Journal: J. Cryptographic Engineering

Volume 8, Issue 4

271 -- 283Luckas A. Farias, Bruno C. Albertini, Paulo S. L. M. Barreto. A class of safe and efficient binary Edwards curves
285 -- 300Kimmo Järvinen 0001, Sujoy Sinha Roy, Ingrid Verbauwhede. Arithmetic of $$\tau $$ τ -adic expansions for lightweight Koblitz curve cryptography
301 -- 313Liran Lerman, Romain Poussier, Olivier Markowitch, François-Xavier Standaert. Template attacks versus machine learning revisited and the curse of dimensionality in side-channel analysis: extended version
315 -- 326John DeVale, Ryan N. Rakvic, Kevin Rudd. Another dimension in integrated circuit trust
327 -- 340Sandip Karmakar, Dipanwita Roy Chowdhury. Scan-based side channel attack on stream ciphers and its prevention
341 -- 349Boris Skoric. A trivial debiasing scheme for Helper Data Systems
351 -- 367Fangan-Yssouf Dosso, Fabien Herbaut, Nicolas Meloni, Pascal Véron. Euclidean addition chains scalar multiplication on curves with efficient endomorphism

Volume 8, Issue 3

185 -- 187Francisco Rodríguez-Henríquez, Erkay Savas. Special issue in honor of Peter Lawrence Montgomery
189 -- 200Jean-Claude Bajard, Julien Eynard, Nabil Merkiche. Montgomery reduction within the context of residue number system arithmetic
201 -- 210Erkay Savas, Çetin Kaya Koç. Montgomery inversion
211 -- 226Wangchen Dai, Ray C. C. Cheung. Spectral arithmetic in Montgomery modular multiplication
227 -- 240Craig Costello, Benjamin Smith 0003. Montgomery curves and their arithmetic - The case of large characteristic fields
241 -- 258Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez. The Montgomery ladder on binary elliptic curves
259 -- 269Murat Cenk. Karatsuba-like formulae and their associated techniques

Volume 8, Issue 2

93 -- 94Wieland Fischer, Naofumi Homma. Introduction to the CHES 2017 special issue
95 -- 107Tung Chou. McBits revisited: toward a fast constant-time code-based KEM
109 -- 124Hannes Groß, Stefan Mangard. A unified masking approach
125 -- 139Vincent Immler, Robert Specht, Florian Unterstein. Your rails cannot hide from localized EM: how dual-rail logic fails on FPGAs - extended version
141 -- 184George Hatzivasilis, Konstantinos Fysarakis, Ioannis Papaefstathiou, Charalampos Manifavas. A review of lightweight block ciphers

Volume 8, Issue 1

1 -- 27Qian Ge, Yuval Yarom, David Cock, Gernot Heiser. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
29 -- 48Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi. TriviA and uTriviA: two fast and secure authenticated encryption schemes
49 -- 69Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar. Disk encryption: do we need to preserve length?
71 -- 84Markku-Juhani O. Saarinen. Arithmetic coding and blinding countermeasures for lattice signatures - Engineering a side-channel resistant post-quantum signature scheme with compact signatures
85 -- 91Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Amaury de Wargny. Regulating the pace of von Neumann correctors