and Fran{\c{c}}ois-Xavier Standaert",
title = "Side-channel analysis of a learning parity with
physical noise processor",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "171--179",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00238-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00238-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jacobson:2021:RWK,
author = "Michael John {Jacobson, Jr.} and Prabhat Kushwaha",
title = "Removable weak keys for discrete logarithm-based
cryptography",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "181--195",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00250-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00250-7",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Heydemann:2021:CEA,
author = "Karine Heydemann and Letitia Li",
title = "Correction to: {Editorial} about {PROOFS 2019}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "2",
pages = "197--197",
month = jun,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00266-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
note = "See \cite{Heydemann:2021:EAP}.",
URL = "http://link.springer.com/article/10.1007/s13389-021-00266-7;
https://link.springer.com/content/pdf/10.1007/s13389-021-00266-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chang:2021:ASI,
author = "Chip-Hong Chang and Daniel E. Holcomb and Ulrich
R{\"u}hrmair and Patrick Schaumont",
title = "The {ASHES 2019} special issue at {JCEN}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "199--200",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00270-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00270-x;
https://link.springer.com/content/pdf/10.1007/s13389-021-00270-x.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Shiozaki:2021:SEA,
author = "Mitsuru Shiozaki and Takeshi Fujino",
title = "Simple electromagnetic analysis attack based on
geometric leak on {ASIC} implementation of
ring-oscillator {PUF}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "201--212",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00240-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00240-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Zhang:2021:NTG,
author = "Yuqiao Zhang and Ayush Jain and Pinchen Cui and Ziqi
Zhou and Ujjwal Guin",
title = "A novel topology-guided attack and its countermeasure
towards secure logic locking",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "213--226",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00243-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00243-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gu:2021:LSC,
author = "Chongyan Gu and Chip-Hong Chang and Weiqiang Liu and
Neil Hanley and Jack Miskelly and M{\'a}ire O'Neill",
title = "A large-scale comprehensive evaluation of single-slice
ring oscillator and {PicoPUF} bit cells on 28-nm
{Xilinx FPGAs}",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "227--238",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00244-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00244-5;
https://link.springer.com/content/pdf/10.1007/s13389-020-00244-5.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
keywords = "physically unclonable functions (PUFs)",
}
@Article{Bandara:2021:ACD,
author = "Sahan Bandara and Michel A. Kinsy",
title = "Adaptive caches as a defense mechanism against cache
side-channel attacks",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "239--255",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00246-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00246-3",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Unterstein:2021:SSU,
author = "Florian Unterstein and Nisha Jacob and Neil Hanley and
Chongyan Gu and Johann Heyszl",
title = "{SCA} secure and updatable crypto engines for {FPGA
SoC} bitstream decryption: extended version",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "257--272",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00247-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00247-2;
https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ramezanpour:2021:FIM,
author = "Keyvan Ramezanpour and Paul Ampadu and William Diehl",
title = "Fault intensity map analysis with neural network key
distinguisher",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "273--288",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00249-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00249-0",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nashimoto:2021:LCD,
author = "Shoei Nashimoto and Daisuke Suzuki and Noriyuki Miura
and Tatsuya Machida and Kohei Matsuda and Makoto
Nagata",
title = "Low-cost distance-spoofing attack on {FMCW} radar and
its feasibility study on countermeasure",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "289--298",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00252-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00252-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Azriel:2021:SAM,
author = "Leonid Azriel and Julian Speith and Nils Albartus and
Ran Ginosar and Avi Mendelson and Christof Paar",
title = "A survey of algorithmic methods in {IC} reverse
engineering",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "3",
pages = "299--315",
month = sep,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00268-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:55 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00268-5",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Howe:2021:EPI,
author = "James Howe and Marco Martinoli and Elisabeth Oswald
and Francesco Regazzoni",
title = "Exploring Parallelism to Improve the Performance of
{FrodoKEM} in Hardware",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "4",
pages = "317--327",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00258-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:56 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00258-7;
https://link.springer.com/content/pdf/10.1007/s13389-021-00258-7.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Perin:2021:ICS,
author = "Lucas Pandolfo Perin and Gustavo Zambonin and Ricardo
Cust{\'o}dio and Lucia Moura and Daniel Panario",
title = "Improved constant-sum encodings for hash-based
signatures",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "4",
pages = "329--351",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00264-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:56 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00264-9",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Trouchkine:2021:EFI,
author = "Thomas Trouchkine and S{\'e}banjila Kevin Bukasa and
Mathieu Escouteloup and Ronan Lashermes and Guillaume
Bouffard",
title = "Electromagnetic fault injection against a complex
