Table of contents for issues of Journal of Cryptographic Engineering

Last update: Sun May 27 08:30:43 MDT 2018                Valid HTML 3.2!

Volume 1, Number 1, April, 2011
Volume 1, Number 2, August, 2011
Volume 1, Number 3, November, 2011
Volume 1, Number 4, December, 2011
Volume 2, Number 1, May, 2012
Volume 2, Number 2, September, 2012
Volume 2, Number 3, October, 2012
Volume 2, Number 4, November, 2012
Volume 3, Number 1, April, 2013
Volume 3, Number 2, June, 2013
Volume 3, Number 3, September, 2013
Volume 3, Number 4, November, 2013
Volume 4, Number 1, April, 2014
Volume 4, Number 2, June, 2014
Volume 4, Number 3, September, 2014
Volume 4, Number 4, November, 2014
Volume 5, Number 1, April, 2015
Volume 5, Number 2, June, 2015
Volume 5, Number 3, September, 2015
Volume 5, Number 4, November, 2015
Volume 6, Number 1, April, 2016
Volume 6, Number 2, June, 2016
Volume 6, Number 3, September, 2016
Volume 6, Number 4, November, 2016
Volume 7, Number 1, April, 2017
Volume 7, Number 2, June, 2017
Volume 7, Number 3, September, 2017
Volume 7, Number 4, November, 2017
Volume 8, Number 1, April, 2018
Volume 8, Number 2, June, 2018


Journal of Cryptographic Engineering
Volume 1, Number 1, April, 2011

   Çetin Kaya Koç   Introduction to the \booktitleJournal of
                                  Cryptographic Engineering  . . . . . . . 1--3
                Paul Kocher and   
               Joshua Jaffe and   
               Benjamin Jun and   
                 Pankaj Rohatgi   Introduction to differential power
                                  analysis . . . . . . . . . . . . . . . . 5--27
           H. Gregor Molter and   
       Marc Stöttinger and   
          Abdulhadi Shoufan and   
                 Falko Strenzke   A simple power analysis attack on a
                                  McEliece cryptoprocessor . . . . . . . . 29--36
               Tim Güneysu   Utilizing hard cores of modern FPGA
                                  devices for high-performance
                                  cryptography . . . . . . . . . . . . . . 37--55
   Agustin Dominguez-Oviedo and   
                 M. Anwar Hasan   Algorithm-level error detection for
                                  Montgomery ladder-based ECSM . . . . . . 57--69
            Sergei Skorobogatov   Synchronization method for SCA and fault
                                  attacks  . . . . . . . . . . . . . . . . 71--77
      Cédric Hocquet and   
                 Dina Kamel and   
        Francesco Regazzoni and   
          Jean-Didier Legat and   
              Denis Flandre and   
                  David Bol and   
François-Xavier Standaert   Harvesting the potential of nano-CMOS
                                  for lightweight cryptography: an
                                  ultra-low-voltage 65 nm AES coprocessor
                                  for passive RFID tags  . . . . . . . . . 79--86
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 1, Number 2, August, 2011

              Carlos Moreno and   
                 M. Anwar Hasan   SPA-resistant binary exponentiation with
                                  optimal execution time . . . . . . . . . 87--99
           Jean-Luc Beuchat and   
               Eiji Okamoto and   
                Teppei Yamazaki   A low-area unified hardware architecture
                                  for the AES and the cryptographic hash
                                  function ECHO  . . . . . . . . . . . . . 101--121
               Julien Doget and   
            Emmanuel Prouff and   
            Matthieu Rivain and   
François-Xavier Standaert   Univariate side channel attacks and
                                  leakage modeling . . . . . . . . . . . . 123--144
           Carolyn Whitnall and   
               Elisabeth Oswald   A fair evaluation framework for
                                  comparing side-channel distinguishers    145--160
          Raveen R. Goundar and   
                  Marc Joye and   
              Atsuko Miyaji and   
            Matthieu Rivain and   
              Alexandre Venelli   Scalar multiplication on Weierstraß
                                  elliptic curves from Co-$Z$ arithmetic   161--176
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 1, Number 3, November, 2011

