Formal verification of a CRT-RSA implementation against fault attacks Maria ChristofiBoutheina ChetaliDavid Vigilant Special Section on PROOFS workshop 15 February 2013 Pages: 157 - 167
From cryptography to hardware: analyzing and protecting embedded Xilinx BRAM for cryptographic applications Shivam BhasinSylvain GuilleyJean-Luc Danger Regular Paper 01 February 2013 Pages: 213 - 225
Minimizing performance overhead in memory encryption Michael T. KurdzielMarcin LukowiakMichael A. Sanfilippo Regular Paper 26 January 2013 Pages: 129 - 138
Differential fault analysis of AES: towards reaching its limits Sk Subidh AliDebdeep MukhopadhyayMichael Tunstall Regular Paper 28 October 2012 Pages: 73 - 97
Variety enhancement of PUF responses using the locations of random outputting RS latches Dai YamamotoKazuo SakiyamaKouichi Itoh Regular Paper Open access 23 October 2012 Pages: 197 - 211
Scan attacks on side-channel and fault attack resistant public-key implementations Jean Da RoltAmitabh DasIngrid Verbauwhede Regular Paper 17 October 2012 Pages: 207 - 219
Co-\(Z\) ECC scalar multiplications for hardware, software and hardware–software co-design on embedded systems Brian BaldwinRaveen R. GoundarWilliam P. Marnane Regular Paper 16 October 2012 Pages: 221 - 240
A practical device authentication scheme using SRAM PUFs Patrick KoeberlJiangtao LiWei Wu Regular Paper 06 October 2012 Pages: 255 - 269
Improving cross-device attacks using zero-mean unit-variance normalization David P. MontminyRusty O. BaldwinEric D. Laspe Regular Paper 29 September 2012 Pages: 99 - 110
Parallelizing message schedules to accelerate the computations of hash functions Shay GueronVlad Krasnov Regular Paper 26 September 2012 Pages: 241 - 253
Analysis and experimental evaluation of image-based PUFs Saloomeh ShariatiFrançois-Xavier StandaertBenoit Macq Regular Paper 23 September 2012 Pages: 189 - 206
Side channels as building blocks Markus KasperAmir MoradiWayne Burleson Regular Paper 14 September 2012 Pages: 143 - 159
Analysis of performance versus security in hardware realizations of small elliptic curves for lightweight applications Vladimir Trujillo-OlayaTimothy SherwoodÇetin Kaya Koç Regular Paper 13 September 2012 Pages: 179 - 188
Pinpointing side-channel information leaks in web applications Luke MatherElisabeth Oswald Regular Paper 21 August 2012 Pages: 161 - 177
High-speed high-security signatures Daniel J. BernsteinNiels DuifBo-Yin Yang Regular Paper Open access 14 August 2012 Pages: 77 - 89
Sequential multiplier with sub-linear gate complexity M. Anwar HasanChristophe Negre Regular Paper 26 July 2012 Pages: 91 - 97
Protecting AES against side-channel analysis using wire-tap codes Julien BringerHervé ChabanneThanh Ha Le Regular Paper 24 June 2012 Pages: 129 - 141
Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols Thomas RocheEmmanuel Prouff Regular Paper 15 June 2012 Pages: 111 - 127
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure Sung-Ming YenChien-Ning ChenSangJae Moon Regular Paper 21 April 2012 Pages: 99 - 110
Efficient software implementations of modular exponentiation Shay Gueron Regular Paper 05 April 2012 Pages: 31 - 43
Portability of templates M. Abdelaziz ElaabidSylvain Guilley Regular Paper 01 April 2012 Pages: 63 - 74
Analysis of the algebraic side channel attack Claude CarletJean-Charles FaugèreGuénaël Renault Regular Paper 20 March 2012 Pages: 45 - 62
Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller Conrado P. L. GouvêaLeonardo B. OliveiraJulio López Regular Paper 03 March 2012 Pages: 19 - 29
An exploration of mechanisms for dynamic cryptographic instruction set extension P. GrabherJ. GroßschädlM. Wójcik Regular Paper 18 February 2012 Pages: 1 - 18
Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems Roberto AvanziSimon HoerderMichael Tunstall Erratum 11 January 2012 Pages: 75 - 75
Machine learning in side-channel analysis: a first study Gabriel HospodarBenedikt GierlichsJoos Vandewalle Regular Paper 27 October 2011 Pages: 293 - 302
An on-chip glitchy-clock generator for testing fault injection attacks Sho EndoTakeshi SugawaraAkashi Satoh Regular Paper 21 October 2011 Pages: 265 - 270
A tool for static detection of timing channels in Java Alexander LuxArtem Starostin Regular Paper 20 October 2011 Pages: 303 - 313
Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems Roberto AvanziSimon HoerderMichael Tunstall Regular Paper 19 October 2011 Pages: 271 - 281
A new method of black box power analysis and a fast algorithm for optimal key search Markus Dichtl Regular Paper 11 October 2011 Pages: 255 - 264
Message-aimed side channel and fault attacks against public key cryptosystems with homomorphic properties Falko Strenzke Regular Paper 04 October 2011 Pages: 283 - 292
Practical complexity differential cryptanalysis and fault analysis of AES Michael Tunstall Regular Paper 27 September 2011 Pages: 219 - 230
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction Jonathan TaverneArmando Faz-HernándezJulio López Regular Paper 25 September 2011 Pages: 187 - 199
Recyclable PUFs: logically reconfigurable PUFs Stefan KatzenbeisserÜnal KocabaşChristian Wachsmann Regular Paper 23 September 2011 Pages: 177 - 186
Extractors against side-channel attacks: weak or strong? Marcel MedwedFrançois-Xavier Standaert Regular Paper 30 August 2011 Pages: 231 - 241
High performance GHASH and impacts of a class of unconventional bases Nicolas MéloniChristophe NegreM. Anwar Hasan Regular Paper 30 August 2011 Pages: 201 - 218
Modulus fault attacks against RSA–CRT signatures Éric BrierDavid NaccacheMehdi Tibouchi Regular Paper 28 August 2011 Pages: 243 - 253
A fair evaluation framework for comparing side-channel distinguishers Carolyn WhitnallElisabeth Oswald Regular Paper 10 August 2011 Pages: 145 - 160
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic Raveen R. GoundarMarc JoyeAlexandre Venelli Regular Paper 09 August 2011 Pages: 161 - 176
Univariate side channel attacks and leakage modeling Julien DogetEmmanuel ProuffFrançois-Xavier Standaert Regular Paper 03 August 2011 Pages: 123 - 144
A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO Jean-Luc BeuchatEiji OkamotoTeppei Yamazaki Regular Paper 02 June 2011 Pages: 101 - 121
SPA-resistant binary exponentiation with optimal execution time Carlos MorenoM. Anwar Hasan Regular Paper 09 May 2011 Pages: 87 - 99
Introduction to the Journal of Cryptographic Engineering Çetin Kaya Koç Editorial 02 April 2011 Pages: 1 - 3
Introduction to differential power analysis Paul KocherJoshua JaffePankaj Rohatgi Regular Paper Open access 03 March 2011 Pages: 5 - 27
Synchronization method for SCA and fault attacks Sergei Skorobogatov Regular Paper 25 February 2011 Pages: 71 - 77
Harvesting the potential of nano-CMOS for lightweight cryptography: an ultra-low-voltage 65 nm AES coprocessor for passive RFID tags Cédric HocquetDina KamelFrançois-Xavier Standaert Regular Paper 18 February 2011 Pages: 79 - 86
Utilizing hard cores of modern FPGA devices for high-performance cryptography Tim Güneysu Regular Paper 11 February 2011 Pages: 37 - 55
Algorithm-level error detection for Montgomery ladder-based ECSM Agustin Dominguez-OviedoM. Anwar Hasan Regular Paper 10 February 2011 Pages: 57 - 69
A simple power analysis attack on a McEliece cryptoprocessor H. Gregor MolterMarc StöttingerFalko Strenzke Regular Paper 09 February 2011 Pages: 29 - 36