Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Programmable access-controlled and generic erasable PUF design and its applications 可编程访问控制和通用可擦除PUF设计及其应用
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-03-21 DOI: 10.1007/s13389-022-00284-z
Chenglu Jin, W. Burleson, M. Van Dijk, U. Rührmair
{"title":"Programmable access-controlled and generic erasable PUF design and its applications","authors":"Chenglu Jin, W. Burleson, M. Van Dijk, U. Rührmair","doi":"10.1007/s13389-022-00284-z","DOIUrl":"https://doi.org/10.1007/s13389-022-00284-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"413 - 432"},"PeriodicalIF":1.9,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52846484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Rethinking modular multi-exponentiation in real-world applications 对实际应用中模块化多幂运算的重新思考
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-03-15 DOI: 10.1007/s13389-022-00287-w
Vidal Attias, Luigi Vigneri, V. Dimitrov
{"title":"Rethinking modular multi-exponentiation in real-world applications","authors":"Vidal Attias, Luigi Vigneri, V. Dimitrov","doi":"10.1007/s13389-022-00287-w","DOIUrl":"https://doi.org/10.1007/s13389-022-00287-w","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"57-70"},"PeriodicalIF":1.9,"publicationDate":"2022-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48537608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Differential fault analysis of NORX using variants of coupon collector problem 使用优惠券收集器问题的变体对NORX的差分故障分析
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-03-05 DOI: 10.1007/s13389-022-00285-y
Amit Jana, Anirban Nath, G. Paul, Dhiman Saha
{"title":"Differential fault analysis of NORX using variants of coupon collector problem","authors":"Amit Jana, Anirban Nath, G. Paul, Dhiman Saha","doi":"10.1007/s13389-022-00285-y","DOIUrl":"https://doi.org/10.1007/s13389-022-00285-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"433 - 459"},"PeriodicalIF":1.9,"publicationDate":"2022-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44200415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret-free security: a survey and tutorial 保密安全:调查和教程
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-03-02 DOI: 10.1007/s13389-021-00283-6
U. Rührmair
{"title":"Secret-free security: a survey and tutorial","authors":"U. Rührmair","doi":"10.1007/s13389-021-00283-6","DOIUrl":"https://doi.org/10.1007/s13389-021-00283-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"387 - 412"},"PeriodicalIF":1.9,"publicationDate":"2022-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48356760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A relation calculus for reasoning about t-probing security t探测安全性推理的关系演算
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-02-26 DOI: 10.1007/s13389-022-00286-x
M. Molteni, V. Zaccaria
{"title":"A relation calculus for reasoning about t-probing security","authors":"M. Molteni, V. Zaccaria","doi":"10.1007/s13389-022-00286-x","DOIUrl":"https://doi.org/10.1007/s13389-022-00286-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"1 - 14"},"PeriodicalIF":1.9,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48402755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs 在赛灵思fpga上实现的基于读写碰撞的SRAM PUF
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-01-29 DOI: 10.1007/s13389-021-00281-8
I. Çiçek, Ahmad Al Khas
{"title":"A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs","authors":"I. Çiçek, Ahmad Al Khas","doi":"10.1007/s13389-021-00281-8","DOIUrl":"https://doi.org/10.1007/s13389-021-00281-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"19-36"},"PeriodicalIF":1.9,"publicationDate":"2022-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45080585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming 一种基于约束规划的现代密码的综合容忍代数侧信道攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-01-19 DOI: 10.1007/s13389-021-00280-9
Fanghui Liu, Waldemar Cruz, L. Michel
{"title":"A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming","authors":"Fanghui Liu, Waldemar Cruz, L. Michel","doi":"10.1007/s13389-021-00280-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00280-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"197 - 228"},"PeriodicalIF":1.9,"publicationDate":"2022-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44676667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Faster multiplication over $${mathbb {F}}_2[X]$$ F 2 [ X 更快的乘法除以$${mathbb {F}}_2[X]$$ F 2 [X]
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-01-11 DOI: 10.1007/s13389-021-00278-3
J. Robert, P. Véron
{"title":"Faster multiplication over \u0000 \u0000 \u0000 \u0000 $${mathbb {F}}_2[X]$$\u0000 \u0000 \u0000 \u0000 F\u0000 2\u0000 \u0000 \u0000 [\u0000 X\u0000 ","authors":"J. Robert, P. Véron","doi":"10.1007/s13389-021-00278-3","DOIUrl":"https://doi.org/10.1007/s13389-021-00278-3","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"13 1","pages":"37-55"},"PeriodicalIF":1.9,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48847047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of the RISC-V entropy source interface RISC-V熵源接口的开发
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-01-06 DOI: 10.1007/s13389-021-00275-6
Markku-Juhani O. Saarinen, G. R. Newell, Ben Marshall, UK PQShield Ltd.
{"title":"Development of the RISC-V entropy source interface","authors":"Markku-Juhani O. Saarinen, G. R. Newell, Ben Marshall, UK PQShield Ltd.","doi":"10.1007/s13389-021-00275-6","DOIUrl":"https://doi.org/10.1007/s13389-021-00275-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"371 - 386"},"PeriodicalIF":1.9,"publicationDate":"2022-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44055656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation 快速特征三多项式乘法及其在NTRU素数解封装中的应用
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2022-01-04 DOI: 10.1007/s13389-021-00282-7
Esra Yeniaras, Murat Cenk
{"title":"Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation","authors":"Esra Yeniaras, Murat Cenk","doi":"10.1007/s13389-021-00282-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00282-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"329 - 348"},"PeriodicalIF":1.9,"publicationDate":"2022-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49055237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信