       Stefan Katzenbeisser and   
        Ünal Kocaba\vs and   
      Vincent van der Leest and   
         Ahmad-Reza Sadeghi and   
         Geert-Jan Schrijen and   
            Christian Wachsmann   Recyclable PUFs: logically
                                  reconfigurable PUFs  . . . . . . . . . . 177--186
           Jonathan Taverne and   
Armando Faz-Hernández and   
            Diego F. Aranha and   
Francisco Rodríguez-Henríquez and   
           Darrel Hankerson and   
             Julio López   Speeding scalar multiplication over
                                  binary elliptic curves using the new
                                  carry-less multiplication instruction    187--199
      Nicolas Méloni and   
           Christophe Negre and   
                 M. Anwar Hasan   High performance GHASH and impacts of a
                                  class of unconventional bases  . . . . . 201--218
               Michael Tunstall   Practical complexity differential
                                  cryptanalysis and fault analysis of AES  219--230
              Marcel Medwed and   
François-Xavier Standaert   Extractors against side-channel attacks:
                                  weak or strong?  . . . . . . . . . . . . 231--241
          Éric Brier and   
             David Naccache and   
            Phong Q. Nguyen and   
                 Mehdi Tibouchi   Modulus fault attacks against RSA--CRT
                                  signatures . . . . . . . . . . . . . . . 243--253
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 1, Number 4, December, 2011

                  Markus Dichtl   A new method of black box power analysis
                                  and a fast algorithm for optimal key
                                  search . . . . . . . . . . . . . . . . . 255--264
                   Sho Endo and   
           Takeshi Sugawara and   
              Naofumi Homma and   
              Takafumi Aoki and   
                   Akashi Satoh   An on-chip glitchy-clock generator for
                                  testing fault injection attacks  . . . . 265--270
             Roberto Avanzi and   
              Simon Hoerder and   
                   Dan Page and   
               Michael Tunstall   Side-channel attacks on the McEliece and
                                  Niederreiter public-key cryptosystems    271--281
                 Falko Strenzke   Message-aimed side channel and fault
                                  attacks against public key cryptosystems
                                  with homomorphic properties  . . . . . . 283--292
           Gabriel Hospodar and   
         Benedikt Gierlichs and   
             Elke De Mulder and   
         Ingrid Verbauwhede and   
                Joos Vandewalle   Machine learning in side-channel
                                  analysis: a first study  . . . . . . . . 293--302
              Alexander Lux and   
                Artem Starostin   A tool for static detection of timing
                                  channels in Java . . . . . . . . . . . . 303--313
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 2, Number 1, May, 2012

                 P. Grabher and   
   J. Großschädl and   
                 S. Hoerder and   
           K. Järvinen and   
                    D. Page and   
                 S. Tillich and   
               M. Wójcik   An exploration of mechanisms for dynamic
                                  cryptographic instruction set extension  1--18
 Conrado P. L. Gouvêa and   
       Leonardo B. Oliveira and   
             Julio López   Efficient software implementation of
                                  public-key cryptography on sensor
                                  networks using the MSP430X
                                  microcontroller  . . . . . . . . . . . . 19--29
                    Shay Gueron   Efficient software implementations of
                                  modular exponentiation . . . . . . . . . 31--43
              Claude Carlet and   
     Jean-Charles Faug\`ere and   
          Christopher Goyet and   
    Guénaël Renault   Analysis of the algebraic side channel
                                  attack . . . . . . . . . . . . . . . . . 45--62
       M. Abdelaziz Elaabid and   
                Sylvain Guilley   Portability of templates . . . . . . . . 63--74
             Roberto Avanzi and   
              Simon Hoerder and   
                   Dan Page and   
               Michael Tunstall   Erratum to: Side-channel attacks on the
                                  McEliece and Niederreiter public-key
                                  cryptosystems  . . . . . . . . . . . . . 75--75
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 2, Number 2, September, 2012

        Daniel J. Bernstein and   
                 Niels Duif and   
                Tanja Lange and   
              Peter Schwabe and   
                    Bo-Yin Yang   High-speed high-security signatures  . . 77--89
             M. Anwar Hasan and   
               Christophe Negre   Sequential multiplier with sub-linear
                                  gate complexity  . . . . . . . . . . . . 91--97
              Sung-Ming Yen and   
            Chien-Ning Chen and   
                   SangJae Moon   Multi-exponentiation algorithm based on
                                  binary GCD computation and its
                                  application to side-channel
                                  countermeasure . . . . . . . . . . . . . 99--110
               Thomas Roche and   
                Emmanuel Prouff   Higher-order glitch free implementation
                                  of the AES using Secure Multi--Party
                                  Computation protocols  . . . . . . . . . 111--127
             Julien Bringer and   
      Hervé Chabanne and   
                    Thanh Ha Le   Protecting AES against side-channel
                                  analysis using wire-tap codes  . . . . . 129--141
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 2, Number 3, October, 2012

              Markus Kasper and   
                Amir Moradi and   
            Georg T. Becker and   
             Oliver Mischke and   
           Tim Güneysu and   
              Christof Paar and   
                 Wayne Burleson   Side channels as building blocks . . . . 143--159
                Luke Mather and   
               Elisabeth Oswald   Pinpointing side-channel information
                                  leaks in web applications  . . . . . . . 161--177
    Vladimir Trujillo-Olaya and   
           Timothy Sherwood and   
   Çetin Kaya Koç   Analysis of performance versus security
                                  in hardware realizations of small
                                  elliptic curves for lightweight
                                  applications . . . . . . . . . . . . . . 179--188
          Saloomeh Shariati and   
François-Xavier Standaert and   
            Laurent Jacques and   
                    Benoit Macq   Analysis and experimental evaluation of
                                  image-based PUFs . . . . . . . . . . . . 189--206
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 2, Number 4, November, 2012

