Table of contents for issues of Journal of Cryptographic Engineering

Last update: Thu Aug 10 16:14:34 MDT 2023                Valid HTML 3.2!

Volume 1, Number 1, April, 2011
Volume 1, Number 2, August, 2011
Volume 1, Number 3, November, 2011
Volume 1, Number 4, December, 2011
Volume 2, Number 1, May, 2012
Volume 2, Number 2, September, 2012
Volume 2, Number 3, October, 2012
Volume 2, Number 4, November, 2012
Volume 3, Number 1, April, 2013
Volume 3, Number 2, June, 2013
Volume 3, Number 3, September, 2013
Volume 3, Number 4, November, 2013
Volume 4, Number 1, April, 2014
Volume 4, Number 2, June, 2014
Volume 4, Number 3, September, 2014
Volume 4, Number 4, November, 2014
Volume 5, Number 1, April, 2015
Volume 5, Number 2, June, 2015
Volume 5, Number 3, September, 2015
Volume 5, Number 4, November, 2015
Volume 6, Number 1, April, 2016
Volume 6, Number 2, June, 2016
Volume 6, Number 3, September, 2016
Volume 6, Number 4, November, 2016
Volume 7, Number 1, April, 2017
Volume 7, Number 2, June, 2017
Volume 7, Number 3, September, 2017
Volume 7, Number 4, November, 2017
Volume 8, Number 1, April, 2018
Volume 8, Number 2, June, 2018
Volume 8, Number 3, September, 2018
Volume 8, Number 4, November, 2018
Volume 9, Number 1, April, 2019
Volume 9, Number 2, June, 2019
Volume 9, Number 3, September, 2019
Volume 9, Number 4, November, 2019
Volume 10, Number 1, April, 2020
Volume 10, Number 2, June, 2020
Volume 10, Number 3, September, 2020
Volume 10, Number 4, November, 2020
Volume 11, Number 1, April, 2021
Volume 11, Number 2, June, 2021
Volume 11, Number 3, September, 2021
Volume 11, Number 4, November, 2021
Volume 12, Number 1, April, 2022
Volume 12, Number 2, June, 2022
Volume 12, Number 3, September, 2022
Volume 12, Number 4, November, 2022
Volume 13, Number 1, April, 2023
Volume 13, Number 2, June, 2023
Volume 13, Number 3, September, 2023


Journal of Cryptographic Engineering
Volume 1, Number 1, April, 2011

   Çetin Kaya Koç   Introduction to the \booktitleJournal of
                                  Cryptographic Engineering  . . . . . . . 1--3
                Paul Kocher and   
               Joshua Jaffe and   
               Benjamin Jun and   
                 Pankaj Rohatgi   Introduction to differential power
                                  analysis . . . . . . . . . . . . . . . . 5--27
           H. Gregor Molter and   
       Marc Stöttinger and   
          Abdulhadi Shoufan and   
                 Falko Strenzke   A simple power analysis attack on a
                                  McEliece cryptoprocessor . . . . . . . . 29--36
               Tim Güneysu   Utilizing hard cores of modern FPGA
                                  devices for high-performance
                                  cryptography . . . . . . . . . . . . . . 37--55
   Agustin Dominguez-Oviedo and   
                 M. Anwar Hasan   Algorithm-level error detection for
                                  Montgomery ladder-based ECSM . . . . . . 57--69
            Sergei Skorobogatov   Synchronization method for SCA and fault
                                  attacks  . . . . . . . . . . . . . . . . 71--77
      Cédric Hocquet and   
                 Dina Kamel and   
        Francesco Regazzoni and   
          Jean-Didier Legat and   
              Denis Flandre and   
                  David Bol and   
François-Xavier Standaert   Harvesting the potential of nano-CMOS
                                  for lightweight cryptography: an
                                  ultra-low-voltage 65 nm AES coprocessor
                                  for passive RFID tags  . . . . . . . . . 79--86
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 1, Number 2, August, 2011

              Carlos Moreno and   
                 M. Anwar Hasan   SPA-resistant binary exponentiation with
                                  optimal execution time . . . . . . . . . 87--99
           Jean-Luc Beuchat and   
               Eiji Okamoto and   
                Teppei Yamazaki   A low-area unified hardware architecture
                                  for the AES and the cryptographic hash
                                  function ECHO  . . . . . . . . . . . . . 101--121
               Julien Doget and   
            Emmanuel Prouff and   
            Matthieu Rivain and   
François-Xavier Standaert   Univariate side channel attacks and
                                  leakage modeling . . . . . . . . . . . . 123--144
           Carolyn Whitnall and   
               Elisabeth Oswald   A fair evaluation framework for
                                  comparing side-channel distinguishers    145--160
          Raveen R. Goundar and   
                  Marc Joye and   
              Atsuko Miyaji and   
            Matthieu Rivain and   
              Alexandre Venelli   Scalar multiplication on Weierstraß
                                  elliptic curves from Co-$Z$ arithmetic   161--176
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 1, Number 3, November, 2011