{CPU}, toward new micro-architectural fault models",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "4",
pages = "353--367",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00259-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:56 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00259-6",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mittmann:2021:TAL,
author = "Johannes Mittmann and Werner Schindler",
title = "Timing attacks and local timing attacks against
{Barrett}'s modular multiplication algorithm",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "4",
pages = "369--397",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00254-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:56 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-020-00254-3;
https://link.springer.com/content/pdf/10.1007/s13389-020-00254-3.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bajard:2021:MFP,
author = "Jean Claude Bajard and Sylvain Duquesne",
title = "{Montgomery}-friendly primes and applications to
cryptography",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "4",
pages = "399--415",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00260-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:56 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00260-z",
abstract = "This paper deals with Montgomery-friendly primes
designed for the modular reduction algorithm of
Montgomery. These numbers are scattered in the
literature and their properties are partially
exploited. We exhibit a large family of
Montgomery-friendly primes which give rise to efficient
modular reduction algorithms. We develop two main
outcomes. The first one is dedicated directly to
cryptography, in particular for isogeny-based
approaches and more generally to elliptic curves
cryptography (ECC). We suggest more appropriate finite
fields and curves in terms of complexity for the
recommended security levels, for both isogeny-based
cryptography and ECC. The second issue is mainly
arithmetic (even if its main use is cryptography), and
we propose families of alternative RNS bases. We show
that, for dedicated architectures with word operators,
we can reach, for a same or better complexity, larger
RNS bases with Montgomery-friendly pairwise co-primes
than the RNS bases generally used in the literature
with pseudo-Mersenne numbers.",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lombardia:2021:SSL,
author = "Sergio Rold{\'a}n Lombard{\'\i}a and Fatih Balli and
Subhadeep Banik",
title = "Six shades lighter: a bit-serial implementation of the
{AES} family",
journal = j-J-CRYPTO-ENG,
volume = "11",
number = "4",
pages = "417--439",
month = nov,
year = "2021",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00265-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Wed Feb 2 10:55:56 MST 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "http://link.springer.com/article/10.1007/s13389-021-00265-8;
https://link.springer.com/content/pdf/10.1007/s13389-021-00265-8.pdf",
acknowledgement = ack-nhfb,
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Molteni:2022:RCR,
author = "Maria Chiara Molteni and Vittorio Zaccaria",
title = "A relation calculus for reasoning about $t$-probing
security",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "1",
pages = "1--14",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00286-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Apr 16 13:18:32 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00286-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bozilov:2022:OTI,
author = "Dusan Bozilov and Miroslav Knezevi{\'c} and Ventzislav
Nikov",
title = "Optimized threshold implementations: securing
cryptographic accelerators for low-energy and
low-latency applications",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "1",
pages = "15--51",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00276-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Apr 16 13:18:32 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00276-5",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Caforio:2022:MSV,
author = "Andrea Caforio and Fatih Balli and Subhadeep Banik",
title = "Melting {SNOW-V}: improved lightweight architectures",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "1",
pages = "53--73",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00251-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Apr 16 13:18:32 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-020-00251-6",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ouladj:2022:SAP,
author = "Maamar Ouladj and Sylvain Guilley and Farid Mokrane",
title = "Spectral approach to process the (multivariate)
high-order template attack against any masking scheme",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "1",
pages = "75--93",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-020-00253-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Apr 16 13:18:32 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-020-00253-4",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Buhrow:2022:PMM,
author = "Benjamin Buhrow and Barry Gilbert and Clifton Haider",
title = "Parallel modular multiplication using 512-bit advanced
vector instructions",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "1",
pages = "95--105",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00256-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Apr 16 13:18:32 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00256-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nath:2022:SET,
author = "Kaushik Nath and Palash Sarkar",
title = "Security and efficiency trade-offs for elliptic curve
{Diffie--Hellman} at the 128-bit and 224-bit security
levels",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "1",
pages = "107--121",
month = apr,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00261-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Sat Apr 16 13:18:32 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00261-y",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Brunetta:2022:MCD,
author = "Carlo Brunetta and Pablo Picazo-Sanchez",
title = "Modelling cryptographic distinguishers using machine
learning",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "2",
pages = "123--135",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00262-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 3 10:37:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00262-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Winderickx:2022:DEA,
author = "Jori Winderickx and An Braeken and Nele Mentens",
title = "In-depth energy analysis of security algorithms and