               Jean Da Rolt and   
                Amitabh Das and   
              Santosh Ghosh and   
          Giorgio Di Natale and   
         Marie-Lise Flottes and   
             Bruno Rouzeyre and   
             Ingrid Verbauwhede   Scan attacks on side-channel and fault
                                  attack resistant public-key
                                  implementations  . . . . . . . . . . . . 207--219
              Brian Baldwin and   
          Raveen R. Goundar and   
              Mark Hamilton and   
             William P. Marnane   Co-$Z$ ECC scalar multiplications for
                                  hardware, software and hardware-software
                                  co-design on embedded systems  . . . . . 221--240
                Shay Gueron and   
                   Vlad Krasnov   Parallelizing message schedules to
                                  accelerate the computations of hash
                                  functions  . . . . . . . . . . . . . . . 241--253
            Patrick Koeberl and   
                Jiangtao Li and   
                  Roel Maes and   
                Anand Rajan and   
              Claire Vishik and   
       Marcin Wójcik and   
                         Wei Wu   A practical device authentication scheme
                                  using SRAM PUFs  . . . . . . . . . . . . 255--269
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 3, Number 1, April, 2013

            Emmanuel Prouff and   
              Patrick Schaumont   Introduction to the CHES 2012 special
                                  issue  . . . . . . . . . . . . . . . . . 1--1
   Alexander Schlösser and   
          Dmitry Nedospasov and   
        Juliane Krämer and   
              Susanna Orlic and   
            Jean-Pierre Seifert   Simple photonic emission analysis of AES 3--15
       Ulrich Rührmair and   
                Marten van Dijk   On the practical use of physical
                                  unclonable functions in oblivious
                                  transfer and bit commitment protocols    17--28
               Stefan Heyse and   
               Tim Güneysu   Code-based cryptography on
                                  reconfigurable hardware: tweaking
                                  Niederreiter encryption for performance  29--43
    Beno\^\it Gérard and   
François-Xavier Standaert   Unified and optimized linear collision
                                  attacks and their application in a
                                  non-profiled setting: extended version   45--58
        Pierre-Alain Fouque and   
         Nicolas Guillermin and   
         Delphine Leresteux and   
             Mehdi Tibouchi and   
     Jean-Christophe Zapalowicz   Attacking RSA--CRT signatures with
                                  faults on Montgomery multiplication  . . 59--72
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 3, Number 2, June, 2013

              Sk Subidh Ali and   
       Debdeep Mukhopadhyay and   
               Michael Tunstall   Differential fault analysis of AES:
                                  towards reaching its limits  . . . . . . 73--97
          David P. Montminy and   
           Rusty O. Baldwin and   
          Michael A. Temple and   
                  Eric D. Laspe   Improving cross-device attacks using
                                  zero-mean unit-variance normalization    99--110
         Joseph A. Akinyele and   
           Christina Garman and   
                  Ian Miers and   
          Matthew W. Pagano and   
           Michael Rushanan and   
              Matthew Green and   
                 Aviel D. Rubin   Charm: a framework for rapidly
                                  prototyping cryptosystems  . . . . . . . 111--128
        Michael T. Kurdziel and   
            Marcin Lukowiak and   
          Michael A. Sanfilippo   Minimizing performance overhead in
                                  memory encryption  . . . . . . . . . . . 129--138
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 3, Number 3, September, 2013

 Mohamed Saied Emam Mohamed and   
          Stanislav Bulygin and   
             Michael Zohner and   
             Annelie Heuser and   
             Michael Walter and   
              Johannes Buchmann   Improved algebraic side-channel attack
                                  on AES . . . . . . . . . . . . . . . . . 139--156
            Maria Christofi and   
          Boutheina Chetali and   
               Louis Goubin and   
                 David Vigilant   Formal verification of a CRT--RSA
                                  implementation against fault attacks . . 157--167
    Sébastien Briais and   
            Jean-Luc Danger and   
                Sylvain Guilley   A formal study of two physical
                                  countermeasures against side channel
                                  attacks  . . . . . . . . . . . . . . . . 169--180
                     Mark Brown   Toward a taxonomy of communications
                                  security models  . . . . . . . . . . . . 181--195
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 3, Number 4, November, 2013

