Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Leaking secrets in homomorphic encryption with side-channel attacks 利用侧信道攻击泄露同态加密中的秘密
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2024-01-12 DOI: 10.1007/s13389-023-00340-2
Furkan Aydin, Aydin Aysu
{"title":"Leaking secrets in homomorphic encryption with side-channel attacks","authors":"Furkan Aydin, Aydin Aysu","doi":"10.1007/s13389-023-00340-2","DOIUrl":"https://doi.org/10.1007/s13389-023-00340-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"4 1","pages":"1-11"},"PeriodicalIF":1.9,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139437786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Breaking KASLR on mobile devices without any use of cache memory (extended version) 在移动设备上破解 KASLR,无需使用缓存(扩展版)
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2024-01-05 DOI: 10.1007/s13389-023-00344-y
Milad Seddigh, M. Esfahani, Sarani Bhattacharya, Mohammadreza Aref, H. Soleimany
{"title":"Breaking KASLR on mobile devices without any use of cache memory (extended version)","authors":"Milad Seddigh, M. Esfahani, Sarani Bhattacharya, Mohammadreza Aref, H. Soleimany","doi":"10.1007/s13389-023-00344-y","DOIUrl":"https://doi.org/10.1007/s13389-023-00344-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"84 14","pages":"1-14"},"PeriodicalIF":1.9,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139381430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation 基于非参数内存损失的混沌加密技术与密钥隐藏代码生成
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-12-13 DOI: 10.1007/s13389-023-00343-z
M. Al-Muhammed
{"title":"Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation","authors":"M. Al-Muhammed","doi":"10.1007/s13389-023-00343-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00343-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"20 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139003402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum random number generator on IBM QX IBM QX 上的量子随机数发生器
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-12-07 DOI: 10.1007/s13389-023-00341-1
Vaishnavi Kumar, Padmapriya Pravinkumar
{"title":"Quantum random number generator on IBM QX","authors":"Vaishnavi Kumar, Padmapriya Pravinkumar","doi":"10.1007/s13389-023-00341-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00341-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"33 20","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost 一种基于标准正交空间的屏蔽方法,以较低的成本保护几个字节免受SCA和FIA的攻击
4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-11-04 DOI: 10.1007/s13389-023-00339-9
Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier
{"title":"A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost","authors":"Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier","doi":"10.1007/s13389-023-00339-9","DOIUrl":"https://doi.org/10.1007/s13389-023-00339-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"107 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135773392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ASHES 2021 special issue at JCEN JCEN 的 ASHES 2021 特刊
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-11-01 DOI: 10.1007/s13389-023-00338-w
Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, U. Rührmair
{"title":"The ASHES 2021 special issue at JCEN","authors":"Chip-Hong Chang, Stefan Katzenbeisser, Debdeep Mukhopadhyay, U. Rührmair","doi":"10.1007/s13389-023-00338-w","DOIUrl":"https://doi.org/10.1007/s13389-023-00338-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"35 1","pages":"389 - 390"},"PeriodicalIF":1.9,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures SABER后量子密钥封装机制(KEM):评估ARM和x64架构的性能
4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-10-16 DOI: 10.1007/s13389-023-00337-x
Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton B. Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos
{"title":"SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures","authors":"Leonardo A. D. S. Ribeiro, José Paulo da Silva Lima, Ruy J. G. B. de Queiroz, Amirton B. Chagas, José R. R. Junior, Jonysberg P. Quintino, Fabio Q. B. da Silva, André L. M. Santos","doi":"10.1007/s13389-023-00337-x","DOIUrl":"https://doi.org/10.1007/s13389-023-00337-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136078865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restricted near collision attack on Plantlet 限制对Plantlet的近碰撞攻击
4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-10-09 DOI: 10.1007/s13389-023-00336-y
Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari
{"title":"Restricted near collision attack on Plantlet","authors":"Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari","doi":"10.1007/s13389-023-00336-y","DOIUrl":"https://doi.org/10.1007/s13389-023-00336-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135095793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations 篡改微控制器的闪存:在读取操作期间通过激光照射注入永久故障
4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-10-03 DOI: 10.1007/s13389-023-00335-z
Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand
{"title":"Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations","authors":"Raphael Viera, Jean-Max Dutertre, Rodrigo Silva Lima, Matthieu Pommies, Anthony Bertrand","doi":"10.1007/s13389-023-00335-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00335-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135689187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Asymmetric five-card trick: working with variable encoding in card-based protocols 非对称五张牌技巧:在基于牌的协议中使用可变编码
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-08-31 DOI: 10.1007/s13389-023-00333-1
Luis Guillen
{"title":"The Asymmetric five-card trick: working with variable encoding in card-based protocols","authors":"Luis Guillen","doi":"10.1007/s13389-023-00333-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00333-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52846562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信