Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Fast verification and public key storage optimization for unstructured lattice-based signatures 针对非结构化格签名的快速验证和公钥存储优化
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-01-19 DOI: 10.1007/s13389-023-00309-1
J. Bajard, Kazuhide Fukushima, T. Plantard, Arnaud Sipasseuth
{"title":"Fast verification and public key storage optimization for unstructured lattice-based signatures","authors":"J. Bajard, Kazuhide Fukushima, T. Plantard, Arnaud Sipasseuth","doi":"10.1007/s13389-023-00309-1","DOIUrl":"https://doi.org/10.1007/s13389-023-00309-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-16"},"PeriodicalIF":1.9,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44646784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities 在工具链中结合静态分析和动态符号执行来检测故障注入漏洞
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-01-18 DOI: 10.1007/s13389-023-00310-8
Guilhem Lacombe, D. Féliot, Etienne Boespflug, Marie-Laure Potet
{"title":"Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities","authors":"Guilhem Lacombe, D. Féliot, Etienne Boespflug, Marie-Laure Potet","doi":"10.1007/s13389-023-00310-8","DOIUrl":"https://doi.org/10.1007/s13389-023-00310-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-18"},"PeriodicalIF":1.9,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44473387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture Mul-IBS:一种与基于物联网的NDN架构兼容的基于身份的多变量签名方案
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-01-06 DOI: 10.1007/s13389-022-00308-8
Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, S. Pal, Nibedita Kundu
{"title":"Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture","authors":"Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, S. Pal, Nibedita Kundu","doi":"10.1007/s13389-022-00308-8","DOIUrl":"https://doi.org/10.1007/s13389-022-00308-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":"1-13"},"PeriodicalIF":1.9,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46749479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial dependency analysis to extract information from side-channel mixtures: extended version 从侧通道混合物中提取信息的空间依赖分析:扩展版
4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2023-01-03 DOI: 10.1007/s13389-022-00307-9
Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine
{"title":"Spatial dependency analysis to extract information from side-channel mixtures: extended version","authors":"Aurélien Vasselle, Hugues Thiebeauld, Philippe Maurine","doi":"10.1007/s13389-022-00307-9","DOIUrl":"https://doi.org/10.1007/s13389-022-00307-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135604587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Streamlined NTRU Prime on FPGA FPGA上的流线型NTRU Prime
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-11-17 DOI: 10.1007/s13389-022-00303-z
Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen
{"title":"Streamlined NTRU Prime on FPGA","authors":"Bo-Yuan Peng, Adrian Marotzke, Ming-Han Tsai, Bo-Yin Yang, Ho-Lin Chen","doi":"10.1007/s13389-022-00303-z","DOIUrl":"https://doi.org/10.1007/s13389-022-00303-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"167 - 186"},"PeriodicalIF":1.9,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42026881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Toward finding best linear codes for side-channel protections (extended version) 寻找最佳的边信道保护线性码(扩展版)
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-11-15 DOI: 10.1007/s13389-022-00305-x
Wei Cheng, Yi Liu, S. Guilley, O. Rioul
{"title":"Toward finding best linear codes for side-channel protections (extended version)","authors":"Wei Cheng, Yi Liu, S. Guilley, O. Rioul","doi":"10.1007/s13389-022-00305-x","DOIUrl":"https://doi.org/10.1007/s13389-022-00305-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46685234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isadora: automated information-flow property generation for hardware security verification Isadora:用于硬件安全验证的自动化信息流属性生成
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-11-11 DOI: 10.1007/s13389-022-00306-w
Calvin Deutschbein, Andres Meza, Francesco Restuccia, R. Kastner, C. Sturton
{"title":"Isadora: automated information-flow property generation for hardware security verification","authors":"Calvin Deutschbein, Andres Meza, Francesco Restuccia, R. Kastner, C. Sturton","doi":"10.1007/s13389-022-00306-w","DOIUrl":"https://doi.org/10.1007/s13389-022-00306-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47429077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers 一种识别和利用微控制器上多故障注入漏洞的端到端方法
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-10-31 DOI: 10.1007/s13389-022-00292-z
Vincent Werner, Laurent Maingault, Marie-Laure Potet
{"title":"An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers","authors":"Vincent Werner, Laurent Maingault, Marie-Laure Potet","doi":"10.1007/s13389-022-00292-z","DOIUrl":"https://doi.org/10.1007/s13389-022-00292-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"149 - 165"},"PeriodicalIF":1.9,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43650946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox SPSA:AES Rijndael SBox的半永久性Stuck-At故障分析
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-10-26 DOI: 10.1007/s13389-022-00301-1
Priyanka Joshi, Bodhisatwa Mazumdar
{"title":"SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox","authors":"Priyanka Joshi, Bodhisatwa Mazumdar","doi":"10.1007/s13389-022-00301-1","DOIUrl":"https://doi.org/10.1007/s13389-022-00301-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"201 - 222"},"PeriodicalIF":1.9,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48539986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low area-time complexity point multiplication architecture for ECC over GF( $$2^{textrm{m}}$$ 2 m ) using polynomial basis 基于多项式基的GF($$2^{textrm{m}}$$ 2 m)上ECC的低面积时间复杂度点乘法架构
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-10-21 DOI: 10.1007/s13389-022-00302-0
Pradeep Kumar Goud Nadikuda, Lakshmi Boppana
{"title":"Low area-time complexity point multiplication architecture for ECC over GF(\u0000 \u0000 \u0000 \u0000 $$2^{textrm{m}}$$\u0000 \u0000 \u0000 2\u0000 m\u0000 \u0000 \u0000 ) using polynomial basis","authors":"Pradeep Kumar Goud Nadikuda, Lakshmi Boppana","doi":"10.1007/s13389-022-00302-0","DOIUrl":"https://doi.org/10.1007/s13389-022-00302-0","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"107-123"},"PeriodicalIF":1.9,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43749400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信