               Dai Yamamoto and   
             Kazuo Sakiyama and   
            Mitsugu Iwamoto and   
                 Kazuo Ohta and   
          Masahiko Takenaka and   
                   Kouichi Itoh   Variety enhancement of PUF responses
                                  using the locations of random outputting
                                  RS latches . . . . . . . . . . . . . . . 197--211
              Shivam Bhasin and   
            Sylvain Guilley and   
             Annelie Heuser and   
                Jean-Luc Danger   From cryptography to hardware: analyzing
                                  and protecting embedded Xilinx BRAM for
                                  cryptographic applications . . . . . . . 213--225
           Abdel Alim Kamal and   
                 Amr M. Youssef   Strengthening hardware implementations
                                  of NTRUEncrypt against fault analysis
                                  attacks  . . . . . . . . . . . . . . . . 227--240
            Jean-Luc Danger and   
            Sylvain Guilley and   
         Philippe Hoogvorst and   
      Cédric Murdica and   
                 David Naccache   A synthesis of side-channel attacks on
                                  elliptic curve cryptography in
                                  smart-cards  . . . . . . . . . . . . . . 241--265
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 4, Number 1, April, 2014

              Guido Bertoni and   
    Jean-Sébastien Coron   Introduction to the CHES 2013 special
                                  issue  . . . . . . . . . . . . . . . . . 1--1
            Thomaz Oliveira and   
         Julio López and   
            Diego F. Aranha and   
Francisco Rodríguez-Henríquez   Two is the fastest prime: lambda
                                  coordinates for binary elliptic curves   3--17
            Georg T. Becker and   
        Francesco Regazzoni and   
              Christof Paar and   
              Wayne P. Burleson   Stealthy dopant-level hardware Trojans:
                                  extended version . . . . . . . . . . . . 19--31
             Elke De Mulder and   
             Michael Hutter and   
             Mark E. Marson and   
                  Peter Pearson   Using Bleichenbacher's solution to the
                                  hidden number problem to attack nonce
                                  leaks in $ 384$-bit ECDSA: extended
                                  version  . . . . . . . . . . . . . . . . 33--45
             Vincent Grosso and   
François-Xavier Standaert and   
                Sebastian Faust   Masking vs. multiparty computation: how
                                  large is the gap for AES?  . . . . . . . 47--57
           Takeshi Sugawara and   
             Daisuke Suzuki and   
               Minoru Saeki and   
           Mitsuru Shiozaki and   
                 Takeshi Fujino   On measurable side-channel leaks inside
                                  ASIC design primitives . . . . . . . . . 59--73
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 4, Number 2, June, 2014

        Leonardo C. Almeida and   
         Ewerton R. Andrade and   
     Paulo S. L. M. Barreto and   
       Marcos A. Simplicio, Jr.   Lyra: password-based key derivation with
                                  tunable memory and processing costs  . . 75--89
                Chistophe Negre   Efficient binary polynomial
                                  multiplication based on optimized
                                  Karatsuba reconstruction . . . . . . . . 91--106
              Claude Carlet and   
            Jean-Luc Danger and   
            Sylvain Guilley and   
Emmanuel Prouff Houssem Maghrebi   Achieving side-channel high-order
                                  correlation immunity with leakage
                                  squeezing  . . . . . . . . . . . . . . . 107--121
            Felipe P. Biasi and   
     Paulo S. L. M. Barreto and   
            Rafael Misoczki and   
             Wilson V. Ruggiero   Scaling efficient code-based
                                  cryptosystems for embedded platforms . . 123--134
                Goutam Paul and   
           Anupam Chattopadhyay   Designing stream ciphers with scalable
                                  data-widths: a case study with HC-128    135--143
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 4, Number 3, September, 2014

                    N. Moro and   
               K. Heydemann and   
                E. Encrenaz and   
                    B. Robisson   Formal verification of a software
                                  countermeasure against instruction skip
                                  attacks  . . . . . . . . . . . . . . . . 145--156
            Sonia Bela\"\id and   
         Fabrizio De Santis and   
              Johann Heyszl and   
             Stefan Mangard and   
              Marcel Medwed and   
   Jòrn-Marc Schmidt and   
François-Xavier Standaert and   
                 Stefan Tillich   Towards fresh re-keying with
                                  leakage-resilient PRFs: cipher design
                                  principles and analysis  . . . . . . . . 157--171
                Pablo Rauzy and   
                Sylvain Guilley   A formal proof of countermeasures
                                  against fault injection attacks on
                                  CRT--RSA . . . . . . . . . . . . . . . . 173--185
                 Dina Kamel and   
            Mathieu Renauld and   
              Denis Flandre and   
François-Xavier Standaert   Understanding the limitations and
                                  improving the relevance of SPICE
                                  simulations in side-channel security
                                  evaluations  . . . . . . . . . . . . . . 187--195
                   S. Tiran and   
                   S. Ordas and   
                  Y. Teglia and   
                  M. Agoyan and   
                     P. Maurine   A model of the leakage in the frequency
                                  domain and its application to CPA and
                                  DPA  . . . . . . . . . . . . . . . . . . 197--212
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 4, Number 4, November, 2014

