Journal: J. Cryptographic Engineering

Volume 2, Issue 4

207 -- 219Jean DaRolt, Amitabh Das, Santosh Ghosh, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre, Ingrid Verbauwhede. Scan attacks on side-channel and fault attack resistant public-key implementations
221 -- 240Brian Baldwin, Raveen R. Goundar, Mark Hamilton, William P. Marnane. Co-Z ECC scalar multiplications for hardware, software and hardware-software co-design on embedded systems
241 -- 253Shay Gueron, Vlad Krasnov. Parallelizing message schedules to accelerate the computations of hash functions
255 -- 269Patrick Koeberl, Jiangtao Li, Roel Maes, Anand Rajan, Claire Vishik, Marcin Wójcik, Wei Wu. A practical device authentication scheme using SRAM PUFs

Volume 2, Issue 3

143 -- 159Markus Kasper, Amir Moradi, Georg T. Becker, Oliver Mischke, Tim Güneysu, Christof Paar, Wayne Burleson. Side channels as building blocks
161 -- 177Luke Mather, Elisabeth Oswald. Pinpointing side-channel information leaks in web applications
179 -- 188Vladimir Trujillo-Olaya, Timothy Sherwood, Çetin Kaya Koç. Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications
189 -- 206Saloomeh Shariati, François-Xavier Standaert, Laurent Jacques, Benoit M. Macq. Analysis and experimental evaluation of image-based PUFs

Volume 2, Issue 2

77 -- 89Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang. High-speed high-security signatures
91 -- 97M. Anwar Hasan, Christophe Nègre. Sequential multiplier with sub-linear gate complexity
99 -- 110Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon. Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure
111 -- 127Thomas Roche, Emmanuel Prouff. Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols - Extended version
129 -- 141Julien Bringer, Hervé Chabanne, Thanh-Ha Le. Protecting AES against side-channel analysis using wire-tap codes

Volume 2, Issue 1

1 -- 18Philipp Grabher, Johann Großschädl, Simon Hoerder, Kimmo Järvinen, Daniel Page, Stefan Tillich, Marcin Wójcik. An exploration of mechanisms for dynamic cryptographic instruction set extension
19 -- 29Conrado Porto Lopes Gouvêa, Leonardo B. Oliveira, Julio López. Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller
31 -- 43Shay Gueron. Efficient software implementations of modular exponentiation
45 -- 62Claude Carlet, Jean-Charles Faugère, Christopher Goyet, Guénaël Renault. Analysis of the algebraic side channel attack
63 -- 74M. Abdelaziz Elaabid, Sylvain Guilley. Portability of templates
75 -- 0Roberto Avanzi, Simon Hoerder, Dan Page, Michael Tunstall. Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems