- Hikaru Nishiyama, Daisuke Fujimoto, Yuichi Hayashi. Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna. J. Cryptographic Engineering, 15(1):9, April 2025.
- Zhenhong Liu, Min Gu. A flexible efficient and configurable number theoretic transform architecture implemented on FPGA. J. Cryptographic Engineering, 15(2):13, June 2025.
- Siqi Liu, Zhusen Liu, Donglong Chen, Wangchen Dai, Lu Zhou 0002, Zhe Liu 0001, Ray C. C. Cheung, Çetin Kaya Koç. MLFormer: a high performance MPC linear inference framework for transformers. J. Cryptographic Engineering, 15(1):2, April 2025.
- Saeed Rostami, Mohammad Ali Orumiehchiha, Elham Shakour, Sadegh Alizadeh. Fault attack on Enocoro stream cipher family. J. Cryptographic Engineering, 15(1):3, 2025.
- Denis Parfenov, Aleksandr Bakharev, Aleksandr Kutsenko, Aleksandr Belov, Natalia Atutova. Optimization of the algorithm to compute the guaranteed number of activations in sfXS-circuits and its application to the analysis of block ciphers. J. Cryptographic Engineering, 15(1):4, April 2025.
- Jonathan Takeshita, Nirajan Koirala, Colin McKechney, Taeho Jung. HEProfiler: an in-depth profiler of approximate homomorphic encryption libraries. J. Cryptographic Engineering, 15(2):14, June 2025.
- Matthias Probst, Lars Tebelmann, Moritz Wettermann, Michael Pehl. Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor. J. Cryptographic Engineering, 15(1):1, April 2025.
- Tobias Stelzer, Felix Oberhansl, Jonas Schupp, Patrick Karl, Horia Turcuman. Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform. J. Cryptographic Engineering, 15(2):11, June 2025.
- MyeongHoon Lee, Hanbeom Shin, Myoungsu Shin, Dongjae Lee, Seog Chung Seo, Seokhie Hong. Best interleave size of GIFT-128 on 64-bit ARM processor. J. Cryptographic Engineering, 15(1):6, April 2025.
- Mahmoud AbdelHafeez Sayed, Mostafa Taha. Evaluation of encrypted matching criteria using homomorphic encryption based FSM. J. Cryptographic Engineering, 15(1):8, April 2025.