Journal: J. Cryptographic Engineering

Volume 5, Issue 4

227 -- 243Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang. A statistics-based success rate model for DPA and CPA
245 -- 254Jason R. Hamlet, Robert W. Brocato. Throughput-optimized implementations of QUAD
255 -- 267Liran Lerman, Gianluca Bontempi, Olivier Markowitch. The bias-variance decomposition in profiled attacks
269 -- 288Simone Bongiovanni, Francesco Centurelli, Giuseppe Scotti, Alessandro Trifiletti. Design and validation through a frequency-based metric of a new countermeasure to protect nanometer ICs from side-channel attacks
289 -- 303Murat Cenk, M. Anwar Hasan. Some new results on binary polynomial multiplication

Volume 5, Issue 3

153 -- 169Xiaofei Guo, Debdeep Mukhopadhyay, Chenglu Jin, Ramesh Karri. Security analysis of concurrent error detection against differential fault analysis
171 -- 185Guilherme Perin, Laurent Imbert, Philippe Maurine, Lionel Torres. Vertical and horizontal correlation attacks on RNS-based exponentiations
187 -- 199Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, Naoya Torii. A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
201 -- 214Michael Hutter, Peter Schwabe. Multiprecision multiplication on AVR revisited
215 -- 226Manuel Bluhm, Shay Gueron. Fast software implementation of binary elliptic curve cryptography

Volume 5, Issue 2

71 -- 72Lejla Batina, Matthew J. B. Robshaw. Introduction to the CHES 2014 special issue
73 -- 83Jean-Sébastien Coron, Arnab Roy 0005, Srinivas Vivek. Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures
85 -- 94Takeshi Sugawara, Daisuke Suzuki, Ryoichi Fujii, Shigeaki Tawa, Ryohei Hori, Mitsuru Shiozaki, Takeshi Fujino. Reversing stealthy dopant-level circuits
95 -- 112Daniel Genkin, Itamar Pipman, Eran Tromer. Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version
113 -- 122Jo Vliegen, Nele Mentens, Dirk Koch, Dries Schellekens, Ingrid Verbauwhede. Practical feasibility evaluation and improvement of a pay-per-use licensing scheme for hardware IP cores in Xilinx FPGAs
123 -- 139Liran Lerman, Gianluca Bontempi, Olivier Markowitch. A machine learning approach against a masked AES - Reaching the limit of side-channel attacks with a learning model
141 -- 151Shay Gueron, Vlad Krasnov. Fast prime field elliptic-curve cryptography with 256-bit primes

Volume 5, Issue 1

1 -- 11Joshua Templin, Jason R. Hamlet. A new power-aware FPGA design metric
13 -- 29Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar. Improved differential fault attack on MICKEY 2.0
31 -- 52Armando Faz-Hernández, Patrick Longa, Ana H. Sánchez. Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version)
53 -- 69Colin O'Flynn, Zhizhang Chen. Synchronous sampling and clock recovery of internal oscillators for side channel analysis and fault injection