           Werner Schindler and   
                Andreas Wiemers   Power attacks in the presence of
                                  exponent blinding  . . . . . . . . . . . 213--236
          Sabyasachi Karati and   
                Abhijit Das and   
     Dipanwita Roychowdhury and   
             Bhargav Bellur and   
     Debojyoti Bhattacharya and   
                   Aravind Iyer   New algorithms for batch verification of
                                  standard ECDSA signatures  . . . . . . . 237--258
         Christophe Clavier and   
            Jean-Luc Danger and   
              Guillaume Duc and   
       M. Abdelaziz Elaabid and   
    Beno\^\it Gérard and   
            Sylvain Guilley and   
             Annelie Heuser and   
             Michael Kasper and   
                    Yang Li and   
        Victor Lomné and   
            Daisuke Nakatsu and   
                 Kazuo Ohta and   
             Kazuo Sakiyama and   
            Laurent Sauvage and   
           Werner Schindler and   
                          et al   Practical improvements of side-channel
                                  attacks on AES: feedback from the 2nd
                                  DPA contest  . . . . . . . . . . . . . . 259--274
                   Joppe W. Bos   Constant time modular inversion  . . . . 275--281
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 5, Number 1, April, 2015

          Joshua R. Templin and   
                Jason R. Hamlet   A new power-aware FPGA design metric . . 1--11
            Subhadeep Banik and   
            Subhamoy Maitra and   
                 Santanu Sarkar   Improved differential fault attack on
                                  MICKEY 2.0 . . . . . . . . . . . . . . . 13--29
Armando Faz-Hernández and   
              Patrick Longa and   
          Ana H. Sánchez   Efficient and secure algorithms for
                                  GLV-based scalar multiplication and
                                  their implementation on GLV--GLS curves
                                  (extended version) . . . . . . . . . . . 31--52
              Colin O'Flynn and   
                  Zhizhang Chen   Synchronous sampling and clock recovery
                                  of internal oscillators for side channel
                                  analysis and fault injection . . . . . . 53--69

Journal of Cryptographic Engineering
Volume 5, Number 2, June, 2015

               Lejla Batina and   
               M. J. B. Robshaw   Introduction to the CHES 2014 special
                                  issue  . . . . . . . . . . . . . . . . . 71--72
Jean-Sébastien Coron and   
                  Arnab Roy and   
                 Srinivas Vivek   Fast evaluation of polynomials over
                                  binary finite fields and application to
                                  side-channel countermeasures . . . . . . 73--83
           Takeshi Sugawara and   
             Daisuke Suzuki and   
              Ryoichi Fujii and   
              Shigeaki Tawa and   
                Ryohei Hori and   
           Mitsuru Shiozaki and   
                 Takeshi Fujino   Reversing stealthy dopant-level circuits 85--94
              Daniel Genkin and   
              Itamar Pipman and   
                    Eran Tromer   Get your hands off my laptop: physical
                                  side-channel key-extraction attacks on
                                  PCs  . . . . . . . . . . . . . . . . . . 95--112
                 Jo Vliegen and   
               Nele Mentens and   
                  Dirk Koch and   
          Dries Schellekens and   
             Ingrid Verbauwhede   Practical feasibility evaluation and
                                  improvement of a pay-per-use licensing
                                  scheme for hardware IP cores in Xilinx
                                  FPGAs  . . . . . . . . . . . . . . . . . 113--122
               Liran Lerman and   
          Gianluca Bontempi and   
             Olivier Markowitch   A machine learning approach against a
                                  masked AES . . . . . . . . . . . . . . . 123--139
                Shay Gueron and   
                   Vlad Krasnov   Fast prime field elliptic-curve
                                  cryptography with $ 256$-bit primes  . . 141--151

Journal of Cryptographic Engineering
Volume 5, Number 3, September, 2015

                Xiaofei Guo and   
       Debdeep Mukhopadhyay and   
                Chenglu Jin and   
                   Ramesh Karri   Security analysis of concurrent error
                                  detection against differential fault
                                  analysis . . . . . . . . . . . . . . . . 153--169
            Guilherme Perin and   
             Laurent Imbert and   
           Philippe Maurine and   
                  Lionel Torres   Vertical and horizontal correlation
                                  attacks on RNS-based exponentiations . . 171--185
               Dai Yamamoto and   
             Kazuo Sakiyama and   
            Mitsugu Iwamoto and   
                 Kazuo Ohta and   
          Masahiko Takenaka and   
               Kouichi Itoh and   
                    Naoya Torii   A new method for enhancing variety and
                                  maintaining reliability of PUF responses
                                  and its evaluation on ASICs  . . . . . . 187--199
             Michael Hutter and   
                  Peter Schwabe   Multiprecision multiplication on AVR
                                  revisited  . . . . . . . . . . . . . . . 201--214
               Manuel Bluhm and   
                    Shay Gueron   Fast software implementation of binary
                                  elliptic curve cryptography  . . . . . . 215--226