       Stefan Katzenbeisser and   
        Ünal Kocaba\vs and   
      Vincent van der Leest and   
         Ahmad-Reza Sadeghi and   
         Geert-Jan Schrijen and   
            Christian Wachsmann   Recyclable PUFs: logically
                                  reconfigurable PUFs  . . . . . . . . . . 177--186
           Jonathan Taverne and   
Armando Faz-Hernández and   
            Diego F. Aranha and   
Francisco Rodríguez-Henríquez and   
           Darrel Hankerson and   
             Julio López   Speeding scalar multiplication over
                                  binary elliptic curves using the new
                                  carry-less multiplication instruction    187--199
      Nicolas Méloni and   
           Christophe Negre and   
                 M. Anwar Hasan   High performance GHASH and impacts of a
                                  class of unconventional bases  . . . . . 201--218
               Michael Tunstall   Practical complexity differential
                                  cryptanalysis and fault analysis of AES  219--230
              Marcel Medwed and   
François-Xavier Standaert   Extractors against side-channel attacks:
                                  weak or strong?  . . . . . . . . . . . . 231--241
          Éric Brier and   
             David Naccache and   
            Phong Q. Nguyen and   
                 Mehdi Tibouchi   Modulus fault attacks against RSA--CRT
                                  signatures . . . . . . . . . . . . . . . 243--253
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 1, Number 4, December, 2011

                  Markus Dichtl   A new method of black box power analysis
                                  and a fast algorithm for optimal key
                                  search . . . . . . . . . . . . . . . . . 255--264
                   Sho Endo and   
           Takeshi Sugawara and   
              Naofumi Homma and   
              Takafumi Aoki and   
                   Akashi Satoh   An on-chip glitchy-clock generator for
                                  testing fault injection attacks  . . . . 265--270
             Roberto Avanzi and   
              Simon Hoerder and   
                   Dan Page and   
               Michael Tunstall   Side-channel attacks on the McEliece and
                                  Niederreiter public-key cryptosystems    271--281
                 Falko Strenzke   Message-aimed side channel and fault
                                  attacks against public key cryptosystems
                                  with homomorphic properties  . . . . . . 283--292
           Gabriel Hospodar and   
         Benedikt Gierlichs and   
             Elke De Mulder and   
         Ingrid Verbauwhede and   
                Joos Vandewalle   Machine learning in side-channel
                                  analysis: a first study  . . . . . . . . 293--302
              Alexander Lux and   
                Artem Starostin   A tool for static detection of timing
                                  channels in Java . . . . . . . . . . . . 303--313
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 2, Number 1, May, 2012

                 P. Grabher and   
   J. Großschädl and   
                 S. Hoerder and   
           K. Järvinen and   
                    D. Page and   
                 S. Tillich and   
               M. Wójcik   An exploration of mechanisms for dynamic
                                  cryptographic instruction set extension  1--18
 Conrado P. L. Gouvêa and   
       Leonardo B. Oliveira and   
             Julio López   Efficient software implementation of
                                  public-key cryptography on sensor
                                  networks using the MSP430X
                                  microcontroller  . . . . . . . . . . . . 19--29
                    Shay Gueron   Efficient software implementations of
                                  modular exponentiation . . . . . . . . . 31--43
              Claude Carlet and   
     Jean-Charles Faug\`ere and   
          Christopher Goyet and   
    Guénaël Renault   Analysis of the algebraic side channel
                                  attack . . . . . . . . . . . . . . . . . 45--62
       M. Abdelaziz Elaabid and   
                Sylvain Guilley   Portability of templates . . . . . . . . 63--74
             Roberto Avanzi and   
              Simon Hoerder and   
                   Dan Page and   
               Michael Tunstall   Erratum to: Side-channel attacks on the
                                  McEliece and Niederreiter public-key
                                  cryptosystems  . . . . . . . . . . . . . 75--75
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 2, Number 2, September, 2012

        Daniel J. Bernstein and   
                 Niels Duif and   
                Tanja Lange and   
              Peter Schwabe and   
                    Bo-Yin Yang   High-speed high-security signatures  . . 77--89
             M. Anwar Hasan and   
               Christophe Negre   Sequential multiplier with sub-linear
                                  gate complexity  . . . . . . . . . . . . 91--97
              Sung-Ming Yen and   
            Chien-Ning Chen and   
                   SangJae Moon   Multi-exponentiation algorithm based on
                                  binary GCD computation and its
                                  application to side-channel
                                  countermeasure . . . . . . . . . . . . . 99--110
               Thomas Roche and   
                Emmanuel Prouff   Higher-order glitch free implementation
                                  of the AES using Secure Multi--Party
                                  Computation protocols  . . . . . . . . . 111--127
             Julien Bringer and   
      Hervé Chabanne and   
                    Thanh Ha Le   Protecting AES against side-channel
                                  analysis using wire-tap codes  . . . . . 129--141
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 2, Number 3, October, 2012

