Journal of Cryptographic Engineering最新文献

筛选
英文 中文
Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm 针对巴雷特模乘法算法的定时攻击和局部定时攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-02-03 DOI: 10.1007/s13389-020-00254-3
Johannes Mittmann, W. Schindler
{"title":"Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm","authors":"Johannes Mittmann, W. Schindler","doi":"10.1007/s13389-020-00254-3","DOIUrl":"https://doi.org/10.1007/s13389-020-00254-3","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"369 - 397"},"PeriodicalIF":1.9,"publicationDate":"2021-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00254-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41923571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spectral approach to process the (multivariate) high-order template attack against any masking scheme 处理针对任何掩蔽方案的(多元)高阶模板攻击的谱方法
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-01-07 DOI: 10.1007/s13389-020-00253-4
Maamar Ouladj, S. Guilley, P. Guillot, Farid Mokrane
{"title":"Spectral approach to process the (multivariate) high-order template attack against any masking scheme","authors":"Maamar Ouladj, S. Guilley, P. Guillot, Farid Mokrane","doi":"10.1007/s13389-020-00253-4","DOIUrl":"https://doi.org/10.1007/s13389-020-00253-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"75 - 93"},"PeriodicalIF":1.9,"publicationDate":"2021-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00253-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46672567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure FMCW雷达的低成本距离欺骗攻击及其对抗可行性研究
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-01-07 DOI: 10.1007/s13389-020-00252-5
S. Nashimoto, D. Suzuki, N. Miura, Tatsuya Machida, Kohei Matsuda, M. Nagata
{"title":"Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure","authors":"S. Nashimoto, D. Suzuki, N. Miura, Tatsuya Machida, Kohei Matsuda, M. Nagata","doi":"10.1007/s13389-020-00252-5","DOIUrl":"https://doi.org/10.1007/s13389-020-00252-5","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"289 - 298"},"PeriodicalIF":1.9,"publicationDate":"2021-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00252-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42118272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Six shades lighter: a bit-serial implementation of the AES family. 轻六色:AES系列的位串行实现。
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2021-01-01 Epub Date: 2021-06-01 DOI: 10.1007/s13389-021-00265-8
Sergio Roldán Lombardía, Fatih Balli, Subhadeep Banik
{"title":"Six shades lighter: a bit-serial implementation of the AES family.","authors":"Sergio Roldán Lombardía,&nbsp;Fatih Balli,&nbsp;Subhadeep Banik","doi":"10.1007/s13389-021-00265-8","DOIUrl":"https://doi.org/10.1007/s13389-021-00265-8","url":null,"abstract":"<p><p>Recently, cryptographic literature has seen new block cipher designs such as PRESENT, GIFT or SKINNY that aim to be more lightweight than the current standard, i.e., AES. Even though AES family of block ciphers were designed two decades ago, they still remain as the de facto encryption standard, with AES-128 being the most widely deployed variant. In this work, we revisit the combined one-in-all implementation of the AES family, namely both encryption and decryption of each AES-128/192/256 as a single ASIC circuit. A preliminary version appeared in Africacrypt 2019 by Balli and Banik, where the authors design a byte-serial circuit with such functionality. We improve on their work by reducing the size of the compact circuit to 2268 GE through 1-bit-serial implementation, which achieves 38% reduction in area. We also report stand-alone bit-serial versions of the circuit, targeting only a subset of modes and versions, e.g., AES-192 and AES-256. Our results imply that, in terms of area, AES-192 and AES-256 can easily compete with the larger members of recently designed SKINNY family, e.g., SKINNY-128-256, SKINNY-128-384. Thus, our implementations can be used interchangeably inside authenticated encryption candidates such as SKINNY-AEAD/-HASH, ForkAE or Romulus in place of SKINNY.</p>","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 4","pages":"417-439"},"PeriodicalIF":1.9,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-021-00265-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39668124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version 用于FPGA SoC比特流解密的SCA安全和可更新加密引擎:扩展版本
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-12-24 DOI: 10.1007/s13389-020-00247-2
Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl
{"title":"SCA secure and updatable crypto engines for FPGA SoC bitstream decryption: extended version","authors":"Florian Unterstein, Nisha Jacob, Neil Hanley, Chongyan Gu, Johann Heyszl","doi":"10.1007/s13389-020-00247-2","DOIUrl":"https://doi.org/10.1007/s13389-020-00247-2","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"257 - 272"},"PeriodicalIF":1.9,"publicationDate":"2020-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00247-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42565387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Melting SNOW-V: improved lightweight architectures 融化的SNOW-V:改进的轻量级架构
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-12-04 DOI: 10.1007/s13389-020-00251-6
Andrea Caforio, Fatih Balli, S. Banik
{"title":"Melting SNOW-V: improved lightweight architectures","authors":"Andrea Caforio, Fatih Balli, S. Banik","doi":"10.1007/s13389-020-00251-6","DOIUrl":"https://doi.org/10.1007/s13389-020-00251-6","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"12 1","pages":"53 - 73"},"PeriodicalIF":1.9,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00251-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48043656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
x-only point addition formula and faster compressed SIKE 仅x点加法公式和更快的压缩SIKE
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-11-25 DOI: 10.1007/s13389-020-00245-4
Geovandro Pereira, Javad Doliskani, David Jao
{"title":"x-only point addition formula and faster compressed SIKE","authors":"Geovandro Pereira, Javad Doliskani, David Jao","doi":"10.1007/s13389-020-00245-4","DOIUrl":"https://doi.org/10.1007/s13389-020-00245-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"57 - 69"},"PeriodicalIF":1.9,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00245-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45639409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Removable weak keys for discrete logarithm-based cryptography 基于离散对数的密码学中的可移除弱密钥
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-11-15 DOI: 10.1007/s13389-020-00250-7
M. Jacobson, Prabhat Kushwaha
{"title":"Removable weak keys for discrete logarithm-based cryptography","authors":"M. Jacobson, Prabhat Kushwaha","doi":"10.1007/s13389-020-00250-7","DOIUrl":"https://doi.org/10.1007/s13389-020-00250-7","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"181 - 195"},"PeriodicalIF":1.9,"publicationDate":"2020-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00250-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43249004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved algebraic attacks on lightweight block ciphers 改进的轻量级分组密码的代数攻击
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-11-07 DOI: 10.1007/s13389-020-00237-4
S. Yeo, Duc-Phong Le, Khoongming Khoo
{"title":"Improved algebraic attacks on lightweight block ciphers","authors":"S. Yeo, Duc-Phong Le, Khoongming Khoo","doi":"10.1007/s13389-020-00237-4","DOIUrl":"https://doi.org/10.1007/s13389-020-00237-4","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"11 1","pages":"1 - 19"},"PeriodicalIF":1.9,"publicationDate":"2020-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00237-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49064705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PROOFS 2018 Editorial 《证据2018》社论
IF 1.9 4区 计算机科学
Journal of Cryptographic Engineering Pub Date : 2020-10-20 DOI: 10.1007/s13389-020-00248-1
L. Batina, N. Mentens
{"title":"PROOFS 2018 Editorial","authors":"L. Batina, N. Mentens","doi":"10.1007/s13389-020-00248-1","DOIUrl":"https://doi.org/10.1007/s13389-020-00248-1","url":null,"abstract":"","PeriodicalId":48508,"journal":{"name":"Journal of Cryptographic Engineering","volume":"10 1","pages":"287 - 287"},"PeriodicalIF":1.9,"publicationDate":"2020-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s13389-020-00248-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47283843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信