- Jihoon Jang, MyeongHoon Lee, Suhri Kim, Seog Chung Seo, Seokhie Hong. Faster 2 [x] polynomial multiplication using SIMD instructions. J. Cryptographic Engineering, 16(1):3, April 2026.
- Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel. Ascending stepped cryptanalytic time-memory trade-off. J. Cryptographic Engineering, 16(1):5, April 2026.
- Ming Tang, Mengxing Wang. SpoofLearner: Inducing Deceptive Results in Deep Learning SCA via Low-Order Leakage. J. Cryptographic Engineering, 16(1):4, April 2026.
- Ahmet Malal, Cihangir Tezcan. First Fully Pipelined High Throughput FPGA Implementation and GPU Optimization of Wider Variant of AES. J. Cryptographic Engineering, 16(1):1, April 2026.
- Oren Ganon, Yuval Rubakh, Nadav Elkayam, Itamar Levi. A fresh look on slow asymmetric crypto: accelerating WolfSSL on end-nodes processors. J. Cryptographic Engineering, 16(1):2, April 2026.
- Hikaru Nishiyama, Daisuke Fujimoto, Yuichi Hayashi. Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna. J. Cryptographic Engineering, 15(1):9, April 2025.
- Zhenhong Liu, Min Gu. A flexible efficient and configurable number theoretic transform architecture implemented on FPGA. J. Cryptographic Engineering, 15(2):13, June 2025.
- Siqi Liu, Zhusen Liu, Donglong Chen, Wangchen Dai, Lu Zhou 0002, Zhe Liu 0001, Ray C. C. Cheung, Çetin Kaya Koç. MLFormer: a high performance MPC linear inference framework for transformers. J. Cryptographic Engineering, 15(1):2, April 2025.
- Saeed Rostami, Mohammad Ali Orumiehchiha, Elham Shakour, Sadegh Alizadeh. Fault attack on Enocoro stream cipher family. J. Cryptographic Engineering, 15(1):3, 2025.
- Denis Parfenov, Aleksandr Bakharev, Aleksandr Kutsenko, Aleksandr Belov, Natalia Atutova. Optimization of the algorithm to compute the guaranteed number of activations in sfXS-circuits and its application to the analysis of block ciphers. J. Cryptographic Engineering, 15(1):4, April 2025.