Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography Felix OberhanslTim FritzmannGeorg Sigl Regular Paper Open access 24 August 2023 Pages: 1 - 18
Restricted near collision attack on Plantlet Satyam KumarSandip Kumar MondalAvishek Adhikari Regular Paper 09 October 2023 Pages: 19 - 34
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures Leonardo A. D. S. RibeiroJosé Paulo da Silva LimaAndré L. M. Santos Regular Paper 16 October 2023 Pages: 35 - 41
The elliptic net algorithm revisited Shiping CaiZhi HuChang-An Zhao Regular Paper 04 November 2022 Pages: 43 - 55
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit Cuiping ShaoDongyan ZhaoLiuqing Yang Regular Paper 02 June 2023 Pages: 57 - 70
Probabilistic root finding in code-based cryptography Dúnia MarchioriRicardo CustódioLucia Moura Regular Paper 31 July 2023 Pages: 71 - 85
Complete group law for genus 2 Jacobians on Jacobian coordinates Elif Ozbay GurlerHuseyin Hisil Research Article Open access 16 April 2024 Pages: 87 - 101
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN Priyanka JoshiBodhisatwa Mazumdar Research Article 20 March 2024 Pages: 103 - 125
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing Dmitrii Koshelev Correction 17 August 2023 Pages: 127 - 128
Toward finding best linear codes for side-channel protections (extended version) Wei ChengYi LiuOlivier Rioul Regular Paper 15 November 2022 Pages: 131 - 145
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities Guilhem LacombeDavid FeliotMarie-Laure Potet Regular Paper 18 January 2023 Pages: 147 - 164
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version Tamon AsanoTakeshi Sugawara Regular Paper 20 June 2023 Pages: 165 - 180