Journal of Cryptographic Engineering
Volume 5, Number 4, November, 2015

                  Yunsi Fei and   
               A. Adam Ding and   
                   Jian Lao and   
                    Liwei Zhang   A statistics-based success rate model
                                  for DPA and CPA  . . . . . . . . . . . . 227--243
            Jason R. Hamlet and   
              Robert W. Brocato   Throughput-optimized implementations of
                                  QUAD . . . . . . . . . . . . . . . . . . 245--254
               Liran Lerman and   
          Gianluca Bontempi and   
             Olivier Markowitch   The bias-variance decomposition in
                                  profiled attacks . . . . . . . . . . . . 255--267
         Simone Bongiovanni and   
       Francesco Centurelli and   
            Giuseppe Scotti and   
          Alessandro Trifiletti   Design and validation through a
                                  frequency-based metric of a new
                                  countermeasure to protect nanometer ICs
                                  from side-channel attacks  . . . . . . . 269--288
                 Murat Cenk and   
                 M. Anwar Hasan   Some new results on binary polynomial
                                  multiplication . . . . . . . . . . . . . 289--303


Journal of Cryptographic Engineering
Volume 6, Number 1, April, 2016

                Alan G. Konheim   Automated teller machines: their history
                                  and authentication protocols . . . . . . 1--29
   Alejandro Cabrera Aldaya and   
Alejandro J. Cabrera Sarmiento and   
 Santiago Sánchez-Solano   AES T-Box tampering attack . . . . . . . 31--48
              Houda Ferradi and   
  Rémi Géraud and   
             David Naccache and   
                     Assia Tria   When organized crime applies academic
                                  results: a forensic analysis of an
                                  in-card listening device . . . . . . . . 49--59
               Pierre Bayon and   
             Lilian Bossuet and   
               Alain Aubert and   
                 Viktor Fischer   Fault model of electromagnetic attacks
                                  targeting ring oscillator-based true
                                  random number generators . . . . . . . . 61--74
      Markku-Juhani O. Saarinen   The BRUTUS automatic cryptanalytic
                                  framework  . . . . . . . . . . . . . . . 75--82

Journal of Cryptographic Engineering
Volume 6, Number 2, June, 2016

           Tim Güneysu and   
               Helena Handschuh   Introduction to the CHES 2015 special
                                  issue  . . . . . . . . . . . . . . . . . 83--84
           Tobias Schneider and   
                    Amir Moradi   Leakage assessment methodology . . . . . 85--99
               Werner Schindler   Exclusive exponent blinding is not
                                  enough to prevent any timing attack on
                                  RSA  . . . . . . . . . . . . . . . . . . 101--119
                  Roel Maes and   
      Vincent van der Leest and   
         Erik van der Sluis and   
                  Frans Willems   Secure key generation from biased PUFs:
                                  extended version . . . . . . . . . . . . 121--137
              Oscar Reparaz and   
            Sujoy Sinha Roy and   
             Ruan de Clercq and   
       Frederik Vercauteren and   
             Ingrid Verbauwhede   Masking ring-LWE . . . . . . . . . . . . 139--153
                Iwen Coisel and   
                Ignacio Sanchez   Improved cryptanalysis of the DECT
                                  standard cipher  . . . . . . . . . . . . 155--169

Journal of Cryptographic Engineering
Volume 6, Number 3, September, 2016

              Daniel Lemire and   
                     Owen Kaser   Faster $ 64$-bit universal hashing using
                                  carry-less multiplications . . . . . . . 171--185
          Raveen R. Goundar and   
                      Marc Joye   Inversion-free arithmetic on elliptic
                                  curves through isomorphisms  . . . . . . 187--199
                Pablo Rauzy and   
            Sylvain Guilley and   
                   Zakaria Najm   Formally proved security of assembly
                                  code against power analysis  . . . . . . 201--216
             Bruno Robisson and   
      Hél\`ene Le Bouder   Physical functions: the common factor of
                                  side-channel and fault attacks?  . . . . 217--227
              David Galindo and   
Johann Großschädl and   
                    Zhe Liu and   
      Praveen Kumar Vadnala and   
                 Srinivas Vivek   Implementation of a leakage-resilient
                                  ElGamal key encapsulation mechanism  . . 229--238
              Xuan Thuy Ngo and   
               Zakaria Najm and   
              Shivam Bhasin and   
            Sylvain Guilley and   
                Jean-Luc Danger   Method taking into account process
                                  dispersion to detect hardware Trojan
                                  Horse by side-channel analysis . . . . . 239--247
              Fatemeh Ganji and   
               Shahin Tajik and   
            Jean-Pierre Seifert   PAC learning of arbiter PUFs . . . . . . 249--258