              Markus Kasper and   
                Amir Moradi and   
            Georg T. Becker and   
             Oliver Mischke and   
           Tim Güneysu and   
              Christof Paar and   
                 Wayne Burleson   Side channels as building blocks . . . . 143--159
                Luke Mather and   
               Elisabeth Oswald   Pinpointing side-channel information
                                  leaks in web applications  . . . . . . . 161--177
    Vladimir Trujillo-Olaya and   
           Timothy Sherwood and   
   Çetin Kaya Koç   Analysis of performance versus security
                                  in hardware realizations of small
                                  elliptic curves for lightweight
                                  applications . . . . . . . . . . . . . . 179--188
          Saloomeh Shariati and   
François-Xavier Standaert and   
            Laurent Jacques and   
                    Benoit Macq   Analysis and experimental evaluation of
                                  image-based PUFs . . . . . . . . . . . . 189--206
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 2, Number 4, November, 2012

               Jean Da Rolt and   
                Amitabh Das and   
              Santosh Ghosh and   
          Giorgio Di Natale and   
         Marie-Lise Flottes and   
             Bruno Rouzeyre and   
             Ingrid Verbauwhede   Scan attacks on side-channel and fault
                                  attack resistant public-key
                                  implementations  . . . . . . . . . . . . 207--219
              Brian Baldwin and   
          Raveen R. Goundar and   
              Mark Hamilton and   
             William P. Marnane   Co-$Z$ ECC scalar multiplications for
                                  hardware, software and hardware-software
                                  co-design on embedded systems  . . . . . 221--240
                Shay Gueron and   
                   Vlad Krasnov   Parallelizing message schedules to
                                  accelerate the computations of hash
                                  functions  . . . . . . . . . . . . . . . 241--253
            Patrick Koeberl and   
                Jiangtao Li and   
                  Roel Maes and   
                Anand Rajan and   
              Claire Vishik and   
       Marcin Wójcik and   
                         Wei Wu   A practical device authentication scheme
                                  using SRAM PUFs  . . . . . . . . . . . . 255--269
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 3, Number 1, April, 2013

            Emmanuel Prouff and   
              Patrick Schaumont   Introduction to the CHES 2012 special
                                  issue  . . . . . . . . . . . . . . . . . 1--1
   Alexander Schlösser and   
          Dmitry Nedospasov and   
        Juliane Krämer and   
              Susanna Orlic and   
            Jean-Pierre Seifert   Simple photonic emission analysis of AES 3--15
       Ulrich Rührmair and   
                Marten van Dijk   On the practical use of physical
                                  unclonable functions in oblivious
                                  transfer and bit commitment protocols    17--28
               Stefan Heyse and   
               Tim Güneysu   Code-based cryptography on
                                  reconfigurable hardware: tweaking
                                  Niederreiter encryption for performance  29--43
    Beno\^\it Gérard and   
François-Xavier Standaert   Unified and optimized linear collision
                                  attacks and their application in a
                                  non-profiled setting: extended version   45--58
        Pierre-Alain Fouque and   
         Nicolas Guillermin and   
         Delphine Leresteux and   
             Mehdi Tibouchi and   
     Jean-Christophe Zapalowicz   Attacking RSA--CRT signatures with
                                  faults on Montgomery multiplication  . . 59--72
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 3, Number 2, June, 2013

              Sk Subidh Ali and   
       Debdeep Mukhopadhyay and   
               Michael Tunstall   Differential fault analysis of AES:
                                  towards reaching its limits  . . . . . . 73--97
          David P. Montminy and   
           Rusty O. Baldwin and   
          Michael A. Temple and   
                  Eric D. Laspe   Improving cross-device attacks using
                                  zero-mean unit-variance normalization    99--110
         Joseph A. Akinyele and   
           Christina Garman and   
                  Ian Miers and   
          Matthew W. Pagano and   
           Michael Rushanan and   
              Matthew Green and   
                 Aviel D. Rubin   Charm: a framework for rapidly
                                  prototyping cryptosystems  . . . . . . . 111--128
        Michael T. Kurdziel and   
            Marcin Lukowiak and   
          Michael A. Sanfilippo   Minimizing performance overhead in
                                  memory encryption  . . . . . . . . . . . 129--138
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 3, Number 3, September, 2013

 Mohamed Saied Emam Mohamed and   
          Stanislav Bulygin and   
             Michael Zohner and   
             Annelie Heuser and   
             Michael Walter and   
              Johannes Buchmann   Improved algebraic side-channel attack
                                  on AES . . . . . . . . . . . . . . . . . 139--156
            Maria Christofi and   
          Boutheina Chetali and   
               Louis Goubin and   
                 David Vigilant   Formal verification of a CRT--RSA
                                  implementation against fault attacks . . 157--167
    Sébastien Briais and   
            Jean-Luc Danger and   
                Sylvain Guilley   A formal study of two physical
                                  countermeasures against side channel
                                  attacks  . . . . . . . . . . . . . . . . 169--180
                     Mark Brown   Toward a taxonomy of communications
                                  security models  . . . . . . . . . . . . 181--195
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 3, Number 4, November, 2013

