Journal: J. Cryptographic Engineering

Volume 1, Issue 4

255 -- 264Markus Dichtl. A new method of black box power analysis and a fast algorithm for optimal key search
265 -- 270Sho Endo, Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh. An on-chip glitchy-clock generator for testing fault injection attacks
271 -- 281Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall. Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
283 -- 292Falko Strenzke. Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties
293 -- 302Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede, Joos Vandewalle. Machine learning in side-channel analysis: a first study
303 -- 313Alexander Lux, Artem Starostin. A tool for static detection of timing channels in Java

Volume 1, Issue 3

177 -- 186Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Christian Wachsmann. Recyclable PUFs: logically reconfigurable PUFs
187 -- 199Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López. Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction
201 -- 218Nicolas Meloni, Christophe Nègre, M. Anwar Hasan. High performance GHASH and impacts of a class of unconventional bases
219 -- 230Michael Tunstall. Practical complexity differential cryptanalysis and fault analysis of AES
231 -- 241Marcel Medwed, François-Xavier Standaert. Extractors against side-channel attacks: weak or strong?
243 -- 253Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi. Modulus fault attacks against RSA-CRT signatures

Volume 1, Issue 2

87 -- 99Carlos Moreno, M. Anwar Hasan. SPA-resistant binary exponentiation with optimal execution time
101 -- 121Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki. A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO
123 -- 144Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert. Univariate side channel attacks and leakage modeling
145 -- 160Carolyn Whitnall, Elisabeth Oswald. A fair evaluation framework for comparing side-channel distinguishers
161 -- 176Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli. Scalar multiplication on Weierstraß elliptic curves from Co-::::Z:::: arithmetic

Volume 1, Issue 1

1 -- 3Çetin Kaya Koç. Introduction to the ::::Journal of Cryptographic Engineering::::
5 -- 27Paul C. Kocher, Joshua Jaffe, Benjamin Jun, Pankaj Rohatgi. Introduction to differential power analysis
29 -- 36H. Gregor Molter, Marc Stöttinger, Abdulhadi Shoufan, Falko Strenzke. A simple power analysis attack on a McEliece cryptoprocessor
37 -- 55Tim Güneysu. Utilizing hard cores of modern FPGA devices for high-performance cryptography
57 -- 69Agustin Dominguez-Oviedo, M. Anwar Hasan. Algorithm-level error detection for Montgomery ladder-based ECSM
71 -- 77Sergei Skorobogatov. Synchronization method for SCA and fault attacks
79 -- 86Cédric Hocquet, Dina Kamel, Francesco Regazzoni, Jean-Didier Legat, Denis Flandre, David Bol, François-Xavier Standaert. Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags