Milad Seddigh, M. Esfahani, Sarani Bhattacharya, Mohammadreza Aref, H. Soleimany
{"title":"Breaking KASLR on mobile devices without any use of cache memory (extended version)","authors":"Milad Seddigh, M. Esfahani, Sarani Bhattacharya, Mohammadreza Aref, H. Soleimany","doi":"10.1007/s13389-023-00344-y","DOIUrl":"https://doi.org/10.1007/s13389-023-00344-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"84 14","pages":"1-14"},"PeriodicalIF":1.9,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum random number generator on IBM QX","authors":"Vaishnavi Kumar, Padmapriya Pravinkumar","doi":"10.1007/s13389-023-00341-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00341-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"33 20","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
{"title":"A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost","authors":"Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier","doi":"10.1007/s13389-023-00339-9","DOIUrl":"https://doi.org/10.1007/s13389-023-00339-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"107 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135773392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, U. Rührmair
{"title":"The ASHES 2021 special issue at JCEN","authors":"Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, U. Rührmair","doi":"10.1007/s13389-023-00338-w","DOIUrl":"https://doi.org/10.1007/s13389-023-00338-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"35 1","pages":"389 - 390"},"PeriodicalIF":1.9,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton B. Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos
{"title":"SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures","authors":"Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton B. Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos","doi":"10.1007/s13389-023-00337-x","DOIUrl":"https://doi.org/10.1007/s13389-023-00337-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136078865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand
{"title":"Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations","authors":"Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand","doi":"10.1007/s13389-023-00335-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00335-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135689187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Asymmetric five-card trick: working with variable encoding in card-based protocols","authors":"Luis Guillen","doi":"10.1007/s13389-023-00333-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00333-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52846562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}