Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA
Hong, Ruipeng, Zhang, Lei, Pan, Zhankun, Xiao, Chaoen, Wang, Jianxin
Published in Journal of cryptographic engineering (01.04.2025)
Published in Journal of cryptographic engineering (01.04.2025)
Get full text
Journal Article
Loading…
Optimization of the algorithm to compute the guaranteed number of activations in XS-circuits and its application to the analysis of block ciphers
Parfenov, Denis, Bakharev, Aleksandr, Kutsenko, Aleksandr, Belov, Aleksandr, Atutova, Natalia
Published in Journal of cryptographic engineering (01.04.2025)
Published in Journal of cryptographic engineering (01.04.2025)
Get full text
Journal Article
Loading…
Fault attack on Enocoro stream cipher family
Rostami, Saeed, Orumiehchiha, Mohammad Ali, Shakour, Elham, Alizadeh, Sadegh
Published in Journal of cryptographic engineering (01.04.2025)
Published in Journal of cryptographic engineering (01.04.2025)
Get full text
Journal Article
Loading…
MLFormer: a high performance MPC linear inference framework for transformers
Liu, Siqi, Liu, Zhusen, Chen, Donglong, Dai, Wangchen, Zhou, Lu, Liu, Zhe, Cheung, Ray C. C., Koç, Çetin Kaya
Published in Journal of cryptographic engineering (01.04.2025)
Published in Journal of cryptographic engineering (01.04.2025)
Get full text
Journal Article
Loading…
Loading…
Loading…
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor
Probst, Matthias, Tebelmann, Lars, Wettermann, Moritz, Pehl, Michael
Published in Journal of cryptographic engineering (01.04.2025)
Published in Journal of cryptographic engineering (01.04.2025)
Get full text
Journal Article
Loading…
Post-quantum hybrid key exchange: a systematic mapping study
Giron, Alexandre Augusto, Custódio, Ricardo, Rodríguez-Henríquez, Francisco
Published in Journal of cryptographic engineering (01.04.2023)
Published in Journal of cryptographic engineering (01.04.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures
Wagner, Alexander, Oberhansl, Felix, Schink, Marc
Published in Journal of cryptographic engineering (01.11.2024)
Published in Journal of cryptographic engineering (01.11.2024)
Get full text
Journal Article
Loading…
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations
Viera, Raphael, Dutertre, Jean-Max, Silva Lima, Rodrigo, Pommies, Matthieu, Bertrand, Anthony
Published in Journal of cryptographic engineering (01.06.2024)
Published in Journal of cryptographic engineering (01.06.2024)
Get full text
Journal Article
Loading…
Loading…
Selecting elliptic curves for cryptography: an efficiency and security analysis
Bos, Joppe W., Costello, Craig, Longa, Patrick, Naehrig, Michael
Published in Journal of cryptographic engineering (01.11.2016)
Published in Journal of cryptographic engineering (01.11.2016)
Get full text
Journal Article
Loading…
Loading…
CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler
Amro, Oswa, Mishra, Vishesh, Negi, Rohit, Chatterjee, Urbi
Published in Journal of cryptographic engineering (01.09.2024)
Published in Journal of cryptographic engineering (01.09.2024)
Get full text
Journal Article
Loading…
MOSFHET: Optimized Software for FHE over the Torus
Guimarães, Antonio, Borin, Edson, Aranha, Diego F.
Published in Journal of cryptographic engineering (01.09.2024)
Published in Journal of cryptographic engineering (01.09.2024)
Get full text
Journal Article
Loading…
Loading…