Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA 基于FPGA的高吞吐量低面积SHA-3硬件加速设计
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-08-30 DOI: 10.1007/s13389-023-00334-0
Argyrios Sideris, Theodora Sanida, M. Dasygenis
{"title":"Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA","authors":"Argyrios Sideris, Theodora Sanida, M. Dasygenis","doi":"10.1007/s13389-023-00334-0","DOIUrl":"https://doi.org/10.1007/s13389-023-00334-0","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48814227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography 当代和后量子密码学中乘法的统一指令集扩展
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-08-24 DOI: 10.1007/s13389-023-00332-2
Felix Oberhansl, Tim Fritzmann, T. Pöppelmann, Debapriya Basu Roy, G. Sigl
{"title":"Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography","authors":"Felix Oberhansl, Tim Fritzmann, T. Pöppelmann, Debapriya Basu Roy, G. Sigl","doi":"10.1007/s13389-023-00332-2","DOIUrl":"https://doi.org/10.1007/s13389-023-00332-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44250615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing 修正:通过Tate对椭圆曲线的子群隶属检验
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-08-17 DOI: 10.1007/s13389-023-00331-3
D. Koshelev
{"title":"Correction to: Subgroup membership testing on elliptic curves via the Tate pairing","authors":"D. Koshelev","doi":"10.1007/s13389-023-00331-3","DOIUrl":"https://doi.org/10.1007/s13389-023-00331-3","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44371116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic root finding in code-based cryptography 基于代码的密码学中的概率寻根
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-07-31 DOI: 10.1007/s13389-023-00329-x
Dúnia Marchiori, Ricardo Felipe Custódio, D. Panario, Lucia Moura
{"title":"Probabilistic root finding in code-based cryptography","authors":"Dúnia Marchiori, Ricardo Felipe Custódio, D. Panario, Lucia Moura","doi":"10.1007/s13389-023-00329-x","DOIUrl":"https://doi.org/10.1007/s13389-023-00329-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49646399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler CPU医生:当设备的心跳可以是声学侧通道分解器时
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-07-06 DOI: 10.1007/s13389-023-00327-z
Oswa M. Amro, V. Mishra, R. Negi, Urbi Chatterjee
{"title":"CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler","authors":"Oswa M. Amro, V. Mishra, R. Negi, Urbi Chatterjee","doi":"10.1007/s13389-023-00327-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00327-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48532276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128 轻量级认证加密算法CLX-128的差分故障攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-06-26 DOI: 10.1007/s13389-023-00326-0
Iftekhar Salam, Wei-Chuen Yau, R. Phan, J. Pieprzyk
{"title":"Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128","authors":"Iftekhar Salam, Wei-Chuen Yau, R. Phan, J. Pieprzyk","doi":"10.1007/s13389-023-00326-0","DOIUrl":"https://doi.org/10.1007/s13389-023-00326-0","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"265 - 281"},"PeriodicalIF":1.9,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41928796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version 基于RISC-V的位交互侧信道泄漏仿真评估:扩展版
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-06-20 DOI: 10.1007/s13389-023-00319-z
Tamon Asano, T. Sugawara
{"title":"Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version","authors":"Tamon Asano, T. Sugawara","doi":"10.1007/s13389-023-00319-z","DOIUrl":"https://doi.org/10.1007/s13389-023-00319-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46037119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A faster method for fault attack resistance in static/ephemeral CSIDH 一种快速的静态/短暂CSIDH抗故障攻击方法
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-06-16 DOI: 10.1007/s13389-023-00318-0
Jason Legrow
{"title":"A faster method for fault attack resistance in static/ephemeral CSIDH","authors":"Jason Legrow","doi":"10.1007/s13389-023-00318-0","DOIUrl":"https://doi.org/10.1007/s13389-023-00318-0","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"283 - 294"},"PeriodicalIF":1.9,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46979214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference 同态加密中层次变换的性能:一个逻辑回归推理的案例研究
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-06-13 DOI: 10.1007/s13389-023-00325-1
P. G. M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha
{"title":"Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference","authors":"P. G. M. R. Alves, Jheyne N. Ortiz, Diego F. Aranha","doi":"10.1007/s13389-023-00325-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00325-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"295 - 310"},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46092711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit 基于压缩感知和基追寻的加密集成电路安全漏洞检测与故障注入攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-06-02 DOI: 10.1007/s13389-023-00324-2
C. Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang
{"title":"Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit","authors":"C. Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang","doi":"10.1007/s13389-023-00324-2","DOIUrl":"https://doi.org/10.1007/s13389-023-00324-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41632710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信