protocols for the {Internet of Things}",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "2",
pages = "137--149",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00274-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 3 10:37:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00274-7",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{David:2022:REB,
author = "Liron David and Avishai Wool",
title = "Rank estimation with bounded error via exponential
sampling",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "2",
pages = "151--168",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00269-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 3 10:37:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00269-4",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Le:2022:IFA,
author = "Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani",
title = "Improved fault analysis on {SIMECK} ciphers",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "2",
pages = "169--180",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00263-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 3 10:37:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00263-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gross:2022:BTM,
author = "Mathieu Gross and Nisha Jacob and Georg Sigl",
title = "Breaking {TrustZone} memory isolation and secure boot
through malicious hardware on a modern {FPGA-SoC}",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "2",
pages = "181--196",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00273-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 3 10:37:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00273-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Liu:2022:CTA,
author = "Fanghui Liu and Waldemar Cruz and Laurent Michel",
title = "A comprehensive tolerant algebraic side-channel attack
over modern ciphers using constraint programming",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "2",
pages = "197--228",
month = jun,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00280-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 3 10:37:26 MDT 2022",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00280-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Engels:2022:CVR,
author = "Susanne Engels and Max Hoffmann and Christof Paar",
title = "A critical view on the real-world security of logic
locking",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "229--244",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00294-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00294-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dutertre:2022:PPF,
author = "Jean-Max Dutertre and Amir-Pasha Mirbaha and David
Naccache and Assia Tria",
title = "Photonic power firewalls",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "245--254",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00291-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00291-0",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{DiMauro:2022:DIN,
author = "Juan {Di Mauro} and Eduardo Salazar and Hugo D.
Scolnik",
title = "Design and implementation of a novel cryptographically
secure pseudorandom number generator",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "255--265",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00297-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00297-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chowdhury:2022:PSP,
author = "Sreeja Chowdhury and Ana Covic and Rabin Yu Acharya
and Spencer Dupee and Fatemeh Ganji and Domenic Forte",
title = "Physical security in the post-quantum era",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "267--303",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00255-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00255-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mandal:2022:SNM,
author = "Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar
and Yosuke Todo",
title = "{Sycon}: a new milestone in designing {ASCON}-like
permutations",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "305--327",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00272-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00272-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yeniaras:2022:FCT,
author = "Esra Yeniaras and Murat Cenk",
title = "Faster characteristic three polynomial multiplication
and its application to {NTRU} Prime decapsulation",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "329--348",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00282-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00282-7",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chavez-Saab:2022:SCS,
author = "Jorge Ch{\'a}vez-Saab and Jes{\'u}s-Javier
Chi-Dom{\'{\i}}nguez and Samuel Jaques and Francisco
Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
title = "The {SQALE} of {CSIDH}: sublinear {V{\'e}lu}
quantum-resistant isogeny action with low exponents",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "3",
pages = "349--368",
month = sep,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00271-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00271-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chang:2022:ASI,
author = "Chip-Hong Chang and Stefan Katzenbeisser and Ulrich
R{\"u}hrmair and Patrick Schaumont",
title = "The {ASHES 2020} special issue at {JCEN}",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "369--370",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00300-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00300-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saarinen:2022:DRV,
author = "Markku-Juhani O. Saarinen and G. Richard Newell and
Ben Marshall",
title = "Development of the {RISC-V} entropy source interface",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "371--386",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00275-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/linux.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib;
https://www.math.utah.edu/pub/tex/bib/risc-v.bib;
https://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00275-6",
abstract = "The RISC-V true random number generator (TRNG)
architecture breaks with previous ISA TRNG practice by
splitting the entropy source (ES) component away from
cryptographic DRBGs into a separate privileged
interface, and in its use of polling. The modular
approach is suitable for the RISC-V hardware IP
ecosystem, allows a significantly smaller
implementation footprint on platforms that need it,
while directly supporting current standards compliance
testing methods. We describe the interface, its use in
cryptography, and offer additional discussion,
background, and rationale for various aspects of it.