               Dai Yamamoto and   
             Kazuo Sakiyama and   
            Mitsugu Iwamoto and   
                 Kazuo Ohta and   
          Masahiko Takenaka and   
                   Kouichi Itoh   Variety enhancement of PUF responses
                                  using the locations of random outputting
                                  RS latches . . . . . . . . . . . . . . . 197--211
              Shivam Bhasin and   
            Sylvain Guilley and   
             Annelie Heuser and   
                Jean-Luc Danger   From cryptography to hardware: analyzing
                                  and protecting embedded Xilinx BRAM for
                                  cryptographic applications . . . . . . . 213--225
           Abdel Alim Kamal and   
                 Amr M. Youssef   Strengthening hardware implementations
                                  of NTRUEncrypt against fault analysis
                                  attacks  . . . . . . . . . . . . . . . . 227--240
            Jean-Luc Danger and   
            Sylvain Guilley and   
         Philippe Hoogvorst and   
      Cédric Murdica and   
                 David Naccache   A synthesis of side-channel attacks on
                                  elliptic curve cryptography in
                                  smart-cards  . . . . . . . . . . . . . . 241--265
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 4, Number 1, April, 2014

              Guido Bertoni and   
    Jean-Sébastien Coron   Introduction to the CHES 2013 special
                                  issue  . . . . . . . . . . . . . . . . . 1--1
            Thomaz Oliveira and   
         Julio López and   
            Diego F. Aranha and   
Francisco Rodríguez-Henríquez   Two is the fastest prime: lambda
                                  coordinates for binary elliptic curves   3--17
            Georg T. Becker and   
        Francesco Regazzoni and   
              Christof Paar and   
              Wayne P. Burleson   Stealthy dopant-level hardware Trojans:
                                  extended version . . . . . . . . . . . . 19--31
             Elke De Mulder and   
             Michael Hutter and   
             Mark E. Marson and   
                  Peter Pearson   Using Bleichenbacher's solution to the
                                  hidden number problem to attack nonce
                                  leaks in $ 384$-bit ECDSA: extended
                                  version  . . . . . . . . . . . . . . . . 33--45
             Vincent Grosso and   
François-Xavier Standaert and   
                Sebastian Faust   Masking vs. multiparty computation: how
                                  large is the gap for AES?  . . . . . . . 47--57
           Takeshi Sugawara and   
             Daisuke Suzuki and   
               Minoru Saeki and   
           Mitsuru Shiozaki and   
                 Takeshi Fujino   On measurable side-channel leaks inside
                                  ASIC design primitives . . . . . . . . . 59--73
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 4, Number 2, June, 2014

        Leonardo C. Almeida and   
         Ewerton R. Andrade and   
     Paulo S. L. M. Barreto and   
       Marcos A. Simplicio, Jr.   Lyra: password-based key derivation with
                                  tunable memory and processing costs  . . 75--89
                Chistophe Negre   Efficient binary polynomial
                                  multiplication based on optimized
                                  Karatsuba reconstruction . . . . . . . . 91--106
              Claude Carlet and   
            Jean-Luc Danger and   
            Sylvain Guilley and   
Emmanuel Prouff Houssem Maghrebi   Achieving side-channel high-order
                                  correlation immunity with leakage
                                  squeezing  . . . . . . . . . . . . . . . 107--121
            Felipe P. Biasi and   
     Paulo S. L. M. Barreto and   
            Rafael Misoczki and   
             Wilson V. Ruggiero   Scaling efficient code-based
                                  cryptosystems for embedded platforms . . 123--134
                Goutam Paul and   
           Anupam Chattopadhyay   Designing stream ciphers with scalable
                                  data-widths: a case study with HC-128    135--143
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 4, Number 3, September, 2014

                    N. Moro and   
               K. Heydemann and   
                E. Encrenaz and   
                    B. Robisson   Formal verification of a software
                                  countermeasure against instruction skip
                                  attacks  . . . . . . . . . . . . . . . . 145--156
            Sonia Bela\"\id and   
         Fabrizio De Santis and   
              Johann Heyszl and   
             Stefan Mangard and   
              Marcel Medwed and   
   Jòrn-Marc Schmidt and   
François-Xavier Standaert and   
                 Stefan Tillich   Towards fresh re-keying with
                                  leakage-resilient PRFs: cipher design
                                  principles and analysis  . . . . . . . . 157--171
                Pablo Rauzy and   
                Sylvain Guilley   A formal proof of countermeasures
                                  against fault injection attacks on
                                  CRT--RSA . . . . . . . . . . . . . . . . 173--185
                 Dina Kamel and   
            Mathieu Renauld and   
              Denis Flandre and   
François-Xavier Standaert   Understanding the limitations and
                                  improving the relevance of SPICE
                                  simulations in side-channel security
                                  evaluations  . . . . . . . . . . . . . . 187--195
                   S. Tiran and   
                   S. Ordas and   
                  Y. Teglia and   
                  M. Agoyan and   
                     P. Maurine   A model of the leakage in the frequency
                                  domain and its application to CPA and
                                  DPA  . . . . . . . . . . . . . . . . . . 197--212
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??

