Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Homomorphic encryption for stochastic computing 随机计算中的同态加密
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-09-17 DOI: 10.1007/s13389-022-00299-6
Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, N. Homma
{"title":"Homomorphic encryption for stochastic computing","authors":"Ryusuke Koseki, Akira Ito, Rei Ueno, Mehdi Tibouchi, N. Homma","doi":"10.1007/s13389-022-00299-6","DOIUrl":"https://doi.org/10.1007/s13389-022-00299-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"251-263"},"PeriodicalIF":1.9,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42449306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ASHES 2020 special issue at JCEN 《灰烬2020》特刊
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-09-12 DOI: 10.1007/s13389-022-00300-2
Chip-Hong Chang, S. Katzenbeisser, U. Rührmair, P. Schaumont
{"title":"The ASHES 2020 special issue at JCEN","authors":"Chip-Hong Chang, S. Katzenbeisser, U. Rührmair, P. Schaumont","doi":"10.1007/s13389-022-00300-2","DOIUrl":"https://doi.org/10.1007/s13389-022-00300-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"369 - 370"},"PeriodicalIF":1.9,"publicationDate":"2022-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44407950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64 简化圆GIFT-64的等效线性轨迹构造和多重线性攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-09-06 DOI: 10.1007/s13389-022-00298-7
Yaxin Cui, Hong Xu, Lin Tan, Huajin Chen, Wenfeng Qi
{"title":"Construction of equivalent linear trails and multiple linear attack on reduced-round GIFT-64","authors":"Yaxin Cui, Hong Xu, Lin Tan, Huajin Chen, Wenfeng Qi","doi":"10.1007/s13389-022-00298-7","DOIUrl":"https://doi.org/10.1007/s13389-022-00298-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"223-234"},"PeriodicalIF":1.9,"publicationDate":"2022-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46874772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subgroup membership testing on elliptic curves via the Tate pairing 利用Tate对检验椭圆曲线上的子群隶属性
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-09-02 DOI: 10.1007/s13389-022-00296-9
D. Koshelev
{"title":"Subgroup membership testing on elliptic curves via the Tate pairing","authors":"D. Koshelev","doi":"10.1007/s13389-022-00296-9","DOIUrl":"https://doi.org/10.1007/s13389-022-00296-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"125-128"},"PeriodicalIF":1.9,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42031974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of a novel cryptographically secure pseudorandom number generator 一种新的密码安全伪随机数生成器的设计与实现
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-08-24 DOI: 10.1007/s13389-022-00297-8
Juan Di Mauro, Eduardo Salazar, H. Scolnik
{"title":"Design and implementation of a novel cryptographically secure pseudorandom number generator","authors":"Juan Di Mauro, Eduardo Salazar, H. Scolnik","doi":"10.1007/s13389-022-00297-8","DOIUrl":"https://doi.org/10.1007/s13389-022-00297-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"255 - 265"},"PeriodicalIF":1.9,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46826484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault analysis of the PRINCE family of lightweight ciphers PRINCE族轻量级密码的故障分析
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-08-16 DOI: 10.1007/s13389-022-00290-1
A. Kundu, Aikata, Banashri Karmakar, Dhiman Saha
{"title":"Fault analysis of the PRINCE family of lightweight ciphers","authors":"A. Kundu, Aikata, Banashri Karmakar, Dhiman Saha","doi":"10.1007/s13389-022-00290-1","DOIUrl":"https://doi.org/10.1007/s13389-022-00290-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"475 - 494"},"PeriodicalIF":1.9,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47392490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols 基于Karatsuba的平方根Vélu公式应用于两个基于同源性的协议
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-07-20 DOI: 10.1007/s13389-022-00293-y
Gora Adj, Jesús-Javier Chi-Domínguez, F. Rodríguez-Henríquez
{"title":"Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols","authors":"Gora Adj, Jesús-Javier Chi-Domínguez, F. Rodríguez-Henríquez","doi":"10.1007/s13389-022-00293-y","DOIUrl":"https://doi.org/10.1007/s13389-022-00293-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"89-106"},"PeriodicalIF":1.9,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47376470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention 硬件木马检测和预防的物理和逻辑测试技术的综合调查
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-07-16 DOI: 10.1007/s13389-022-00295-w
R. Mukherjee, S. Rajendran, R. Chakraborty
{"title":"A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention","authors":"R. Mukherjee, S. Rajendran, R. Chakraborty","doi":"10.1007/s13389-022-00295-w","DOIUrl":"https://doi.org/10.1007/s13389-022-00295-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"495-522"},"PeriodicalIF":1.9,"publicationDate":"2022-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43031350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for leaking secrets to past instructions 向过去的指令泄露机密的框架
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-05-23 DOI: 10.1007/s13389-022-00289-8
Jacob Fustos, M. Bechtel, H. Yun
{"title":"A framework for leaking secrets to past instructions","authors":"Jacob Fustos, M. Bechtel, H. Yun","doi":"10.1007/s13389-022-00289-8","DOIUrl":"https://doi.org/10.1007/s13389-022-00289-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"461 - 473"},"PeriodicalIF":1.9,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47870282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-quantum hybrid key exchange: a systematic mapping study 后量子混合密钥交换:系统映射研究
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-04-11 DOI: 10.1007/s13389-022-00288-9
A. Giron, Ricardo Felipe Custódio, F. Rodríguez-Henríquez
{"title":"Post-quantum hybrid key exchange: a systematic mapping study","authors":"A. Giron, Ricardo Felipe Custódio, F. Rodríguez-Henríquez","doi":"10.1007/s13389-022-00288-9","DOIUrl":"https://doi.org/10.1007/s13389-022-00288-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"71-88"},"PeriodicalIF":1.9,"publicationDate":"2022-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47164909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信