Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions Ihab AlshaerGijs BurghoornPaolo Maistri Research Article 23 April 2024
Complete group law for genus 2 Jacobians on Jacobian coordinates Elif Ozbay GurlerHuseyin Hisil Research Article Open access 16 April 2024 Pages: 87 - 101
Scoring the predictions: a way to improve profiling side-channel attacks Damien RobissoutLilian BossuetAmaury Habrard Research Article 08 April 2024
Utilizing layout effects for analog logic locking Muayad J. AljafarFlorence AzaisSamuel Pagliarini Research Article Open access 06 April 2024
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN Priyanka JoshiBodhisatwa Mazumdar Research Article 20 March 2024 Pages: 103 - 125
Energy efficient triple-modular exponential techniques for batch verification schemes Satyanarayana Vollala Research Article 16 March 2024
Amplitude-modulated EM side-channel attack on provably secure masked AES Huanyu Wang Research Article Open access 14 March 2024
Leaking secrets in homomorphic encryption with side-channel attacks Furkan AydinAydin Aysu Research Article 12 January 2024
Breaking KASLR on mobile devices without any use of cache memory (extended version) Milad SeddighMahdi EsfahaniHadi Soleimany Research Article 05 January 2024
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis Unai RiojaLejla BatinaJose Luis Flores Research Article 16 December 2023
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation Muhammed Jassem Al-Muhammed Research Article 13 December 2023
Quantum random number generator on IBM QX Vaishnavi kumarPadmapriya Pravinkumar Correspondence 07 December 2023
The ASHES 2021 special issue at JCEN Chip-Hong ChangStefan KatzenbeisserUlrich Rührmair Regular Paper Open access 18 November 2023 Pages: 389 - 390
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost Claude CarletAbderrahman DaifCédric Tavernier Regular Paper 04 November 2023
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures Leonardo A. D. S. RibeiroJosé Paulo da Silva LimaAndré L. M. Santos Regular Paper 16 October 2023 Pages: 35 - 41
Restricted near collision attack on Plantlet Satyam KumarSandip Kumar MondalAvishek Adhikari Regular Paper 09 October 2023 Pages: 19 - 34
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations Raphael VieraJean-Max DutertreAnthony Bertrand Research Article 03 October 2023
The Asymmetric five-card trick: working with variable encoding in card-based protocols Luis Guillen Regular Paper Open access 31 August 2023
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA Argyrios SiderisTheodora SanidaMinas Dasygenis Regular Paper Open access 30 August 2023
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography Felix OberhanslTim FritzmannGeorg Sigl Regular Paper Open access 24 August 2023 Pages: 1 - 18
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing Dmitrii Koshelev Correction 17 August 2023 Pages: 127 - 128
Probabilistic root finding in code-based cryptography Dúnia MarchioriRicardo CustódioLucia Moura Regular Paper 31 July 2023 Pages: 71 - 85
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis Marina KrčekGuilherme Perin Regular Paper Open access 21 July 2023
AutoPOI: automated points of interest selection for side-channel analysis Mick G. D. RemmerswaalLichao WuNele Mentens Regular Paper Open access 20 July 2023
CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler Oswa AmroVishesh MishraUrbi Chatterjee Regular Paper 06 July 2023
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128 Iftekhar SalamWei-Chuen YauJosef Pieprzyk Regular Paper 26 June 2023 Pages: 265 - 281
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version Tamon AsanoTakeshi Sugawara Regular Paper 20 June 2023 Pages: 165 - 180
A faster method for fault attack resistance in static/ephemeral CSIDH Jason T. LeGrow Regular Paper 16 June 2023 Pages: 283 - 294
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference Pedro Geraldo M. R. AlvesJheyne N. OrtizDiego F. Aranha Regular Paper 13 June 2023 Pages: 295 - 310
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit Cuiping ShaoDongyan ZhaoLiuqing Yang Regular Paper 02 June 2023 Pages: 57 - 70
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version) Thilo KrachenfelsJean-Pierre SeifertShahin Tajik Regular Paper Open access 29 May 2023 Pages: 485 - 499
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case Dor SalomonItamar Levi Regular Paper Open access 29 May 2023 Pages: 325 - 342
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis Maikel KerkhofLichao WuStjepan Picek Regular Paper Open access 28 May 2023 Pages: 311 - 324
Spoofing attacks against vehicular FMCW radar Rony KomissarovSharon VaismanAvishai Wool Regular Paper 22 May 2023 Pages: 473 - 484
Attribute-based encryption with enforceable obligations Hamed ArshadPablo Picazo-SanchezGerardo Schneider Regular Paper 29 April 2023 Pages: 343 - 371
A side-channel attack on a masked and shuffled software implementation of Saber Kalle NgoElena DubrovaThomas Johansson Regular Paper Open access 25 April 2023 Pages: 443 - 460
StringENT test suite: ENT battery revisited for efficient P value computation Elena Almaraz LuengoBittor Alaña OlivaresDarren Hurley-Smith Regular Paper Open access 01 April 2023 Pages: 235 - 249
A novel non-profiled side channel attack based on multi-output regression neural network Ngoc-Tuan DoVan-Phuc HoangVan Sang Doan Regular Paper 31 March 2023
High-speed SABER key encapsulation mechanism in 65nm CMOS Malik ImranFelipe AlmeidaSamuel Pagliarini Regular Paper 29 March 2023 Pages: 461 - 471
Practical aspects on non-profiled deep-learning side-channel attacks against AES software implementation with two types of masking countermeasures including RSM Kunihiro KurodaYuta FukudaTakeshi Fujino Regular Paper Open access 27 March 2023 Pages: 427 - 442
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning Loïc MasureRémi Strullu Regular Paper 10 March 2023 Pages: 129 - 147
Fast verification and public key storage optimization for unstructured lattice-based signatures Jean-Claude BajardKazuhide FukushimaArnaud Sipasseuth Regular Paper 19 January 2023 Pages: 373 - 388
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities Guilhem LacombeDavid FeliotMarie-Laure Potet Regular Paper 18 January 2023 Pages: 147 - 164
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture Sumit Kumar DebnathSihem MesnagerNibedita Kundu Regular Paper 06 January 2023 Pages: 187 - 199
Spatial dependency analysis to extract information from side-channel mixtures: extended version Aurélien VasselleHugues ThiebeauldPhilippe Maurine Regular Paper 03 January 2023 Pages: 409 - 425
Streamlined NTRU Prime on FPGA Bo-Yuan PengAdrian MarotzkeHo-Lin Chen Regular Paper Open access 17 November 2022 Pages: 167 - 186
Toward finding best linear codes for side-channel protections (extended version) Wei ChengYi LiuOlivier Rioul Regular Paper 15 November 2022 Pages: 131 - 145
Isadora: automated information-flow property generation for hardware security verification Calvin DeutschbeinAndres MezaCynthia Sturton Regular Paper 11 November 2022 Pages: 391 - 407
The elliptic net algorithm revisited Shiping CaiZhi HuChang-An Zhao Regular Paper 04 November 2022 Pages: 43 - 55