Journal of Cryptographic Engineering最新文献

筛选
英文 中文
A survey of algorithmic methods in IC reverse engineering 集成电路逆向工程中的算法方法综述
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-07-13 DOI: 10.1007/s13389-021-00268-5
Leonid Azriel, Julian Speith, Nils Albartus, R. Ginosar, A. Mendelson, C. Paar
{"title":"A survey of algorithmic methods in IC reverse engineering","authors":"Leonid Azriel, Julian Speith, Nils Albartus, R. Ginosar, A. Mendelson, C. Paar","doi":"10.1007/s13389-021-00268-5","DOIUrl":"https://doi.org/10.1007/s13389-021-00268-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"299 - 315"},"PeriodicalIF":1.9,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00268-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48220814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Modelling cryptographic distinguishers using machine learning 使用机器学习建模密码区分器
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-07-01 DOI: 10.1007/s13389-021-00262-x
Carlo Brunetta, Pablo Picazo-Sanchez
{"title":"Modelling cryptographic distinguishers using machine learning","authors":"Carlo Brunetta, Pablo Picazo-Sanchez","doi":"10.1007/s13389-021-00262-x","DOIUrl":"https://doi.org/10.1007/s13389-021-00262-x","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"123 - 135"},"PeriodicalIF":1.9,"publicationDate":"2021-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00262-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42199237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved constant-sum encodings for hash-based signatures 改进了基于哈希的签名的常量和编码
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-06-02 DOI: 10.1007/s13389-021-00264-9
L. P. Perin, Gustavo Zambonin, Ricardo Felipe Custódio, Lucia Moura, D. Panario
{"title":"Improved constant-sum encodings for hash-based signatures","authors":"L. P. Perin, Gustavo Zambonin, Ricardo Felipe Custódio, Lucia Moura, D. Panario","doi":"10.1007/s13389-021-00264-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00264-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"329 - 351"},"PeriodicalIF":1.9,"publicationDate":"2021-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00264-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47409421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Correction to: Editorial about PROOFS 2019 更正:关于PROVIS 2019的社论
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-06-01 DOI: 10.1007/s13389-021-00266-7
K. Heydemann, Letitia Li
{"title":"Correction to: Editorial about PROOFS 2019","authors":"K. Heydemann, Letitia Li","doi":"10.1007/s13389-021-00266-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00266-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"197"},"PeriodicalIF":1.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00266-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41774079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels 椭圆曲线Diffie-Hellman在128位和224位安全级别上的安全性和效率权衡
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-04-12 DOI: 10.1007/s13389-021-00261-y
K. Nath, P. Sarkar
{"title":"Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels","authors":"K. Nath, P. Sarkar","doi":"10.1007/s13389-021-00261-y","DOIUrl":"https://doi.org/10.1007/s13389-021-00261-y","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"107 - 121"},"PeriodicalIF":1.9,"publicationDate":"2021-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00261-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47034816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Montgomery-friendly primes and applications to cryptography 蒙哥马利友好质数及其在密码学中的应用
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-04-05 DOI: 10.1007/s13389-021-00260-z
J. Bajard, S. Duquesne
{"title":"Montgomery-friendly primes and applications to cryptography","authors":"J. Bajard, S. Duquesne","doi":"10.1007/s13389-021-00260-z","DOIUrl":"https://doi.org/10.1007/s13389-021-00260-z","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"399 - 415"},"PeriodicalIF":1.9,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00260-z","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47618361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware 探索并行性提高FrodoKEM硬件性能
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-03-20 DOI: 10.1007/s13389-021-00258-7
James Howe, Marco Martinoli, E. Oswald, F. Regazzoni
{"title":"Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware","authors":"James Howe, Marco Martinoli, E. Oswald, F. Regazzoni","doi":"10.1007/s13389-021-00258-7","DOIUrl":"https://doi.org/10.1007/s13389-021-00258-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"317 - 327"},"PeriodicalIF":1.9,"publicationDate":"2021-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00258-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48160243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models 针对复杂CPU的电磁故障注入,面向新的微体系结构故障模型
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-03-19 DOI: 10.1007/s13389-021-00259-6
T. Trouchkine, Sébanjila Kevin Bukasa, Mathieu Escouteloup, Ronan Lashermes, Guillaume Bouffard
{"title":"Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models","authors":"T. Trouchkine, Sébanjila Kevin Bukasa, Mathieu Escouteloup, Ronan Lashermes, Guillaume Bouffard","doi":"10.1007/s13389-021-00259-6","DOIUrl":"https://doi.org/10.1007/s13389-021-00259-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"353 - 367"},"PeriodicalIF":1.9,"publicationDate":"2021-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00259-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43352199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC ECC被动侧信道攻击对策的性能及安全问题研究
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-03-16 DOI: 10.1007/s13389-021-00257-8
Rodrigo Abarzúa, C. Valencia, Julio López
{"title":"Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC","authors":"Rodrigo Abarzúa, C. Valencia, Julio López","doi":"10.1007/s13389-021-00257-8","DOIUrl":"https://doi.org/10.1007/s13389-021-00257-8","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"71 - 102"},"PeriodicalIF":1.9,"publicationDate":"2021-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00257-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43672129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Parallel modular multiplication using 512-bit advanced vector instructions 并行模块化乘法使用512位先进的矢量指令
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-02-13 DOI: 10.1007/s13389-021-00256-9
B. Buhrow, B. Gilbert, C. Haider
{"title":"Parallel modular multiplication using 512-bit advanced vector instructions","authors":"B. Buhrow, B. Gilbert, C. Haider","doi":"10.1007/s13389-021-00256-9","DOIUrl":"https://doi.org/10.1007/s13389-021-00256-9","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"95 - 105"},"PeriodicalIF":1.9,"publicationDate":"2021-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00256-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42839984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信