Journal of Cryptographic Engineering
Volume 4, Number 4, November, 2014

           Werner Schindler and   
                Andreas Wiemers   Power attacks in the presence of
                                  exponent blinding  . . . . . . . . . . . 213--236
          Sabyasachi Karati and   
                Abhijit Das and   
     Dipanwita Roychowdhury and   
             Bhargav Bellur and   
     Debojyoti Bhattacharya and   
                   Aravind Iyer   New algorithms for batch verification of
                                  standard ECDSA signatures  . . . . . . . 237--258
         Christophe Clavier and   
            Jean-Luc Danger and   
              Guillaume Duc and   
       M. Abdelaziz Elaabid and   
    Beno\^\it Gérard and   
            Sylvain Guilley and   
             Annelie Heuser and   
             Michael Kasper and   
                    Yang Li and   
        Victor Lomné and   
            Daisuke Nakatsu and   
                 Kazuo Ohta and   
             Kazuo Sakiyama and   
            Laurent Sauvage and   
           Werner Schindler and   
                          et al   Practical improvements of side-channel
                                  attacks on AES: feedback from the 2nd
                                  DPA contest  . . . . . . . . . . . . . . 259--274
                   Joppe W. Bos   Constant time modular inversion  . . . . 275--281
                      Anonymous   Help & Contacts . . . . . . . . . . . . . ??


Journal of Cryptographic Engineering
Volume 5, Number 1, April, 2015

          Joshua R. Templin and   
                Jason R. Hamlet   A new power-aware FPGA design metric . . 1--11
            Subhadeep Banik and   
            Subhamoy Maitra and   
                 Santanu Sarkar   Improved differential fault attack on
                                  MICKEY 2.0 . . . . . . . . . . . . . . . 13--29
Armando Faz-Hernández and   
              Patrick Longa and   
          Ana H. Sánchez   Efficient and secure algorithms for
                                  GLV-based scalar multiplication and
                                  their implementation on GLV--GLS curves
                                  (extended version) . . . . . . . . . . . 31--52
              Colin O'Flynn and   
                  Zhizhang Chen   Synchronous sampling and clock recovery
                                  of internal oscillators for side channel
                                  analysis and fault injection . . . . . . 53--69

Journal of Cryptographic Engineering
Volume 5, Number 2, June, 2015

               Lejla Batina and   
               M. J. B. Robshaw   Introduction to the CHES 2014 special
                                  issue  . . . . . . . . . . . . . . . . . 71--72
Jean-Sébastien Coron and   
                  Arnab Roy and   
                 Srinivas Vivek   Fast evaluation of polynomials over
                                  binary finite fields and application to
                                  side-channel countermeasures . . . . . . 73--83
           Takeshi Sugawara and   
             Daisuke Suzuki and   
              Ryoichi Fujii and   
              Shigeaki Tawa and   
                Ryohei Hori and   
           Mitsuru Shiozaki and   
                 Takeshi Fujino   Reversing stealthy dopant-level circuits 85--94
              Daniel Genkin and   
              Itamar Pipman and   
                    Eran Tromer   Get your hands off my laptop: physical
                                  side-channel key-extraction attacks on
                                  PCs  . . . . . . . . . . . . . . . . . . 95--112
                 Jo Vliegen and   
               Nele Mentens and   
                  Dirk Koch and   
          Dries Schellekens and   
             Ingrid Verbauwhede   Practical feasibility evaluation and
                                  improvement of a pay-per-use licensing
                                  scheme for hardware IP cores in Xilinx
                                  FPGAs  . . . . . . . . . . . . . . . . . 113--122
               Liran Lerman and   
          Gianluca Bontempi and   
             Olivier Markowitch   A machine learning approach against a
                                  masked AES . . . . . . . . . . . . . . . 123--139
                Shay Gueron and   
                   Vlad Krasnov   Fast prime field elliptic-curve
                                  cryptography with $ 256$-bit primes  . . 141--151

Journal of Cryptographic Engineering
Volume 5, Number 3, September, 2015

                Xiaofei Guo and   
       Debdeep Mukhopadhyay and   
                Chenglu Jin and   
                   Ramesh Karri   Security analysis of concurrent error
                                  detection against differential fault
                                  analysis . . . . . . . . . . . . . . . . 153--169
            Guilherme Perin and   
             Laurent Imbert and   
           Philippe Maurine and   
                  Lionel Torres   Vertical and horizontal correlation
                                  attacks on RNS-based exponentiations . . 171--185
               Dai Yamamoto and   
             Kazuo Sakiyama and   
            Mitsugu Iwamoto and   
                 Kazuo Ohta and   
          Masahiko Takenaka and   
               Kouichi Itoh and   
                    Naoya Torii   A new method for enhancing variety and
                                  maintaining reliability of PUF responses
                                  and its evaluation on ASICs  . . . . . . 187--199
             Michael Hutter and   
                  Peter Schwabe   Multiprecision multiplication on AVR
                                  revisited  . . . . . . . . . . . . . . . 201--214
               Manuel Bluhm and   
                    Shay Gueron   Fast software implementation of binary
                                  elliptic curve cryptography  . . . . . . 215--226

