Journal: J. Cryptographic Engineering

Volume 3, Issue 4

197 -- 211Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh. Variety enhancement of PUF responses using the locations of random outputting RS latches
213 -- 225Shivam Bhasin, Sylvain Guilley, Annelie Heuser, Jean-Luc Danger. From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications
227 -- 240Abdel Alim Kamal, Amr M. Youssef. Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks
241 -- 265Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, David Naccache. A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards

Volume 3, Issue 3

139 -- 156Mohamed Saied Emam Mohamed, Stanislav Bulygin, Michael Zohner, Annelie Heuser, Michael Walter, Johannes Buchmann. Improved algebraic side-channel attack on AES
157 -- 167Maria Christofi, Boutheina Chetali, Louis Goubin, David Vigilant. Formal verification of a CRT-RSA implementation against fault attacks
169 -- 180Sébastien Briais, Jean-Luc Danger, Sylvain Guilley. A formal study of two physical countermeasures against side channel attacks
181 -- 195Mark Brown. Toward a taxonomy of communications security models

Volume 3, Issue 2

73 -- 97Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall. Differential fault analysis of AES: towards reaching its limits
99 -- 110David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Eric D. Laspe. Improving cross-device attacks using zero-mean unit-variance normalization
111 -- 128Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green 0001, Aviel D. Rubin. Charm: a framework for rapidly prototyping cryptosystems
129 -- 138Michael T. Kurdziel, Marcin Lukowiak, Michael A. Sanfilippo. Minimizing performance overhead in memory encryption

Volume 3, Issue 1

1 -- 0Emmanuel Prouff, Patrick Schaumont. Introduction to the CHES 2012 special issue
3 -- 15Alexander Schlösser, Dmitry Nedospasov, Juliane Krämer, Susanna Orlic, Jean-Pierre Seifert. Simple photonic emission analysis of AES
17 -- 28Ulrich Rührmair, Marten van Dijk. On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
29 -- 43Stefan Heyse, Tim Güneysu. Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance
45 -- 58Benoît Gérard, François-Xavier Standaert. Unified and optimized linear collision attacks and their application in a non-profiled setting: extended version
59 -- 72Pierre-Alain Fouque, Nicolas Guillermin, Delphine Leresteux, Mehdi Tibouchi, Jean-Christophe Zapalowicz. Attacking RSA-CRT signatures with faults on montgomery multiplication