Journal: J. Cryptographic Engineering

Volume 7, Issue 4

255 -- 272Werner Schindler, Andreas Wiemers. Generic power attacks on RSA with CRT and exponent blinding: new results
273 -- 285Alejandro Cabrera Aldaya, Alejandro Cabrera Sarmiento, Santiago Sánchez-Solano. SPA vulnerabilities of the binary extended Euclidean algorithm
287 -- 295Enes Pasalic, Anupam Chattopadhyay, Weiguo Zhang. Efficient implementation of generalized Maiorana-McFarland class of cryptographic functions
297 -- 298Naofumi Homma. Introduction to the PROOFS 2016 special section
299 -- 310Sarani Bhattacharya, Debdeep Mukhopadhyay. Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers
311 -- 320Jakub Breier, Dirmanto Jap, Shivam Bhasin. A study on analyzing side-channel resistant encoding schemes with respect to fault attacks
321 -- 330Margaux Dugardin, Sylvain Guilley, Martin Moreau, Zakaria Najm, Pablo Rauzy. Using modular extension to provably protect Edwards curves against fault attacks
331 -- 341Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion, Olivier Rioul. Optimal side-channel attacks for multivariate leakages and multiple models
343 -- 351Stjepan Picek, Annelie Heuser, Sylvain Guilley. Template attack versus Bayes classifier

Volume 7, Issue 3

167 -- 181Paul Bottinelli, Joppe W. Bos. Computational aspects of correlation power analysis
183 -- 197Sébastien Ordas, Ludovic Guillaume-Sage, Philippe Maurine. Electromagnetic fault injection: the curse of flip-flops
199 -- 211Pawel Swierczynski, Marc Fyrbiak, Philipp Koppe, Amir Moradi 0001, Christof Paar. Interdiction in practice - Hardware Trojan against a high-security USB flash drive
213 -- 244Matthew Mayhew, Radu Muresan. An overview of hardware-level statistical power analysis attack countermeasures
245 -- 253Christophe Nègre, Thomas Plantard. Efficient regular modular exponentiation using multiplicative half-size splitting

Volume 7, Issue 2

97 -- 98Benedikt Gierlichs, Axel Y. Poschmann. Introduction to the CHES 2016 special issue
99 -- 112Yuval Yarom, Daniel Genkin, Nadia Heninger. CacheBleed: a timing attack on OpenSSL constant-time RSA
113 -- 128Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert. Having no mathematical model may not secure PUFs
129 -- 147François Durvaux, François-Xavier Standaert, Santos Merino Del Pozo. Towards easy leakage certification: extended version
149 -- 165Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi 0001, Tobias Schneider 0002. Strong 8-bit Sboxes with efficient masking in hardware extended version

Volume 7, Issue 1

1 -- 17Mathieu Carbone, Yannick Teglia, Gilles R. Ducharme, Philippe Maurine. Mutual information analysis: higher-order statistical moments, efficiency and efficacy
19 -- 20Sylvain Guilley. Editorial about PROOFS 2015
21 -- 34Noreddine El Janati El Idrissi, Guillaume Bouffard, Jean-Louis Lanet, Said El Hajji. Trust can be misplaced
35 -- 46Shoei Nashimoto, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki. Buffer overflow attack with multiple fault injection and a proven countermeasure
47 -- 61Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan. Smart security management in secure devices
63 -- 74Florian Lugou, Ludovic Apvrille, Aurélien Francillon. SMASHUP: a toolchain for unified verification of hardware/software co-designs
75 -- 85Sabine Azzi, Bruno Barras, Maria Christofi, David Vigilant. Using linear codes as a fault countermeasure for nonlinear operations: application to AES and formal verification
87 -- 95Laurent Sauvage, Tarik Graba, Thibault Porteboeuf. Multi-level formal verification - A new approach against fault injection attack