Journal of Cryptographic Engineering
Volume 5, Number 4, November, 2015

                  Yunsi Fei and   
               A. Adam Ding and   
                   Jian Lao and   
                    Liwei Zhang   A statistics-based success rate model
                                  for DPA and CPA  . . . . . . . . . . . . 227--243
            Jason R. Hamlet and   
              Robert W. Brocato   Throughput-optimized implementations of
                                  QUAD . . . . . . . . . . . . . . . . . . 245--254
               Liran Lerman and   
          Gianluca Bontempi and   
             Olivier Markowitch   The bias-variance decomposition in
                                  profiled attacks . . . . . . . . . . . . 255--267
         Simone Bongiovanni and   
       Francesco Centurelli and   
            Giuseppe Scotti and   
          Alessandro Trifiletti   Design and validation through a
                                  frequency-based metric of a new
                                  countermeasure to protect nanometer ICs
                                  from side-channel attacks  . . . . . . . 269--288
                 Murat Cenk and   
                 M. Anwar Hasan   Some new results on binary polynomial
                                  multiplication . . . . . . . . . . . . . 289--303


Journal of Cryptographic Engineering
Volume 6, Number 1, April, 2016

                Alan G. Konheim   Automated teller machines: their history
                                  and authentication protocols . . . . . . 1--29
   Alejandro Cabrera Aldaya and   
Alejandro J. Cabrera Sarmiento and   
 Santiago Sánchez-Solano   AES T-Box tampering attack . . . . . . . 31--48
              Houda Ferradi and   
  Rémi Géraud and   
             David Naccache and   
                     Assia Tria   When organized crime applies academic
                                  results: a forensic analysis of an
                                  in-card listening device . . . . . . . . 49--59
               Pierre Bayon and   
             Lilian Bossuet and   
               Alain Aubert and   
                 Viktor Fischer   Fault model of electromagnetic attacks
                                  targeting ring oscillator-based true
                                  random number generators . . . . . . . . 61--74
      Markku-Juhani O. Saarinen   The BRUTUS automatic cryptanalytic
                                  framework  . . . . . . . . . . . . . . . 75--82

Journal of Cryptographic Engineering
Volume 6, Number 2, June, 2016

           Tim Güneysu and   
               Helena Handschuh   Introduction to the CHES 2015 special
                                  issue  . . . . . . . . . . . . . . . . . 83--84
           Tobias Schneider and   
                    Amir Moradi   Leakage assessment methodology . . . . . 85--99
               Werner Schindler   Exclusive exponent blinding is not
                                  enough to prevent any timing attack on
                                  RSA  . . . . . . . . . . . . . . . . . . 101--119
                  Roel Maes and   
      Vincent van der Leest and   
         Erik van der Sluis and   
                  Frans Willems   Secure key generation from biased PUFs:
                                  extended version . . . . . . . . . . . . 121--137
              Oscar Reparaz and   
            Sujoy Sinha Roy and   
             Ruan de Clercq and   
       Frederik Vercauteren and   
             Ingrid Verbauwhede   Masking ring-LWE . . . . . . . . . . . . 139--153
                Iwen Coisel and   
                Ignacio Sanchez   Improved cryptanalysis of the DECT
                                  standard cipher  . . . . . . . . . . . . 155--169

Journal of Cryptographic Engineering
Volume 6, Number 3, September, 2016

              Daniel Lemire and   
                     Owen Kaser   Faster $ 64$-bit universal hashing using
                                  carry-less multiplications . . . . . . . 171--185
          Raveen R. Goundar and   
                      Marc Joye   Inversion-free arithmetic on elliptic
                                  curves through isomorphisms  . . . . . . 187--199
                Pablo Rauzy and   
            Sylvain Guilley and   
                   Zakaria Najm   Formally proved security of assembly
                                  code against power analysis  . . . . . . 201--216
             Bruno Robisson and   
      Hél\`ene Le Bouder   Physical functions: the common factor of
                                  side-channel and fault attacks?  . . . . 217--227
              David Galindo and   
Johann Großschädl and   
                    Zhe Liu and   
      Praveen Kumar Vadnala and   
                 Srinivas Vivek   Implementation of a leakage-resilient
                                  ElGamal key encapsulation mechanism  . . 229--238
              Xuan Thuy Ngo and   
               Zakaria Najm and   
              Shivam Bhasin and   
            Sylvain Guilley and   
                Jean-Luc Danger   Method taking into account process
                                  dispersion to detect hardware Trojan
                                  Horse by side-channel analysis . . . . . 239--247
              Fatemeh Ganji and   
               Shahin Tajik and   
            Jean-Pierre Seifert   PAC learning of arbiter PUFs . . . . . . 249--258

