Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.07",
%%%     date            = "17 November 2016",
%%%     time            = "07:34:08 MDT",
%%%     filename        = "jcryptoeng.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "64264 3273 12103 132337",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Journal of
%%%                        Cryptographic Engineering",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        Journal of Cryptographic Engineering (CODEN
%%%                        none, ISSN 2190-8508 (print), 2190-8516
%%%                        (electronic)), published by Springer.
%%%
%%%                        Publication began with volume 1, number 1, in
%%%                        2011, and the journal currently appears
%%%                        quarterly.
%%%
%%%                        The journal has World-Wide Web sites at
%%%
%%%                            http://link.springer.com/journal/13389
%%%                            http://link.springer.com/journal/volumesAndIssues/13389
%%%                            http://www.springer.com/computer/security+and+cryptology/journal/13389
%%%
%%%                        At version 1.07, the year coverage looked
%%%                        like this:
%%%
%%%                             2011 (  28)    2013 (  22)    2015 (  21)
%%%                             2012 (  23)    2014 (  24)    2016 (  23)
%%%
%%%                             Article:        141
%%%
%%%                             Total entries:  141
%%%
%%%                        Data for the bibliography have been collected
%%%                        primarily from the publisher Web site.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume''.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
    "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-CRYPTO-ENG          = "Journal of Cryptographic Engineering"}

%%% ====================================================================
%%% Bibliography entries, in publication order:
@Article{Koc:2011:IBC,
  author =       "{\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Introduction to the {{\booktitle{Journal of
                 Cryptographic Engineering}}}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "1--3",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0007-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://cs.ucsb.edu/~koc/docs/j75.pdf;
                 http://link.springer.com/article/10.1007/s13389-011-0007-x;
                 http://link.springer.com/content/pdf/10.1007/s13389-011-0007-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kocher:2011:IDP,
  author =       "Paul Kocher and Joshua Jaffe and Benjamin Jun and
                 Pankaj Rohatgi",
  title =        "Introduction to differential power analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "5--27",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0006-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0006-y;
                 http://link.springer.com/content/pdf/10.1007/s13389-011-0006-y.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Molter:2011:SPA,
  author =       "H. Gregor Molter and Marc St{\"o}ttinger and Abdulhadi
                 Shoufan and Falko Strenzke",
  title =        "A simple power analysis attack on a {McEliece}
                 cryptoprocessor",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "29--36",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0001-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0001-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guneysu:2011:UHC,
  author =       "Tim G{\"u}neysu",
  title =        "Utilizing hard cores of modern {FPGA} devices for
                 high-performance cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "37--55",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0002-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0002-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dominguez-Oviedo:2011:ALE,
  author =       "Agustin Dominguez-Oviedo and M. Anwar Hasan",
  title =        "Algorithm-level error detection for {Montgomery}
                 ladder-based {ECSM}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "57--69",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0003-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0003-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Skorobogatov:2011:SMS,
  author =       "Sergei Skorobogatov",
  title =        "Synchronization method for {SCA} and fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "71--77",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0004-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0004-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hocquet:2011:HPN,
  author =       "C{\'e}dric Hocquet and Dina Kamel and Francesco
                 Regazzoni and Jean-Didier Legat and Denis Flandre and
                 David Bol and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Harvesting the potential of nano-{CMOS} for
                 lightweight cryptography: an ultra-low-voltage 65 nm
                 {AES} coprocessor for passive {RFID} tags",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "79--86",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0005-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0005-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "1",
  pages =        "??--??",
  month =        apr,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:30 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Moreno:2011:SRB,
  author =       "Carlos Moreno and M. Anwar Hasan",
  title =        "{SPA}-resistant binary exponentiation with optimal
                 execution time",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "87--99",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0008-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0008-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Beuchat:2011:LAU,
  author =       "Jean-Luc Beuchat and Eiji Okamoto and Teppei
                 Yamazaki",
  title =        "A low-area unified hardware architecture for the {AES}
                 and the cryptographic hash function {ECHO}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "101--121",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0009-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0009-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Doget:2011:USC,
  author =       "Julien Doget and Emmanuel Prouff and Matthieu Rivain
                 and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Univariate side channel attacks and leakage modeling",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "123--144",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0010-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0010-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Whitnall:2011:FEF,
  author =       "Carolyn Whitnall and Elisabeth Oswald",
  title =        "A fair evaluation framework for comparing side-channel