Journal of Cryptographic Engineering
Volume 6, Number 4, November, 2016

               Joppe W. Bos and   
             Craig Costello and   
              Patrick Longa and   
                Michael Naehrig   Selecting elliptic curves for
                                  cryptography: an efficiency and security
                                  analysis . . . . . . . . . . . . . . . . 259--286
               Erich Wenger and   
                   Paul Wolfger   Harder, better, faster, stronger:
                                  elliptic curve discrete logarithm
                                  computations on FPGAs  . . . . . . . . . 287--297
              Ayesha Khalid and   
            Muhammad Hassan and   
                Goutam Paul and   
           Anupam Chattopadhyay   RunFein: a rapid prototyping framework
                                  for Feistel and SPN-based block ciphers  299--323
                Samer Moein and   
               Fayez Gebali and   
              T. Aaron Gulliver   Hardware attacks: an algebraic approach  325--337
     Amir Hamzah Abd Ghafar and   
   Muhammad Rezal Kamel Ariffin   SPA on Rabin variant with public key $ N
                                  = p^2 q $  . . . . . . . . . . . . . . . 339--346


Journal of Cryptographic Engineering
Volume 7, Number 1, April, 2017

            Mathieu Carbone and   
             Yannick Teglia and   
         Gilles R. Ducharme and   
               Philippe Maurine   Mutual information analysis:
                                  higher-order statistical moments,
                                  efficiency and efficacy  . . . . . . . . 1--17
                Sylvain Guilley   Editorial about PROOFS 2015  . . . . . . 19--20
Noreddine El Janati El Idrissi and   
         Guillaume Bouffard and   
           Jean-Louis Lanet and   
                  Said El Hajji   Trust can be misplaced . . . . . . . . . 21--34
            Shoei Nashimoto and   
              Naofumi Homma and   
            Yu-ichi Hayashi and   
            Junko Takahashi and   
               Hitoshi Fuji and   
                  Takafumi Aoki   Buffer overflow attack with multiple
                                  fault injection and a proven
                                  countermeasure . . . . . . . . . . . . . 35--46
             Bruno Robisson and   
              Michel Agoyan and   
             Patrick Soquet and   
 Sébastien Le-Henaff and   
       Franck Wajsbürt and   
      Pirouz Bazargan-Sabet and   
                 Guillaume Phan   Smart security management in secure
                                  devices  . . . . . . . . . . . . . . . . 47--61
              Florian Lugou and   
           Ludovic Apvrille and   
     Aurélien Francillon   SMASHUP: a toolchain for unified
                                  verification of hardware/software
                                  co-designs . . . . . . . . . . . . . . . 63--74
                Sabine Azzi and   
               Bruno Barras and   
            Maria Christofi and   
                 David Vigilant   Using linear codes as a fault
                                  countermeasure for nonlinear operations:
                                  application to AES and formal
                                  verification . . . . . . . . . . . . . . 75--85
            Laurent Sauvage and   
                Tarik Graba and   
            Thibault Porteboeuf   Multi-level formal verification  . . . . 87--95

Journal of Cryptographic Engineering
Volume 7, Number 2, June, 2017

         Benedikt Gierlichs and   
              Axel Y. Poschmann   Introduction to the CHES 2016 special
                                  issue  . . . . . . . . . . . . . . . . . 97--98
                Yuval Yarom and   
              Daniel Genkin and   
                 Nadia Heninger   CacheBleed: a timing attack on OpenSSL
                                  constant-time RSA  . . . . . . . . . . . 99--112
              Fatemeh Ganji and   
               Shahin Tajik and   
   Fabian Fäßler and   
            Jean-Pierre Seifert   Having no mathematical model may not
                                  secure PUFs  . . . . . . . . . . . . . . 113--128
    François Durvaux and   
François-Xavier Standaert and   
         Santos Merino Del Pozo   Towards easy leakage certification:
                                  extended version . . . . . . . . . . . . 129--147
                  Erik Boss and   
             Vincent Grosso and   
           Tim Güneysu and   
             Gregor Leander and   
                Amir Moradi and   
               Tobias Schneider   Strong $8$-bit Sboxes with efficient
                                  masking in hardware extended version . . 149--165