The design was informed by lessons learned from earlier
mainstream ISAs, recently introduced SP 800-90B and
FIPS 140-3 entropy audit requirements, AIS 31 and
common criteria, current and emerging cryptographic
needs such as post-quantum cryptography, and the goal
of supporting a wide variety of RISC-V implementations
and applications. Many of the architectural choices
result from quantitative observations about random
number generators in secure microcontrollers, the Linux
kernel, and cryptographic libraries.",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ruhrmair:2022:SFS,
author = "Ulrich R{\"u}hrmair",
title = "Secret-free security: a survey and tutorial",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "387--412",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00283-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00283-6",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jin:2022:PAC,
author = "Chenglu Jin and Wayne Burleson and Marten van Dijk and
Ulrich R{\"u}hrmair",
title = "Programmable access-controlled and generic erasable
{PUF} design and its applications",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "413--432",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00284-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00284-z",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jana:2022:DFA,
author = "Amit Jana and Anirban Nath and Goutam Paul and Dhiman
Saha",
title = "Differential fault analysis of {NORX} using variants
of coupon collector problem",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "433--459",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00285-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00285-y",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Fustos:2022:FLS,
author = "Jacob Fustos and Michael Bechtel and Heechul Yun",
title = "A framework for leaking secrets to past instructions",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "461--473",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00289-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00289-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kundu:2022:FAP,
author = "Anup Kumar Kundu and Aikata and Banashri Karmakar and
Dhiman Saha",
title = "Fault analysis of the {PRINCE} family of lightweight
ciphers",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "475--494",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00290-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00290-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mukherjee:2022:CSP,
author = "Rijoy Mukherjee and Sree Ranjani Rajendran and Rajat
Subhra Chakraborty",
title = "A comprehensive survey of physical and logic testing
techniques for {Hardware Trojan} detection and
prevention",
journal = j-J-CRYPTO-ENG,
volume = "12",
number = "4",
pages = "495--522",
month = nov,
year = "2022",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00295-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:09 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00295-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wiemers:2023:IRS,
author = "Andreas Wiemers and Johannes Mittmann",
title = "Improving recent side-channel attacks against the
{DES} key schedule",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "1--17",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00279-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00279-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cicek:2023:NRW,
author = "Ihsan Cicek and Ahmad {Al Khas}",
title = "A new read-write collision-based {SRAM PUF}
implemented on {Xilinx FPGAs}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "19--36",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00281-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00281-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robert:2023:FMM,
author = "Jean-Marc Robert and Pascal V{\'e}ron",
title = "Faster multiplication over {$ \mathbb {F}_2 [X] $}
using {AVX512} instruction set and {VPCLMULQDQ}
instruction",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "37--55",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-021-00278-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-021-00278-3",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Attias:2023:RMM,
author = "Vidal Attias and Luigi Vigneri and Vassil Dimitrov",
title = "Rethinking modular multi-exponentiation in real-world
applications",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "57--70",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00287-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00287-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Giron:2023:PQH,
author = "Alexandre Augusto Giron and Ricardo Cust{\'o}dio and
Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
title = "Post-quantum hybrid key exchange: a systematic mapping
study",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "71--88",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00288-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00288-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Adj:2023:KBS,
author = "Gora Adj and Jes{\'u}s-Javier Chi-Dom{\'\i}nguez and
Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
title = "{Karatsuba}-based square-root {V{\'e}lu}'s formulas
applied to two isogeny-based protocols",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "89--106",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00293-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00293-y",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nadikuda:2023:LAT,
author = "Pradeep Kumar Goud Nadikuda and Lakshmi Boppana",
title = "Low area-time complexity point multiplication