                 distinguishers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "145--160",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0011-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0011-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Goundar:2011:SMW,
  author =       "Raveen R. Goundar and Marc Joye and Atsuko Miyaji and
                 Matthieu Rivain and Alexandre Venelli",
  title =        "Scalar multiplication on {Weierstra{\ss}} elliptic
                 curves from Co-{$Z$} arithmetic",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "161--176",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0012-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0012-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "2",
  pages =        "??--??",
  month =        aug,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Katzenbeisser:2011:RPL,
  author =       "Stefan Katzenbeisser and {\"U}nal Kocaba{\v{s}} and
                 Vincent van der Leest and Ahmad-Reza Sadeghi and
                 Geert-Jan Schrijen and Christian Wachsmann",
  title =        "Recyclable {PUFs}: logically reconfigurable {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "177--186",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0016-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0016-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Taverne:2011:SSM,
  author =       "Jonathan Taverne and Armando Faz-Hern{\'a}ndez and
                 Diego F. Aranha and Francisco
                 Rodr{\'\i}guez-Henr{\'\i}quez and Darrel Hankerson and
                 Julio L{\'o}pez",
  title =        "Speeding scalar multiplication over binary elliptic
                 curves using the new carry-less multiplication
                 instruction",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "187--199",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0017-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0017-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Meloni:2011:HPG,
  author =       "Nicolas M{\'e}loni and Christophe Negre and M. Anwar
                 Hasan",
  title =        "High performance {GHASH} and impacts of a class of
                 unconventional bases",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "201--218",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0013-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0013-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Tunstall:2011:PCD,
  author =       "Michael Tunstall",
  title =        "Practical complexity differential cryptanalysis and
                 fault analysis of {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "219--230",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0018-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0018-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Medwed:2011:EAS,
  author =       "Marcel Medwed and Fran{\c{c}}ois-Xavier Standaert",
  title =        "Extractors against side-channel attacks: weak or
                 strong?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "231--241",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0014-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0014-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Brier:2011:MFA,
  author =       "{\'E}ric Brier and David Naccache and Phong Q. Nguyen
                 and Mehdi Tibouchi",
  title =        "Modulus fault attacks against {RSA--CRT} signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "243--253",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0015-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0015-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "3",
  pages =        "??--??",
  month =        nov,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:31 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Dichtl:2011:NMB,
  author =       "Markus Dichtl",
  title =        "A new method of black box power analysis and a fast
                 algorithm for optimal key search",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "255--264",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0019-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0019-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Endo:2011:CGC,
  author =       "Sho Endo and Takeshi Sugawara and Naofumi Homma and
                 Takafumi Aoki and Akashi Satoh",
  title =        "An on-chip glitchy-clock generator for testing fault
                 injection attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "265--270",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0022-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0022-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Avanzi:2011:SCA,
  author =       "Roberto Avanzi and Simon Hoerder and Dan Page and
                 Michael Tunstall",
  title =        "Side-channel attacks on the {McEliece} and
                 {Niederreiter} public-key cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "271--281",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0024-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See erratum \cite{Avanzi:2012:ESC}.",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0024-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Strenzke:2011:MAS,
  author =       "Falko Strenzke",
  title =        "Message-aimed side channel and fault attacks against
                 public key cryptosystems with homomorphic properties",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "283--292",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0020-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0020-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hospodar:2011:MLS,
  author =       "Gabriel Hospodar and Benedikt Gierlichs and Elke {De
                 Mulder} and Ingrid Verbauwhede and Joos Vandewalle",
  title =        "Machine learning in side-channel analysis: a first
                 study",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "293--302",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0023-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0023-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lux:2011:TSD,
  author =       "Alexander Lux and Artem Starostin",
  title =        "A tool for static detection of timing channels in
                 {Java}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "303--313",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0021-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0021-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2011:HCd,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "1",
  number =       "4",
  pages =        "??--??",
  month =        dec,
  year =         "2011",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Grabher:2012:EMD,
  author =       "P. Grabher and J. Gro{\ss}sch{\"a}dl and S. Hoerder
                 and K. J{\"a}rvinen and D. Page and S. Tillich and M.
