Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Improved fault analysis on SIMECK ciphers 改进了SIMECK密码的故障分析
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-10-11 DOI: 10.1007/s13389-021-00263-w
Duc-Phong Le, Rongxing Lu, A. Ghorbani
{"title":"Improved fault analysis on SIMECK ciphers","authors":"Duc-Phong Le, Rongxing Lu, A. Ghorbani","doi":"10.1007/s13389-021-00263-w","DOIUrl":"https://doi.org/10.1007/s13389-021-00263-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"169 - 180"},"PeriodicalIF":1.9,"publicationDate":"2020-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00263-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42677240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reducing risks through simplicity: high side-channel security for lazy engineers 通过简单性降低风险:为懒惰的工程师提供高侧通道安全性
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-09-12 DOI: 10.1007/s13389-020-00241-8
Olivier Bronchain, Tobias Schneider, François-Xavier Standaert
{"title":"Reducing risks through simplicity: high side-channel security for lazy engineers","authors":"Olivier Bronchain, Tobias Schneider, François-Xavier Standaert","doi":"10.1007/s13389-020-00241-8","DOIUrl":"https://doi.org/10.1007/s13389-020-00241-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"39 - 55"},"PeriodicalIF":1.9,"publicationDate":"2020-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00241-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45749758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Faster unbalanced Private Set Intersection in the semi-honest setting 在半诚实设置中,更快的不平衡私有集交叉点
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-09-09 DOI: 10.1007/s13389-020-00242-7
Amanda Cristina Davi Resende, Diego de Freitas Aranha
{"title":"Faster unbalanced Private Set Intersection in the semi-honest setting","authors":"Amanda Cristina Davi Resende, Diego de Freitas Aranha","doi":"10.1007/s13389-020-00242-7","DOIUrl":"https://doi.org/10.1007/s13389-020-00242-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"17 1","pages":"21 - 38"},"PeriodicalIF":1.9,"publicationDate":"2020-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79465478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Side-channel analysis of a learning parity with physical noise processor 物理噪声处理器学习奇偶校验的边信道分析
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-09-03 DOI: 10.1007/s13389-020-00238-3
D. Kamel, Davide Bellizia, Olivier Bronchain, François-Xavier Standaert
{"title":"Side-channel analysis of a learning parity with physical noise processor","authors":"D. Kamel, Davide Bellizia, Olivier Bronchain, François-Xavier Standaert","doi":"10.1007/s13389-020-00238-3","DOIUrl":"https://doi.org/10.1007/s13389-020-00238-3","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"171 - 179"},"PeriodicalIF":1.9,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00238-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42847222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF 基于几何泄漏的简单电磁分析攻击在环形振荡器PUF ASIC实现中的应用
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-09-03 DOI: 10.1007/s13389-020-00240-9
M. Shiozaki, T. Fujino
{"title":"Simple electromagnetic analysis attack based on geometric leak on ASIC implementation of ring-oscillator PUF","authors":"M. Shiozaki, T. Fujino","doi":"10.1007/s13389-020-00240-9","DOIUrl":"https://doi.org/10.1007/s13389-020-00240-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"201 - 212"},"PeriodicalIF":1.9,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00240-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45898894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the power of template attacks in highly multivariate context 高度多元环境下模板攻击的威力
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-08-30 DOI: 10.1007/s13389-020-00239-2
Maamar Ouladj, N. El Mrabet, S. Guilley, P. Guillot, G. Millérioux
{"title":"On the power of template attacks in highly multivariate context","authors":"Maamar Ouladj, N. El Mrabet, S. Guilley, P. Guillot, G. Millérioux","doi":"10.1007/s13389-020-00239-2","DOIUrl":"https://doi.org/10.1007/s13389-020-00239-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"337 - 354"},"PeriodicalIF":1.9,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00239-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44936351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Editorial about PROOFS 2019 关于proof 2019的社论
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-08-05 DOI: 10.1007/s13389-020-00236-5
K. Heydemann, Letitia Li
{"title":"Editorial about PROOFS 2019","authors":"K. Heydemann, Letitia Li","doi":"10.1007/s13389-020-00236-5","DOIUrl":"https://doi.org/10.1007/s13389-020-00236-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"103 - 104"},"PeriodicalIF":1.9,"publicationDate":"2020-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00236-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46610286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A remark on a success rate model for side-channel attack analysis 关于边信道攻击分析成功率模型的评述
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-07-18 DOI: 10.1007/s13389-020-00235-6
A. Wiemers
{"title":"A remark on a success rate model for side-channel attack analysis","authors":"A. Wiemers","doi":"10.1007/s13389-020-00235-6","DOIUrl":"https://doi.org/10.1007/s13389-020-00235-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"269 - 274"},"PeriodicalIF":1.9,"publicationDate":"2020-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00235-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44472448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Error control scheme for malicious and natural faults in cryptographic modules 加密模块中恶意和自然故障的错误控制方案
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-07-01 DOI: 10.1007/s13389-020-00234-7
Mael Gay, Batya Karp, O. Keren, I. Polian
{"title":"Error control scheme for malicious and natural faults in cryptographic modules","authors":"Mael Gay, Batya Karp, O. Keren, I. Polian","doi":"10.1007/s13389-020-00234-7","DOIUrl":"https://doi.org/10.1007/s13389-020-00234-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"321 - 336"},"PeriodicalIF":1.9,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00234-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46486099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Residue arithmetic systems in cryptography: a survey on modern security applications 密码学中的剩余运算系统:现代安全应用综述
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-06-25 DOI: 10.1007/s13389-020-00231-w
Dimitrios Schoinianakis
{"title":"Residue arithmetic systems in cryptography: a survey on modern security applications","authors":"Dimitrios Schoinianakis","doi":"10.1007/s13389-020-00231-w","DOIUrl":"https://doi.org/10.1007/s13389-020-00231-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"249 - 267"},"PeriodicalIF":1.9,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00231-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47395551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信