architecture for {ECC} over {$ {\rm GF}(2^m) $} using
polynomial basis",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "107--123",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00302-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00302-0",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koshelev:2023:SMT,
author = "Dmitrii Koshelev",
title = "Subgroup membership testing on elliptic curves via the
{Tate} pairing",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "1",
pages = "125--128",
month = apr,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00296-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
note = "See correction \cite{Koshelev:2024:CSM}.",
URL = "https://link.springer.com/article/10.1007/s13389-022-00296-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Masure:2023:SCA,
author = "Lo{\"\i}c Masure and R{\'e}mi Strullu",
title = "Side-channel analysis against {ANSSI}'s protected
{AES} implementation on {ARM}: end-to-end attacks with
multi-task learning",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "129--147",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00311-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00311-7",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Werner:2023:EEA,
author = "Vincent Werner and Laurent Maingault and Marie-Laure
Potet",
title = "An end-to-end approach to identify and exploit
multi-fault injection vulnerabilities on
microcontrollers",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "149--165",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00292-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00292-z",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Peng:2023:SNP,
author = "Bo-Yuan Peng and Adrian Marotzke and Ming-Han Tsai and
Bo-Yin Yang and Ho-Lin Chen",
title = "Streamlined {NTRU} Prime on {FPGA}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "167--186",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00303-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00303-z",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Debnath:2023:MIM,
author = "Sumit Kumar Debnath and Sihem Mesnager and Vikas
Srivastava and Saibal Kumar Pal and Nibedita Kundu",
title = "{Mul-IBS}: a multivariate identity-based signature
scheme compatible with {IoT}-based {NDN} architecture",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "187--199",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00308-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00308-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Joshi:2023:SSP,
author = "Priyanka Joshi and Bodhisatwa Mazumdar",
title = "{SPSA}: Semi-Permanent Stuck-At fault analysis of {AES
Rijndael SBox}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "201--222",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00301-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00301-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cui:2023:CEL,
author = "Yaxin Cui and Hong Xu and Lin Tan and Huajin Chen and
Wenfeng Qi",
title = "Construction of equivalent linear trails and multiple
linear attack on reduced-round {GIFT-64}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "223--234",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00298-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00298-7",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Luengo:2023:STS,
author = "Elena Almaraz Luengo and Bittor Ala{\~n}a Olivares and
Luis Javier Garc{\'{\i}}a Villalba and Julio
Hernandez-Castro and Darren Hurley-Smith",
title = "{StringENT} test suite: {ENT} battery revisited for
efficient {$P$} value computation",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "235--249",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00313-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00313-5",
abstract = "Random numbers play a key role in a wide variety of
applications, ranging from mathematical simulation to
cryptography. Generating random or pseudo-random
numbers is not an easy task, especially when hardware,
time and energy constraints are considered. In order to
assess whether generators behave in a random fashion,
there are several statistical test batteries. ENT is
one of the simplest and most popular, at least in part
due to its efficacy and speed. Nonetheless, only one of
the tests of this suite provides a $p$ value, which is
the most useful and standard way to determine whether
the randomness hypothesis holds, for a certain
significance level. As a consequence of this, rather
arbitrary and at times misleading bounds are set in
order to decide which intervals are acceptable for its
results. This paper introduces an extension of the
battery, named StringENT, which, while sticking to the
fast speed that makes ENT popular and useful, still
succeeds in providing $p$ values with which sound
decisions can be made about the randomness of a
sequence. It also highlights a flagrant randomness flaw
that the classical ENT battery is not capable of
detecting but the new StringENT notices, and introduces
two additional tests.",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koseki:2023:HES,
author = "Ryusuke Koseki and Akira Ito and Rei Ueno and Mehdi
Tibouchi and Naofumi Homma",
title = "Homomorphic encryption for stochastic computing",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "2",
pages = "251--263",
month = jun,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00299-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Jun 2 12:32:10 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00299-6",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Salam:2023:DFA,
author = "Iftekhar Salam and Wei-Chuen Yau and Rapha{\"e}l C.-W.