                 W{\'o}jcik",
  title =        "An exploration of mechanisms for dynamic cryptographic
                 instruction set extension",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "1--18",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0025-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0025-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gouvea:2012:ESI,
  author =       "Conrado P. L. Gouv{\^e}a and Leonardo B. Oliveira and
                 Julio L{\'o}pez",
  title =        "Efficient software implementation of public-key
                 cryptography on sensor networks using the {MSP430X}
                 microcontroller",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "19--29",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0029-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0029-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gueron:2012:ESI,
  author =       "Shay Gueron",
  title =        "Efficient software implementations of modular
                 exponentiation",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "31--43",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0031-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0031-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carlet:2012:AAS,
  author =       "Claude Carlet and Jean-Charles Faug{\`e}re and
                 Christopher Goyet and Gu{\'e}na{\"e}l Renault",
  title =        "Analysis of the algebraic side channel attack",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "45--62",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0028-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0028-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Elaabid:2012:PT,
  author =       "M. Abdelaziz Elaabid and Sylvain Guilley",
  title =        "Portability of templates",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "63--74",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0030-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0030-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Avanzi:2012:ESC,
  author =       "Roberto Avanzi and Simon Hoerder and Dan Page and
                 Michael Tunstall",
  title =        "Erratum to: Side-channel attacks on the {McEliece} and
                 {Niederreiter} public-key cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "75--75",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-011-0026-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  note =         "See \cite{Avanzi:2011:SCA}.",
  URL =          "http://link.springer.com/article/10.1007/s13389-011-0026-7;
                 http://link.springer.com/content/pdf/10.1007/s13389-011-0026-7.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2012:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "1",
  pages =        "??--??",
  month =        may,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bernstein:2012:HSH,
  author =       "Daniel J. Bernstein and Niels Duif and Tanja Lange and
                 Peter Schwabe and Bo-Yin Yang",
  title =        "High-speed high-security signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "77--89",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0027-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0027-1;
                 http://link.springer.com/content/pdf/10.1007/s13389-012-0027-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hasan:2012:SMS,
  author =       "M. Anwar Hasan and Christophe Negre",
  title =        "Sequential multiplier with sub-linear gate
                 complexity",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "91--97",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0035-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0035-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yen:2012:MEA,
  author =       "Sung-Ming Yen and Chien-Ning Chen and SangJae Moon",
  title =        "Multi-exponentiation algorithm based on binary {GCD}
                 computation and its application to side-channel
                 countermeasure",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "99--110",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0032-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0032-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Roche:2012:HOG,
  author =       "Thomas Roche and Emmanuel Prouff",
  title =        "Higher-order glitch free implementation of the {AES}
                 using {Secure Multi--Party Computation} protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "111--127",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0033-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0033-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bringer:2012:PAA,
  author =       "Julien Bringer and Herv{\'e} Chabanne and Thanh Ha
                 Le",
  title =        "Protecting {AES} against side-channel analysis using
                 wire-tap codes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "129--141",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0034-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0034-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2012:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "2",
  pages =        "??--??",
  month =        sep,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:32 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kasper:2012:SCB,
  author =       "Markus Kasper and Amir Moradi and Georg T. Becker and
                 Oliver Mischke and Tim G{\"u}neysu and Christof Paar
                 and Wayne Burleson",
  title =        "Side channels as building blocks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "143--159",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0040-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0040-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mather:2012:PSC,
  author =       "Luke Mather and Elisabeth Oswald",
  title =        "Pinpointing side-channel information leaks in web
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "161--177",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0036-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0036-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Trujillo-Olaya:2012:APV,
  author =       "Vladimir Trujillo-Olaya and Timothy Sherwood and
                 {\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Analysis of performance versus security in hardware
                 realizations of small elliptic curves for lightweight
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "179--188",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0039-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0039-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Shariati:2012:AEE,
  author =       "Saloomeh Shariati and Fran{\c{c}}ois-Xavier Standaert
                 and Laurent Jacques and Benoit Macq",
  title =        "Analysis and experimental evaluation of image-based
                 {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "189--206",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0041-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0041-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2012:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "3",
  pages =        "??--??",
  month =        oct,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rolt:2012:SAS,
  author =       "Jean Da Rolt and Amitabh Das and Santosh Ghosh and
                 Giorgio {Di Natale} and Marie-Lise Flottes and Bruno
                 Rouzeyre and Ingrid Verbauwhede",
  title =        "Scan attacks on side-channel and fault attack
                 resistant public-key implementations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "207--219",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0045-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0045-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Baldwin:2012:CES,
  author =       "Brian Baldwin and Raveen R. Goundar and Mark Hamilton
                 and William P. Marnane",
  title =        "Co-{$Z$} {ECC} scalar multiplications for hardware,
                 software and hardware-software co-design on embedded
                 systems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "221--240",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0042-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0042-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gueron:2012:PMS,
  author =       "Shay Gueron and Vlad Krasnov",
  title =        "Parallelizing message schedules to accelerate the
                 computations of hash functions",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "241--253",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0037-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0037-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Koeberl:2012:PDA,
  author =       "Patrick Koeberl and Jiangtao Li and Roel Maes and
                 Anand Rajan and Claire Vishik and Marcin W{\'o}jcik and
                 Wei Wu",
  title =        "A practical device authentication scheme using {SRAM}
                 {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "255--269",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0043-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0043-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2012:HCd,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "2",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "2012",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:33 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Prouff:2013:ICS,