Journal of Cryptographic Engineering
Volume 6, Number 4, November, 2016

               Joppe W. Bos and   
             Craig Costello and   
              Patrick Longa and   
                Michael Naehrig   Selecting elliptic curves for
                                  cryptography: an efficiency and security
                                  analysis . . . . . . . . . . . . . . . . 259--286
               Erich Wenger and   
                   Paul Wolfger   Harder, better, faster, stronger:
                                  elliptic curve discrete logarithm
                                  computations on FPGAs  . . . . . . . . . 287--297
              Ayesha Khalid and   
            Muhammad Hassan and   
                Goutam Paul and   
           Anupam Chattopadhyay   RunFein: a rapid prototyping framework
                                  for Feistel and SPN-based block ciphers  299--323
                Samer Moein and   
               Fayez Gebali and   
              T. Aaron Gulliver   Hardware attacks: an algebraic approach  325--337
     Amir Hamzah Abd Ghafar and   
   Muhammad Rezal Kamel Ariffin   SPA on Rabin variant with public key $ N
                                  = p^2 q $  . . . . . . . . . . . . . . . 339--346


Journal of Cryptographic Engineering
Volume 7, Number 1, April, 2017

            Mathieu Carbone and   
             Yannick Teglia and   
         Gilles R. Ducharme and   
               Philippe Maurine   Mutual information analysis:
                                  higher-order statistical moments,
                                  efficiency and efficacy  . . . . . . . . 1--17
                Sylvain Guilley   Editorial about PROOFS 2015  . . . . . . 19--20
Noreddine El Janati El Idrissi and   
         Guillaume Bouffard and   
           Jean-Louis Lanet and   
                  Said El Hajji   Trust can be misplaced . . . . . . . . . 21--34
            Shoei Nashimoto and   
              Naofumi Homma and   
            Yu-ichi Hayashi and   
            Junko Takahashi and   
               Hitoshi Fuji and   
                  Takafumi Aoki   Buffer overflow attack with multiple
                                  fault injection and a proven
                                  countermeasure . . . . . . . . . . . . . 35--46
             Bruno Robisson and   
              Michel Agoyan and   
             Patrick Soquet and   
 Sébastien Le-Henaff and   
       Franck Wajsbürt and   
      Pirouz Bazargan-Sabet and   
                 Guillaume Phan   Smart security management in secure
                                  devices  . . . . . . . . . . . . . . . . 47--61
              Florian Lugou and   
           Ludovic Apvrille and   
     Aurélien Francillon   SMASHUP: a toolchain for unified
                                  verification of hardware/software
                                  co-designs . . . . . . . . . . . . . . . 63--74
                Sabine Azzi and   
               Bruno Barras and   
            Maria Christofi and   
                 David Vigilant   Using linear codes as a fault
                                  countermeasure for nonlinear operations:
                                  application to AES and formal
                                  verification . . . . . . . . . . . . . . 75--85
            Laurent Sauvage and   
                Tarik Graba and   
            Thibault Porteboeuf   Multi-level formal verification  . . . . 87--95

Journal of Cryptographic Engineering
Volume 7, Number 2, June, 2017

         Benedikt Gierlichs and   
              Axel Y. Poschmann   Introduction to the CHES 2016 special
                                  issue  . . . . . . . . . . . . . . . . . 97--98
                Yuval Yarom and   
              Daniel Genkin and   
                 Nadia Heninger   CacheBleed: a timing attack on OpenSSL
                                  constant-time RSA  . . . . . . . . . . . 99--112
              Fatemeh Ganji and   
               Shahin Tajik and   
   Fabian Fäßler and   
            Jean-Pierre Seifert   Having no mathematical model may not
                                  secure PUFs  . . . . . . . . . . . . . . 113--128
    François Durvaux and   
François-Xavier Standaert and   
         Santos Merino Del Pozo   Towards easy leakage certification:
                                  extended version . . . . . . . . . . . . 129--147
                  Erik Boss and   
             Vincent Grosso and   
           Tim Güneysu and   
             Gregor Leander and   
                Amir Moradi and   
               Tobias Schneider   Strong $8$-bit Sboxes with efficient
                                  masking in hardware extended version . . 149--165

Journal of Cryptographic Engineering
Volume 7, Number 3, September, 2017

            Paul Bottinelli and   
                   Joppe W. Bos   Computational aspects of correlation
                                  power analysis . . . . . . . . . . . . . 167--181
                   S. Ordas and   
          L. Guillaume-Sage and   
                     P. Maurine   Electromagnetic fault injection: the
                                  curse of flip-flops  . . . . . . . . . . 183--197
         Pawel Swierczynski and   
               Marc Fyrbiak and   
              Philipp Koppe and   
                Amir Moradi and   
                  Christof Paar   Interdiction in practice --- Hardware
                                  Trojan against a high-security USB flash
                                  drive  . . . . . . . . . . . . . . . . . 199--211
             Matthew Mayhew and   
                   Radu Muresan   An overview of hardware-level
                                  statistical power analysis attack
                                  countermeasures  . . . . . . . . . . . . 213--244
           Christophe Negre and   
                Thomas Plantard   Efficient regular modular exponentiation
                                  using multiplicative half-size splitting 245--253