Phan and Josef Pieprzyk",
title = "Differential fault attacks on the lightweight
authenticated encryption algorithm {CLX-128}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "265--281",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00326-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00326-0",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{LeGrow:2023:FMF,
author = "Jason T. LeGrow",
title = "A faster method for fault attack resistance in
static\slash ephemeral {CSIDH}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "283--294",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00318-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00318-0",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Alves:2023:PHT,
author = "Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and
Diego F. Aranha",
title = "Performance of hierarchical transforms in homomorphic
encryption: a case study on logistic regression
inference",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "295--310",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00325-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00325-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kerkhof:2023:NGL,
author = "Maikel Kerkhof and Lichao Wu and Guilherme Perin and
Stjepan Picek",
title = "No (good) loss no gain: systematic evaluation of loss
functions in deep learning-based side-channel
analysis",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "311--324",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00320-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00320-6",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Salomon:2023:MLP,
author = "Dor Salomon and Itamar Levi",
title = "{MaskSIMD-lib}: on the performance gap of a generic
{C} optimized assembly and wide vector extensions for
masked software with an {Ascon}-$p$ test case",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "325--342",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00322-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00322-4",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Arshad:2023:ABE,
author = "Hamed Arshad and Pablo Picazo-Sanchez and Christian
Johansen and Gerardo Schneider",
title = "Attribute-based encryption with enforceable
obligations",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "343--371",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00317-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00317-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bajard:2023:FVP,
author = "Jean-Claude Bajard and Kazuhide Fukushima and Thomas
Plantard and Arnaud Sipasseuth",
title = "Fast verification and public key storage optimization
for unstructured lattice-based signatures",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "3",
pages = "373--388",
month = sep,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00309-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 10 16:09:48 MDT 2023",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00309-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chang:2023:ASI,
author = "Chip-Hong Chang and Stefan Katzenbeisser and Debdeep
Mukhopadhyay and Ulrich R{\"u}hrmair",
title = "The {ASHES 2021} special issue at {JCEN}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "389--390",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00338-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00338-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Deutschbein:2023:IAI,
author = "Calvin Deutschbein and Andres Meza and Francesco
Restuccia and Ryan Kastner and Cynthia Sturton",
title = "{Isadora}: automated information-flow property
generation for hardware security verification",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "391--407",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00306-w",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00306-w",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Vasselle:2023:SDA,
author = "Aur{\'e}lien Vasselle and Hugues Thiebeauld and
Philippe Maurine",
title = "Spatial dependency analysis to extract information
from side-channel mixtures: extended version",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "409--425",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00307-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00307-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kuroda:2023:PAN,
author = "Kunihiro Kuroda and Yuta Fukuda and Kota Yoshida and
Takeshi Fujino",
title = "Practical aspects on non-profiled deep-learning
side-channel attacks against {AES} software
implementation with two types of masking
countermeasures including {RSM}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "427--442",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00312-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00312-6",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ngo:2023:SCA,
author = "Kalle Ngo and Elena Dubrova and Thomas Johansson",
title = "A side-channel attack on a masked and shuffled
software implementation of {Saber}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "443--460",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00315-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00315-3",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Imran:2023:HSS,
author = "Malik Imran and Felipe Almeida and Andrea Basso and
Sujoy Sinha Roy and Samuel Pagliarini",
title = "High-speed {SABER} key encapsulation mechanism in 65nm
{CMOS}",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "461--471",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00316-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00316-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Komissarov:2023:SAA,
author = "Rony Komissarov and Sharon Vaisman and Avishai Wool",
title = "Spoofing attacks against vehicular {FMCW} radar",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "473--484",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00321-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00321-5",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Krachenfels:2023:TAD,
author = "Thilo Krachenfels and Jean-Pierre Seifert and Shahin
Tajik",
title = "{Trojan} awakener: detecting dormant malicious
hardware using laser logic state imaging (extended
version)",
journal = j-J-CRYPTO-ENG,
volume = "13",
number = "4",
pages = "485--499",
month = nov,
year = "2023",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00323-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Fri Apr 19 08:14:26 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00323-3",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Oberhansl:2024:UIS,