  author =       "Emmanuel Prouff and Patrick Schaumont",
  title =        "Introduction to the {CHES 2012} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "1--1",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0055-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0055-5;
                 http://link.springer.com/content/pdf/10.1007/s13389-013-0055-5.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schlosser:2013:SPE,
  author =       "Alexander Schl{\"o}sser and Dmitry Nedospasov and
                 Juliane Kr{\"a}mer and Susanna Orlic and Jean-Pierre
                 Seifert",
  title =        "Simple photonic emission analysis of {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "3--15",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0053-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0053-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ruhrmair:2013:PUP,
  author =       "Ulrich R{\"u}hrmair and Marten van Dijk",
  title =        "On the practical use of physical unclonable functions
                 in oblivious transfer and bit commitment protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "17--28",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0052-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0052-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Heyse:2013:CBC,
  author =       "Stefan Heyse and Tim G{\"u}neysu",
  title =        "Code-based cryptography on reconfigurable hardware:
                 tweaking {Niederreiter} encryption for performance",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "29--43",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0056-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0056-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gerard:2013:UOL,
  author =       "Beno{\^\i}t G{\'e}rard and Fran{\c{c}}ois-Xavier
                 Standaert",
  title =        "Unified and optimized linear collision attacks and
                 their application in a non-profiled setting: extended
                 version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "45--58",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0051-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0051-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Fouque:2013:ARC,
  author =       "Pierre-Alain Fouque and Nicolas Guillermin and
                 Delphine Leresteux and Mehdi Tibouchi and
                 Jean-Christophe Zapalowicz",
  title =        "Attacking {RSA--CRT} signatures with faults on
                 {Montgomery} multiplication",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "59--72",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0050-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0050-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "1",
  pages =        "??--??",
  month =        apr,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ali:2013:DFA,
  author =       "Sk Subidh Ali and Debdeep Mukhopadhyay and Michael
                 Tunstall",
  title =        "Differential fault analysis of {AES}: towards reaching
                 its limits",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "73--97",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0046-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0046-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Montminy:2013:ICD,
  author =       "David P. Montminy and Rusty O. Baldwin and Michael A.
                 Temple and Eric D. Laspe",
  title =        "Improving cross-device attacks using zero-mean
                 unit-variance normalization",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "99--110",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0038-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0038-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Akinyele:2013:CFR,
  author =       "Joseph A. Akinyele and Christina Garman and Ian Miers
                 and Matthew W. Pagano and Michael Rushanan and Matthew
                 Green and Aviel D. Rubin",
  title =        "{Charm}: a framework for rapidly prototyping
                 cryptosystems",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "111--128",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0057-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0057-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kurdziel:2013:MPO,
  author =       "Michael T. Kurdziel and Marcin Lukowiak and Michael A.
                 Sanfilippo",
  title =        "Minimizing performance overhead in memory encryption",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "129--138",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0047-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0047-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Mohamed:2013:IAS,
  author =       "Mohamed Saied Emam Mohamed and Stanislav Bulygin and
                 Michael Zohner and Annelie Heuser and Michael Walter
                 and Johannes Buchmann",
  title =        "Improved algebraic side-channel attack on {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "139--156",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0059-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0059-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Christofi:2013:FVC,
  author =       "Maria Christofi and Boutheina Chetali and Louis Goubin
                 and David Vigilant",
  title =        "Formal verification of a {CRT--RSA} implementation
                 against fault attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "157--167",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0049-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0049-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Briais:2013:FST,
  author =       "S{\'e}bastien Briais and Jean-Luc Danger and Sylvain
                 Guilley",
  title =        "A formal study of two physical countermeasures against
                 side channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "169--180",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0054-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0054-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Brown:2013:TTC,
  author =       "Mark Brown",
  title =        "Toward a taxonomy of communications security models",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "181--195",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0058-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0058-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:34 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yamamoto:2013:VEP,
  author =       "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
                 and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh",
  title =        "Variety enhancement of {PUF} responses using the
                 locations of random outputting {RS} latches",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "197--211",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-012-0044-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-012-0044-0;
                 http://link.springer.com/content/pdf/10.1007/s13389-012-0044-0.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bhasin:2013:CHA,
  author =       "Shivam Bhasin and Sylvain Guilley and Annelie Heuser
                 and Jean-Luc Danger",
  title =        "From cryptography to hardware: analyzing and
                 protecting embedded {Xilinx} {BRAM} for cryptographic
                 applications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "213--225",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0048-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0048-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kamal:2013:SHI,
  author =       "Abdel Alim Kamal and Amr M. Youssef",
  title =        "Strengthening hardware implementations of
                 {NTRUEncrypt} against fault analysis attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "227--240",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0061-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0061-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Danger:2013:SSC,
  author =       "Jean-Luc Danger and Sylvain Guilley and Philippe
                 Hoogvorst and C{\'e}dric Murdica and David Naccache",
  title =        "A synthesis of side-channel attacks on elliptic curve
                 cryptography in smart-cards",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "241--265",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0062-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0062-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2013:HCd,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "3",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "2013",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bertoni:2014:ICS,
  author =       "Guido Bertoni and Jean-S{\'e}bastien Coron",
  title =        "Introduction to the {CHES 2013} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "1--1",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0076-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0076-8;
                 http://link.springer.com/content/pdf/10.1007/s13389-014-0076-8.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Oliveira:2014:TFP,
  author =       "Thomaz Oliveira and Julio L{\'o}pez and Diego F.