Journal of Cryptographic Engineering
Volume 7, Number 3, September, 2017

            Paul Bottinelli and   
                   Joppe W. Bos   Computational aspects of correlation
                                  power analysis . . . . . . . . . . . . . 167--181
                   S. Ordas and   
          L. Guillaume-Sage and   
                     P. Maurine   Electromagnetic fault injection: the
                                  curse of flip-flops  . . . . . . . . . . 183--197
         Pawel Swierczynski and   
               Marc Fyrbiak and   
              Philipp Koppe and   
                Amir Moradi and   
                  Christof Paar   Interdiction in practice --- Hardware
                                  Trojan against a high-security USB flash
                                  drive  . . . . . . . . . . . . . . . . . 199--211
             Matthew Mayhew and   
                   Radu Muresan   An overview of hardware-level
                                  statistical power analysis attack
                                  countermeasures  . . . . . . . . . . . . 213--244
           Christophe Negre and   
                Thomas Plantard   Efficient regular modular exponentiation
                                  using multiplicative half-size splitting 245--253

Journal of Cryptographic Engineering
Volume 7, Number 4, November, 2017

           Werner Schindler and   
                Andreas Wiemers   Generic power attacks on RSA with CRT
                                  and exponent blinding: new results . . . 255--272
   Alejandro Cabrera Aldaya and   
Alejandro J. Cabrera Sarmiento and   
 Santiago Sánchez-Solano   SPA vulnerabilities of the binary
                                  extended Euclidean algorithm . . . . . . 273--285
               Enes Pasalic and   
       Anupam Chattopadhyay and   
                   WeiGuo Zhang   Efficient implementation of generalized
                                  Maiorana--McFarland class of
                                  cryptographic functions  . . . . . . . . 287--295
                  Naofumi Homma   Introduction to the PROOFS 2016 special
                                  section  . . . . . . . . . . . . . . . . 297--298
        Sarani Bhattacharya and   
           Debdeep Mukhopadhyay   Formal fault analysis of branch
                                  predictors: attacking countermeasures of
                                  asymmetric key ciphers . . . . . . . . . 299--310
               Jakub Breier and   
               Dirmanto Jap and   
                  Shivam Bhasin   A study on analyzing side-channel
                                  resistant encoding schemes with respect
                                  to fault attacks . . . . . . . . . . . . 311--320
           Margaux Dugardin and   
            Sylvain Guilley and   
              Martin Moreau and   
               Zakaria Najm and   
                    Pablo Rauzy   Using modular extension to provably
                                  protect Edwards curves against fault
                                  attacks  . . . . . . . . . . . . . . . . 321--330
            Nicolas Bruneau and   
            Sylvain Guilley and   
             Annelie Heuser and   
              Damien Marion and   
                  Olivier Rioul   Optimal side-channel attacks for
                                  multivariate leakages and multiple
                                  models . . . . . . . . . . . . . . . . . 331--341
              Stjepan Picek and   
             Annelie Heuser and   
                Sylvain Guilley   Template attack versus Bayes classifier  343--351


Journal of Cryptographic Engineering
Volume 8, Number 1, April, 2018

                    Qian Ge and   
                Yuval Yarom and   
                 David Cock and   
                  Gernot Heiser   A survey of microarchitectural timing
                                  attacks and countermeasures on
                                  contemporary hardware  . . . . . . . . . 1--27
           Avik Chakraborti and   
       Anupam Chattopadhyay and   
            Muhammad Hassan and   
                   Mridul Nandi   TriviA and uTriviA: two fast and secure
                                  authenticated encryption schemes . . . . 29--48
         Debrup Chakraborty and   
Cuauhtemoc Mancillas López and   
                  Palash Sarkar   Disk encryption: do we need to preserve
                                  length?  . . . . . . . . . . . . . . . . 49--69
      Markku-Juhani O. Saarinen   Arithmetic coding and blinding
                                  countermeasures for lattice signatures   71--84
              Houda Ferradi and   
  Rémi Géraud and   
               Diana Maimut and   
             David Naccache and   
               Amaury de Wargny   Regulating the pace of von Neumann
                                  correctors . . . . . . . . . . . . . . . 85--91

Journal of Cryptographic Engineering
Volume 8, Number 2, June, 2018

            Wieland Fischer and   
                  Naofumi Homma   Introduction to the CHES 2017 special
                                  issue  . . . . . . . . . . . . . . . . . 93--94
                      Tung Chou   McBits revisited: toward a fast
                                  constant-time code-based KEM . . . . . . 95--107
               Hannes Gross and   
                 Stefan Mangard   A unified masking approach . . . . . . . 109--124
             Vincent Immler and   
              Robert Specht and   
             Florian Unterstein   Your rails cannot hide from localized
                                  EM: how dual-rail logic fails on FPGAs
                                  --- extended version . . . . . . . . . . 125--139
        George Hatzivasilis and   
     Konstantinos Fysarakis and   
     Ioannis Papaefstathiou and   
          Charalampos Manifavas   A review of lightweight block ciphers    141--184