author = "Felix Oberhansl and Tim Fritzmann and Thomas
P{\"o}ppelmann and Debapriya Basu Roy and Georg Sigl",
title = "Uniform instruction set extensions for multiplications
in contemporary and post-quantum cryptography",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "1--18",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00332-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00332-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kumar:2024:RNC,
author = "Satyam Kumar and Sandip Kumar Mondal and Santanu
Sarkar and Takanori Isobe and Anubhab Baksi and Avishek
Adhikari",
title = "Restricted near collision attack on {Plantlet}",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "19--34",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00336-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00336-y",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ribeiro:2024:SPQ,
author = "Leonardo A. D. S. Ribeiro and Jos{\'e} Paulo da Silva
Lima and Ruy J. G. B. de Queiroz and Amirton B. Chagas
and Jos{\'e} R. R. Junior and Jonysberg P. Quintino and
Fabio Q. B. da Silva and Andr{\'e} L. M. Santos",
title = "{SABER} post-quantum key encapsulation mechanism
{(KEM)}: evaluating performance in {ARM} and x64
architectures",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "35--41",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00337-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00337-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cai:2024:ENA,
author = "Shiping Cai and Zhi Hu and Zheng-An Yao and Chang-An
Zhao",
title = "The elliptic net algorithm revisited",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "43--55",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00304-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00304-y",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Shao:2024:DSV,
author = "Cuiping Shao and Dongyan Zhao and Huiyun Li and Song
Cheng and Shunxian Gao and Liuqing Yang",
title = "Detection of security vulnerabilities in cryptographic
{ICs} against fault injection attacks based on
compressed sensing and basis pursuit",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "57--70",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00324-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00324-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Marchiori:2024:PRF,
author = "D{\'u}nia Marchiori and Ricardo Cust{\'o}dio and
Daniel Panario and Lucia Moura",
title = "Probabilistic root finding in code-based
cryptography",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "71--85",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00329-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00329-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gurler:2024:CGL,
author = "Elif Ozbay Gurler and Huseyin Hisil",
title = "Complete group law for genus 2 {Jacobians} on
{Jacobian} coordinates",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "87--101",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00351-7",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00351-7",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Joshi:2024:DRK,
author = "Priyanka Joshi and Bodhisatwa Mazumdar",
title = "Deep round key recovery attacks and countermeasure in
persistent fault model: a case study on {GIFT} and
{KLEIN}",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "103--125",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00349-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00349-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koshelev:2024:CSM,
author = "Dmitrii Koshelev",
title = "Correction to: {Subgroup} membership testing on
elliptic curves via the {Tate} pairing",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "127--128",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00331-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
note = "See \cite{Koshelev:2023:SMT}.",
URL = "https://link.springer.com/article/10.1007/s13389-023-00331-3",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Zhang:2024:EAP,
author = "Fan Zhang",
title = "Editorial about {PROOFS 2021}",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "129--129",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00345-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00345-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cheng:2024:TFB,
author = "Wei Cheng and Yi Liu and Sylvain Guilley and Olivier
Rioul",
title = "Toward finding best linear codes for side-channel
protections (extended version)",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "131--145",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-022-00305-x",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-022-00305-x",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lacombe:2024:CSA,
author = "Guilhem Lacombe and David Feliot and Etienne Boespflug
and Marie-Laure Potet",
title = "Combining static analysis and dynamic symbolic
execution in a toolchain to detect fault injection
vulnerabilities",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "147--164",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00310-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00310-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Asano:2024:SBE,
author = "Tamon Asano and Takeshi Sugawara",
title = "Simulation-based evaluation of bit-interaction
side-channel leakage on {RISC-V}: extended version",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "1",
pages = "165--180",
month = apr,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00319-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Tue Jun 25 13:48:06 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/risc-v.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00319-z",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
remark = "The information leakage attack described here is
successful against both ARM and the Western Digital
SweRV EH1 RISC-V processor.",
}
@Article{Guillen:2024:AFC,
author = "Luis Guillen",
title = "The Asymmetric five-card trick: working with variable
encoding in card-based protocols",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "181--192",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00333-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00333-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sideris:2024:HAD,
author = "Argyrios Sideris and Theodora Sanida and Minas
Dasygenis",