                 Aranha and Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
  title =        "Two is the fastest prime: lambda coordinates for
                 binary elliptic curves",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "3--17",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0069-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0069-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Becker:2014:SDL,
  author =       "Georg T. Becker and Francesco Regazzoni and Christof
                 Paar and Wayne P. Burleson",
  title =        "Stealthy dopant-level hardware {Trojans}: extended
                 version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "19--31",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0068-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0068-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{DeMulder:2014:UBS,
  author =       "Elke {De Mulder} and Michael Hutter and Mark E. Marson
                 and Peter Pearson",
  title =        "Using {Bleichenbacher}'s solution to the hidden number
                 problem to attack nonce leaks in $ 384$-bit {ECDSA}:
                 extended version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "33--45",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0072-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0072-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Grosso:2014:MVM,
  author =       "Vincent Grosso and Fran{\c{c}}ois-Xavier Standaert and
                 Sebastian Faust",
  title =        "Masking vs. multiparty computation: how large is the
                 gap for {AES}?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "47--57",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0073-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0073-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sugawara:2014:MSC,
  author =       "Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki
                 and Mitsuru Shiozaki and Takeshi Fujino",
  title =        "On measurable side-channel leaks inside {ASIC} design
                 primitives",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "59--73",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0078-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0078-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HCa,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "1",
  pages =        "??--??",
  month =        apr,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:35 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Almeida:2014:LPB,
  author =       "Leonardo C. Almeida and Ewerton R. Andrade and Paulo
                 S. L. M. Barreto and Marcos A. {Simplicio, Jr.}",
  title =        "{Lyra}: password-based key derivation with tunable
                 memory and processing costs",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "75--89",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0063-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0063-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Negre:2014:EBP,
  author =       "Chistophe Negre",
  title =        "Efficient binary polynomial multiplication based on
                 optimized {Karatsuba} reconstruction",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "91--106",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0066-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0066-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Carlet:2014:ASC,
  author =       "Claude Carlet and Jean-Luc Danger and Sylvain Guilley
                 and Emmanuel Prouff Houssem Maghrebi",
  title =        "Achieving side-channel high-order correlation immunity
                 with leakage squeezing",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "107--121",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0067-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0067-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Biasi:2014:SEC,
  author =       "Felipe P. Biasi and Paulo S. L. M. Barreto and Rafael
                 Misoczki and Wilson V. Ruggiero",
  title =        "Scaling efficient code-based cryptosystems for
                 embedded platforms",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "123--134",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0070-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0070-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Paul:2014:DSC,
  author =       "Goutam Paul and Anupam Chattopadhyay",
  title =        "Designing stream ciphers with scalable data-widths: a
                 case study with {HC-128}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "135--143",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0071-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0071-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HCb,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "2",
  pages =        "??--??",
  month =        jun,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Moro:2014:FVS,
  author =       "N. Moro and K. Heydemann and E. Encrenaz and B.
                 Robisson",
  title =        "Formal verification of a software countermeasure
                 against instruction skip attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "145--156",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0077-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0077-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Belaid:2014:TFR,
  author =       "Sonia Bela{\"\i}d and Fabrizio {De Santis} and Johann
                 Heyszl and Stefan Mangard and Marcel Medwed and
                 J{\o}rn-Marc Schmidt and Fran{\c{c}}ois-Xavier
                 Standaert and Stefan Tillich",
  title =        "Towards fresh re-keying with leakage-resilient {PRFs}:
                 cipher design principles and analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "157--171",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0079-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0079-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rauzy:2014:FPC,
  author =       "Pablo Rauzy and Sylvain Guilley",
  title =        "A formal proof of countermeasures against fault
                 injection attacks on {CRT--RSA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "173--185",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0065-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0065-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Kamel:2014:ULI,
  author =       "Dina Kamel and Mathieu Renauld and Denis Flandre and
                 Fran{\c{c}}ois-Xavier Standaert",
  title =        "Understanding the limitations and improving the
                 relevance of {SPICE} simulations in side-channel
                 security evaluations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "187--195",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0080-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0080-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Tiran:2014:MLF,
  author =       "S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and
                 P. Maurine",
  title =        "A model of the leakage in the frequency domain and its
                 application to {CPA} and {DPA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "197--212",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0074-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0074-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HCc,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "3",
  pages =        "??--??",
  month =        sep,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Wed Aug 20 18:51:36 MDT 2014",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schindler:2014:PAP,
  author =       "Werner Schindler and Andreas Wiemers",
  title =        "Power attacks in the presence of exponent blinding",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "213--236",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0081-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0081-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Karati:2014:NAB,
