Journal: J. Cryptographic Engineering

Volume 6, Issue 4

259 -- 286Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig. Selecting elliptic curves for cryptography: an efficiency and security analysis
287 -- 297Erich Wenger, Paul Wolfger. Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs
299 -- 323Ayesha Khalid, Muhammad Hassan, Goutam Paul, Anupam Chattopadhyay. RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers
325 -- 337Samer Moein, Fayez Gebali, T. Aaron Gulliver. Hardware attacks: an algebraic approach
339 -- 346Amir Hamzah Abd Ghafar, Muhammad Rezal Kamel Ariffin. 2q

Volume 6, Issue 3

171 -- 185Daniel Lemire, Owen Kaser. Faster 64-bit universal hashing using carry-less multiplications
187 -- 199Raveen R. Goundar, Marc Joye. Inversion-free arithmetic on elliptic curves through isomorphisms
201 -- 216Pablo Rauzy, Sylvain Guilley, Zakaria Najm. Formally proved security of assembly code against power analysis - A case study on balanced logic
217 -- 227Bruno Robisson, Hélène Le Bouder. Physical functions: the common factor of side-channel and fault attacks?
229 -- 238David Galindo, Johann Großschädl, Zhe Liu 0001, Praveen Kumar Vadnala, Srinivas Vivek. Implementation of a leakage-resilient ElGamal key encapsulation mechanism
239 -- 247Xuan Thuy Ngo, Zakaria Najm, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger. Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
249 -- 258Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert. PAC learning of arbiter PUFs

Volume 6, Issue 2

83 -- 84Tim Güneysu, Helena Handschuh. Introduction to the CHES 2015 special issue
85 -- 99Tobias Schneider, Amir Moradi. Leakage assessment methodology - Extended version
101 -- 119Werner Schindler. Exclusive exponent blinding is not enough to prevent any timing attack on RSA
121 -- 137Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans Willems. Secure key generation from biased PUFs: extended version
139 -- 153Oscar Reparaz, Sujoy Sinha Roy, Ruan de Clercq, Frederik Vercauteren, Ingrid Verbauwhede. Masking ring-LWE
155 -- 169Iwen Coisel, Ignacio Sanchez. Improved cryptanalysis of the DECT standard cipher

Volume 6, Issue 1

1 -- 29Alan G. Konheim. Automated teller machines: their history and authentication protocols
31 -- 48Alejandro Cabrera Sarmiento, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano. AES T-Box tampering attack
49 -- 59Houda Ferradi, Rémi Géraud, David Naccache, Assia Tria. When organized crime applies academic results: a forensic analysis of an in-card listening device
61 -- 74Pierre Bayon, Lilian Bossuet, Alain Aubert, Viktor Fischer. Fault model of electromagnetic attacks targeting ring oscillator-based true random number generators
75 -- 82Markku-Juhani O. Saarinen. The BRUTUS automatic cryptanalytic framework - Testing CAESAR authenticated encryption candidates for weaknesses