title = "Hardware acceleration design of the {SHA-3} for high
throughput and low area on {FPGA}",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "193--205",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00334-0",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00334-0",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Viera:2024:TFM,
author = "Raphael Viera and Jean-Max Dutertre and Rodrigo Silva
Lima and Matthieu Pommies and Anthony Bertrand",
title = "Tampering with the flash memory of microcontrollers:
permanent fault injection via laser illumination during
read operations",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "207--221",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00335-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00335-z",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2024:MMB,
author = "Claude Carlet and Abderrahman Daif and Sylvain Guilley
and C{\'e}dric Tavernier",
title = "A masking method based on orthonormal spaces,
protecting several bytes against both {SCA} and {FIA}
with a reduced cost",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "223--240",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00339-9",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00339-9",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aydin:2024:LSH,
author = "Furkan Aydin and Aydin Aysu",
title = "Leaking secrets in homomorphic encryption with
side-channel attacks",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "241--251",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00340-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00340-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{kumar:2024:QRN,
author = "Vaishnavi kumar and Padmapriya Pravinkumar",
title = "Quantum random number generator on {IBM QX}",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "253--259",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00341-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
https://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00341-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Al-Muhammed:2024:BSC,
author = "Muhammed Jassem Al-Muhammed",
title = "Bit-sensitive chaos-based encryption technique with
nonparametric memory loss-based key hiding code
generation",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "261--279",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00343-z",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00343-z",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Seddigh:2024:BKM,
author = "Milad Seddigh and Mahdi Esfahani and Sarani
Bhattacharya and Mohammad Reza Aref and Hadi
Soleimany",
title = "Breaking {KASLR} on mobile devices without any use of
cache memory (extended version)",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "281--294",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-023-00344-y",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-023-00344-y",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Vollala:2024:EET,
author = "Satyanarayana Vollala",
title = "Energy efficient triple-modular exponential techniques
for batch verification schemes",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "295--309",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00348-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00348-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aljafar:2024:ULE,
author = "Muayad J. Aljafar and Florence Azais and Marie-Lise
Flottes and Samuel Pagliarini",
title = "Utilizing layout effects for analog logic locking",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "311--324",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00350-8",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00350-8",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Alshaer:2024:CLA,
author = "Ihab Alshaer and Gijs Burghoorn and Brice Colombier
and Christophe Deleuze and Vincent Beroulle and Paolo
Maistri",
title = "Cross-layer analysis of clock glitch fault injection
while fetching variable-length instructions",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "325--342",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00352-6",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00352-6",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kim:2024:MCA,
author = "Kwang Ho Kim and Sihem Mesnager and Kyong Il Pak",
title = "{Montgomery} curve arithmetic revisited",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "343--362",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00353-5",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00353-5",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jana:2024:DFA,
author = "Amit Jana and Goutam Paul",
title = "Differential fault attack on {SPN}-based sponge and
{SIV}-like {AE} schemes",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "363--381",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00354-4",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00354-4",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hu:2024:UGE,
author = "Jingwei Hu and Wen Wang and Kris Gaj and Donglong Chen
and Huaxiong Wang",
title = "Universal {Gaussian} elimination hardware for
cryptographic purposes",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "383--397",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00355-3",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00355-3",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lashermes:2024:GSR,
author = "Ronan Lashermes and H{\'e}l{\`e}ne {Le Bouder}",
title = "Generic {SCARE}: reverse engineering without knowing
the algorithm nor the machine",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "399--414",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00356-2",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00356-2",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Salarifard:2024:EHA,
author = "Raziyeh Salarifard and Hadi Soleimany",
title = "An efficient hardware accelerator for {NTT}-based
polynomial multiplication using {FPGA}",
journal = j-J-CRYPTO-ENG,
volume = "14",
number = "2",
pages = "415--426",
month = jun,
year = "2024",
CODEN = "????",
DOI = "https://doi.org/10.1007/s13389-024-00357-1",
ISSN = "2190-8508 (print), 2190-8516 (electronic)",
ISSN-L = "2190-8508",
bibdate = "Thu Aug 8 07:34:12 MDT 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
URL = "https://link.springer.com/article/10.1007/s13389-024-00357-1",
acknowledgement = ack-nhfb,
ajournal = "J. Crypto. Eng.",
fjournal = "Journal of Cryptographic Engineering",
journal-URL = "http://link.springer.com/journal/13389",
}