  author =       "Sabyasachi Karati and Abhijit Das and Dipanwita
                 Roychowdhury and Bhargav Bellur and Debojyoti
                 Bhattacharya and Aravind Iyer",
  title =        "New algorithms for batch verification of standard
                 {ECDSA} signatures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "237--258",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0082-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0082-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Clavier:2014:PIS,
  author =       "Christophe Clavier and Jean-Luc Danger and Guillaume
                 Duc and M. Abdelaziz Elaabid and Beno{\^\i}t G{\'e}rard
                 and Sylvain Guilley and Annelie Heuser and Michael
                 Kasper and Yang Li and Victor Lomn{\'e} and Daisuke
                 Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent
                 Sauvage and Werner Schindler and et al",
  title =        "Practical improvements of side-channel attacks on
                 {AES}: feedback from the 2nd {DPA} contest",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "259--274",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0075-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0075-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bos:2014:CTM,
  author =       "Joppe W. Bos",
  title =        "Constant time modular inversion",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "275--281",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0084-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0084-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Anonymous:2014:HC,
  author =       "Anonymous",
  title =        "Help \& Contacts",
  journal =      j-J-CRYPTO-ENG,
  volume =       "4",
  number =       "4",
  pages =        "??--??",
  month =        nov,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Tue Feb 10 08:19:07 MST 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Templin:2015:NPA,
  author =       "Joshua R. Templin and Jason R. Hamlet",
  title =        "A new power-aware {FPGA} design metric",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "1--11",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-013-0060-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-013-0060-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Banik:2015:IDF,
  author =       "Subhadeep Banik and Subhamoy Maitra and Santanu
                 Sarkar",
  title =        "Improved differential fault attack on {MICKEY 2.0}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "13--29",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0083-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0083-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Faz-Hernandez:2015:ESA,
  author =       "Armando Faz-Hern{\'a}ndez and Patrick Longa and Ana H.
                 S{\'a}nchez",
  title =        "Efficient and secure algorithms for {GLV}-based scalar
                 multiplication and their implementation on {GLV--GLS}
                 curves (extended version)",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "31--52",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0085-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0085-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{OFlynn:2015:SSC,
  author =       "Colin O'Flynn and Zhizhang Chen",
  title =        "Synchronous sampling and clock recovery of internal
                 oscillators for side channel analysis and fault
                 injection",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "1",
  pages =        "53--69",
  month =        apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0087-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0087-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Batina:2015:ICS,
  author =       "Lejla Batina and M. J. B. Robshaw",
  title =        "Introduction to the {CHES 2014} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "71--72",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0098-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0098-x;
                 http://link.springer.com/content/pdf/10.1007/s13389-015-0098-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Coron:2015:FEP,
  author =       "Jean-S{\'e}bastien Coron and Arnab Roy and Srinivas
                 Vivek",
  title =        "Fast evaluation of polynomials over binary finite
                 fields and application to side-channel
                 countermeasures",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "73--83",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0099-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0099-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Sugawara:2015:RSD,
  author =       "Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii
                 and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki
                 and Takeshi Fujino",
  title =        "Reversing stealthy dopant-level circuits",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "85--94",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0102-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0102-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Genkin:2015:GYH,
  author =       "Daniel Genkin and Itamar Pipman and Eran Tromer",
  title =        "Get your hands off my laptop: physical side-channel
                 key-extraction attacks on {PCs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "95--112",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0100-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0100-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Vliegen:2015:PFE,
  author =       "Jo Vliegen and Nele Mentens and Dirk Koch and Dries
                 Schellekens and Ingrid Verbauwhede",
  title =        "Practical feasibility evaluation and improvement of a
                 pay-per-use licensing scheme for hardware {IP} cores in
                 {Xilinx} {FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "113--122",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0088-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0088-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lerman:2015:MLA,
  author =       "Liran Lerman and Gianluca Bontempi and Olivier
                 Markowitch",
  title =        "A machine learning approach against a masked {AES}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "123--139",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0089-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0089-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Gueron:2015:FPF,
  author =       "Shay Gueron and Vlad Krasnov",
  title =        "Fast prime field elliptic-curve cryptography with $
                 256$-bit primes",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "2",
  pages =        "141--151",
  month =        jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0090-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0090-x",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guo:2015:SAC,
  author =       "Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin
                 and Ramesh Karri",
  title =        "Security analysis of concurrent error detection
                 against differential fault analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "153--169",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0092-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0092-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Perin:2015:VHC,
  author =       "Guilherme Perin and Laurent Imbert and Philippe
                 Maurine and Lionel Torres",
  title =        "Vertical and horizontal correlation attacks on
                 {RNS}-based exponentiations",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "171--185",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0095-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0095-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Yamamoto:2015:NME,
