Loading…
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Ge, Qian, Yarom, Yuval, Cock, David, Heiser, Gernot
Published in Journal of cryptographic engineering (01.04.2018)
Published in Journal of cryptographic engineering (01.04.2018)
Get full text
Journal Article
Loading…
Deep learning for side-channel analysis and introduction to ASCAD database
Benadjila, Ryad, Prouff, Emmanuel, Strullu, Rémi, Cagli, Eleonora, Dumas, Cécile
Published in Journal of cryptographic engineering (01.06.2020)
Published in Journal of cryptographic engineering (01.06.2020)
Get full text
Journal Article
Loading…
A review of lightweight block ciphers
Hatzivasilis, George, Fysarakis, Konstantinos, Papaefstathiou, Ioannis, Manifavas, Charalampos
Published in Journal of cryptographic engineering (01.06.2018)
Published in Journal of cryptographic engineering (01.06.2018)
Get full text
Journal Article
Loading…
Charm: a framework for rapidly prototyping cryptosystems
Akinyele, Joseph A., Garman, Christina, Miers, Ian, Pagano, Matthew W., Rushanan, Michael, Green, Matthew, Rubin, Aviel D.
Published in Journal of cryptographic engineering (01.06.2013)
Published in Journal of cryptographic engineering (01.06.2013)
Get full text
Journal Article
Loading…
High-speed high-security signatures
Bernstein, Daniel J., Duif, Niels, Lange, Tanja, Schwabe, Peter, Yang, Bo-Yin
Published in Journal of cryptographic engineering (01.09.2012)
Published in Journal of cryptographic engineering (01.09.2012)
Get full text
Journal Article
Loading…
Applications of machine learning techniques in side-channel attacks: a survey
Hettwer, Benjamin, Gehrer, Stefan, Güneysu, Tim
Published in Journal of cryptographic engineering (01.06.2020)
Published in Journal of cryptographic engineering (01.06.2020)
Get full text
Journal Article
Loading…
Triathlon of lightweight block ciphers for the Internet of things
Dinu, Daniel, Corre, Yann Le, Khovratovich, Dmitry, Perrin, Léo, Großschädl, Johann, Biryukov, Alex
Published in Journal of cryptographic engineering (01.09.2019)
Published in Journal of cryptographic engineering (01.09.2019)
Get full text
Journal Article
Loading…
Introduction to differential power analysis
Kocher, Paul, Jaffe, Joshua, Jun, Benjamin, Rohatgi, Pankaj
Published in Journal of cryptographic engineering (01.04.2011)
Published in Journal of cryptographic engineering (01.04.2011)
Get full text
Journal Article
Loading…
CacheBleed: a timing attack on OpenSSL constant-time RSA
Yarom, Yuval, Genkin, Daniel, Heninger, Nadia
Published in Journal of cryptographic engineering (01.06.2017)
Published in Journal of cryptographic engineering (01.06.2017)
Get full text
Journal Article
Loading…
Loading…
Loading…
A novel non-profiled side channel attack based on multi-output regression neural network
Do, Ngoc-Tuan, Hoang, Van-Phuc, Doan, Van Sang
Published in Journal of cryptographic engineering (01.09.2024)
Published in Journal of cryptographic engineering (01.09.2024)
Get full text
Journal Article
Loading…
Machine learning in side-channel analysis: a first study
Hospodar, Gabriel, Gierlichs, Benedikt, De Mulder, Elke, Verbauwhede, Ingrid, Vandewalle, Joos
Published in Journal of cryptographic engineering (01.12.2011)
Published in Journal of cryptographic engineering (01.12.2011)
Get full text
Journal Article
Loading…
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA
Sideris, Argyrios, Sanida, Theodora, Dasygenis, Minas
Published in Journal of cryptographic engineering (01.06.2024)
Published in Journal of cryptographic engineering (01.06.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs
Hiller, Matthias, Kürzinger, Ludwig, Sigl, Georg
Published in Journal of cryptographic engineering (01.09.2020)
Published in Journal of cryptographic engineering (01.09.2020)
Get full text
Journal Article
Loading…
Fast polynomial inversion algorithms for the post-quantum cryptography
Seo, Eun-Young, Kim, Young-Sik, No, Jong-Seon
Published in Journal of cryptographic engineering (01.09.2025)
Published in Journal of cryptographic engineering (01.09.2025)
Get full text
Journal Article