  author =       "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
                 and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh
                 and Naoya Torii",
  title =        "A new method for enhancing variety and maintaining
                 reliability of {PUF} responses and its evaluation on
                 {ASICs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "187--199",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-014-0091-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-014-0091-9",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hutter:2015:MMA,
  author =       "Michael Hutter and Peter Schwabe",
  title =        "Multiprecision multiplication on {AVR} revisited",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "201--214",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0093-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/fparith.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0093-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "AVR ATmega 8-bit microcontroller; Karatsuba
                 multiplication; microcontroller; multiple-precision
                 multiplication",
}

@Article{Bluhm:2015:FSI,
  author =       "Manuel Bluhm and Shay Gueron",
  title =        "Fast software implementation of binary elliptic curve
                 cryptography",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "3",
  pages =        "215--226",
  month =        sep,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0094-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Sat Aug 8 10:42:46 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0094-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
  keywords =     "Binary elliptic curve; Binary field arithmetic; ECDHE;
                 ECDSA; Intel AVX pclmulqdq instruction; Mul\&add;
                 Scalar multiplication; Side-channel protection",
}

@Article{Fei:2015:SBS,
  author =       "Yunsi Fei and A. Adam Ding and Jian Lao and Liwei
                 Zhang",
  title =        "A statistics-based success rate model for {DPA} and
                 {CPA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "227--243",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0107-0",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0107-0",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Hamlet:2015:TOI,
  author =       "Jason R. Hamlet and Robert W. Brocato",
  title =        "Throughput-optimized implementations of {QUAD}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "245--254",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0109-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0109-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lerman:2015:BVD,
  author =       "Liran Lerman and Gianluca Bontempi and Olivier
                 Markowitch",
  title =        "The bias-variance decomposition in profiled attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "255--267",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0106-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0106-1",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bongiovanni:2015:DVT,
  author =       "Simone Bongiovanni and Francesco Centurelli and
                 Giuseppe Scotti and Alessandro Trifiletti",
  title =        "Design and validation through a frequency-based metric
                 of a new countermeasure to protect nanometer {ICs} from
                 side-channel attacks",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "269--288",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0096-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0096-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Cenk:2015:SNR,
  author =       "Murat Cenk and M. Anwar Hasan",
  title =        "Some new results on binary polynomial multiplication",
  journal =      j-J-CRYPTO-ENG,
  volume =       "5",
  number =       "4",
  pages =        "289--303",
  month =        nov,
  year =         "2015",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0101-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Oct 19 14:22:58 MDT 2015",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0101-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Konheim:2016:ATM,
  author =       "Alan G. Konheim",
  title =        "Automated teller machines: their history and
                 authentication protocols",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "1--29",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0104-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0104-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Aldaya:2016:ABT,
  author =       "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
                 Sarmiento and Santiago S{\'a}nchez-Solano",
  title =        "{AES T-Box} tampering attack",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "31--48",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0103-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0103-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ferradi:2016:WOC,
  author =       "Houda Ferradi and R{\'e}mi G{\'e}raud and David
                 Naccache and Assia Tria",
  title =        "When organized crime applies academic results: a
                 forensic analysis of an in-card listening device",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "49--59",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0112-3",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0112-3",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bayon:2016:FME,
  author =       "Pierre Bayon and Lilian Bossuet and Alain Aubert and
                 Viktor Fischer",
  title =        "Fault model of electromagnetic attacks targeting ring
                 oscillator-based true random number generators",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "61--74",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0113-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0113-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Saarinen:2016:BAC,
  author =       "Markku-Juhani O. Saarinen",
  title =        "The {BRUTUS} automatic cryptanalytic framework",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "1",
  pages =        "75--82",
  month =        apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0114-1",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Apr 7 09:34:40 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-015-0114-1;
                 http://link.springer.com/content/pdf/10.1007/s13389-015-0114-1.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Guneysu:2016:ICS,
  author =       "Tim G{\"u}neysu and Helena Handschuh",
  title =        "Introduction to the {CHES 2015} special issue",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "83--84",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0130-9",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0130-9;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0130-9.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schneider:2016:LAM,
  author =       "Tobias Schneider and Amir Moradi",
  title =        "Leakage assessment methodology",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "85--99",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0120-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0120-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Schindler:2016:EEB,
  author =       "Werner Schindler",
  title =        "Exclusive exponent blinding is not enough to prevent
                 any timing attack on {RSA}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "101--119",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0124-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0124-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Maes:2016:SKG,
  author =       "Roel Maes and Vincent van der Leest and Erik van der
                 Sluis and Frans Willems",
  title =        "Secure key generation from biased {PUFs}: extended
                 version",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "121--137",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0125-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0125-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Reparaz:2016:MRL,
  author =       "Oscar Reparaz and Sujoy Sinha Roy and Ruan de Clercq
                 and Frederik Vercauteren and Ingrid Verbauwhede",
  title =        "Masking ring-{LWE}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "139--153",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0126-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0126-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Coisel:2016:ICD,
  author =       "Iwen Coisel and Ignacio Sanchez",
  title =        "Improved cryptanalysis of the {DECT} standard cipher",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "2",
  pages =        "155--169",
  month =        jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0127-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon May 30 07:49:01 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0127-4;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0127-4.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Lemire:2016:FBU,
  author =       "Daniel Lemire and Owen Kaser",
  title =        "Faster $ 64$-bit universal hashing using carry-less
                 multiplications",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "171--185",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0110-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/hash.bib;
                 http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0110-5;
                 http://link.springer.com/article/10.1007/s13389-015-0110-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Goundar:2016:IFA,
  author =       "Raveen R. Goundar and Marc Joye",
  title =        "Inversion-free arithmetic on elliptic curves through
                 isomorphisms",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "187--199",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0131-8",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0131-8;
                 http://link.springer.com/article/10.1007/s13389-016-0131-8",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Rauzy:2016:FPS,
  author =       "Pablo Rauzy and Sylvain Guilley and Zakaria Najm",
  title =        "Formally proved security of assembly code against
                 power analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "201--216",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0105-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0105-2;
                 http://link.springer.com/article/10.1007/s13389-015-0105-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Robisson:2016:PFC,
  author =       "Bruno Robisson and H{\'e}l{\`e}ne {Le Bouder}",
  title =        "Physical functions: the common factor of side-channel
                 and fault attacks?",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "217--227",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0111-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0111-4;
                 http://link.springer.com/article/10.1007/s13389-015-0111-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Galindo:2016:ILR,
  author =       "David Galindo and Johann Gro{\ss}sch{\"a}dl and Zhe
                 Liu and Praveen Kumar Vadnala and Srinivas Vivek",
  title =        "Implementation of a leakage-resilient {ElGamal} key
                 encapsulation mechanism",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "229--238",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0121-x",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/article/10.1007/s13389-016-0121-x;
                 http://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ngo:2016:MTA,
  author =       "Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and
                 Sylvain Guilley and Jean-Luc Danger",
  title =        "Method taking into account process dispersion to
                 detect hardware {Trojan Horse} by side-channel
                 analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "239--247",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0129-2",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0129-2;
                 http://link.springer.com/article/10.1007/s13389-016-0129-2",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ganji:2016:PLA,
  author =       "Fatemeh Ganji and Shahin Tajik and Jean-Pierre
                 Seifert",
  title =        "{PAC} learning of arbiter {PUFs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "3",
  pages =        "249--258",
  month =        sep,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0119-4",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Mon Sep 12 08:05:12 MDT 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0119-4;
                 http://link.springer.com/article/10.1007/s13389-016-0119-4",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Bos:2016:SEC,
  author =       "Joppe W. Bos and Craig Costello and Patrick Longa and
                 Michael Naehrig",
  title =        "Selecting elliptic curves for cryptography: an
                 efficiency and security analysis",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "259--286",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0097-y",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0097-y;
                 http://link.springer.com/article/10.1007/s13389-015-0097-y",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Wenger:2016:HBF,
  author =       "Erich Wenger and Paul Wolfger",
  title =        "Harder, better, faster, stronger: elliptic curve
                 discrete logarithm computations on {FPGAs}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "287--297",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-015-0108-z",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-015-0108-z;
                 http://link.springer.com/article/10.1007/s13389-015-0108-z",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Khalid:2016:RRP,
  author =       "Ayesha Khalid and Muhammad Hassan and Goutam Paul and
                 Anupam Chattopadhyay",
  title =        "{RunFein}: a rapid prototyping framework for {Feistel}
                 and {SPN}-based block ciphers",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "299--323",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0116-7",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0116-7;
                 http://link.springer.com/article/10.1007/s13389-016-0116-7",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Moein:2016:HAA,
  author =       "Samer Moein and Fayez Gebali and T. Aaron Gulliver",
  title =        "Hardware attacks: an algebraic approach",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "325--337",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0117-6",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0117-6;
                 http://link.springer.com/article/10.1007/s13389-016-0117-6",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}

@Article{Ghafar:2016:SRV,
  author =       "Amir Hamzah Abd Ghafar and Muhammad Rezal Kamel
                 Ariffin",
  title =        "{SPA} on {Rabin} variant with public key {$ N = p^2 q
                 $}",
  journal =      j-J-CRYPTO-ENG,
  volume =       "6",
  number =       "4",
  pages =        "339--346",
  month =        nov,
  year =         "2016",
  CODEN =        "????",
  DOI =          "http://dx.doi.org/10.1007/s13389-016-0118-5",
  ISSN =         "2190-8508 (print), 2190-8516 (electronic)",
  ISSN-L =       "2190-8508",
  bibdate =      "Thu Nov 17 07:32:46 MST 2016",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
  URL =          "http://link.springer.com/accesspage/article/10.1007/s13389-016-0118-5;
                 http://link.springer.com/article/10.1007/s13389-016-0118-5",
  acknowledgement = ack-nhfb,
  fjournal =     "Journal of Cryptographic Engineering",
  journal-URL =  "http://link.springer.com/journal/13389",
}