Journal of Cryptographic Engineering
Volume 7, Number 4, November, 2017

           Werner Schindler and   
                Andreas Wiemers   Generic power attacks on RSA with CRT
                                  and exponent blinding: new results . . . 255--272
   Alejandro Cabrera Aldaya and   
Alejandro J. Cabrera Sarmiento and   
 Santiago Sánchez-Solano   SPA vulnerabilities of the binary
                                  extended Euclidean algorithm . . . . . . 273--285
               Enes Pasalic and   
       Anupam Chattopadhyay and   
                   WeiGuo Zhang   Efficient implementation of generalized
                                  Maiorana--McFarland class of
                                  cryptographic functions  . . . . . . . . 287--295
                  Naofumi Homma   Introduction to the PROOFS 2016 special
                                  section  . . . . . . . . . . . . . . . . 297--298
        Sarani Bhattacharya and   
           Debdeep Mukhopadhyay   Formal fault analysis of branch
                                  predictors: attacking countermeasures of
                                  asymmetric key ciphers . . . . . . . . . 299--310
               Jakub Breier and   
               Dirmanto Jap and   
                  Shivam Bhasin   A study on analyzing side-channel
                                  resistant encoding schemes with respect
                                  to fault attacks . . . . . . . . . . . . 311--320
           Margaux Dugardin and   
            Sylvain Guilley and   
              Martin Moreau and   
               Zakaria Najm and   
                    Pablo Rauzy   Using modular extension to provably
                                  protect Edwards curves against fault
                                  attacks  . . . . . . . . . . . . . . . . 321--330
            Nicolas Bruneau and   
            Sylvain Guilley and   
             Annelie Heuser and   
              Damien Marion and   
                  Olivier Rioul   Optimal side-channel attacks for
                                  multivariate leakages and multiple
                                  models . . . . . . . . . . . . . . . . . 331--341
              Stjepan Picek and   
             Annelie Heuser and   
                Sylvain Guilley   Template attack versus Bayes classifier  343--351


Journal of Cryptographic Engineering
Volume 8, Number 1, April, 2018

                    Qian Ge and   
                Yuval Yarom and   
                 David Cock and   
                  Gernot Heiser   A survey of microarchitectural timing
                                  attacks and countermeasures on
                                  contemporary hardware  . . . . . . . . . 1--27
           Avik Chakraborti and   
       Anupam Chattopadhyay and   
            Muhammad Hassan and   
                   Mridul Nandi   TriviA and uTriviA: two fast and secure
                                  authenticated encryption schemes . . . . 29--48
         Debrup Chakraborty and   
Cuauhtemoc Mancillas López and   
                  Palash Sarkar   Disk encryption: do we need to preserve
                                  length?  . . . . . . . . . . . . . . . . 49--69
      Markku-Juhani O. Saarinen   Arithmetic coding and blinding
                                  countermeasures for lattice signatures   71--84
              Houda Ferradi and   
  Rémi Géraud and   
               Diana Maimut and   
             David Naccache and   
               Amaury de Wargny   Regulating the pace of von Neumann
                                  correctors . . . . . . . . . . . . . . . 85--91

Journal of Cryptographic Engineering
Volume 8, Number 2, June, 2018

            Wieland Fischer and   
                  Naofumi Homma   Introduction to the CHES 2017 special
                                  issue  . . . . . . . . . . . . . . . . . 93--94
                      Tung Chou   McBits revisited: toward a fast
                                  constant-time code-based KEM . . . . . . 95--107
               Hannes Gross and   
                 Stefan Mangard   A unified masking approach . . . . . . . 109--124
             Vincent Immler and   
              Robert Specht and   
             Florian Unterstein   Your rails cannot hide from localized
                                  EM: how dual-rail logic fails on FPGAs
                                  --- extended version . . . . . . . . . . 125--139
        George Hatzivasilis and   
     Konstantinos Fysarakis and   
     Ioannis Papaefstathiou and   
          Charalampos Manifavas   A review of lightweight block ciphers    141--184

Journal of Cryptographic Engineering
Volume 8, Number 3, September, 2018

Francisco Rodríguez-Henríquez and   
                    Erkay Savas   Special issue in honor of Peter Lawrence
                                  Montgomery . . . . . . . . . . . . . . . 185--187
         Jean-Claude Bajard and   
              Julien Eynard and   
                 Nabil Merkiche   Montgomery reduction within the context
                                  of residue number system arithmetic  . . 189--200
                Erkay Savas and   
   Çetin Kaya Koç   Montgomery inversion . . . . . . . . . . 201--210
               Wangchen Dai and   
               Ray C. C. Cheung   Spectral arithmetic in Montgomery
                                  modular multiplication . . . . . . . . . 211--226
             Craig Costello and   
                 Benjamin Smith   Montgomery curves and their arithmetic   227--240
            Thomaz Oliveira and   
         Julio López and   
Francisco Rodr\'ìguez-Henr\'ìquez   The Montgomery ladder on binary elliptic
                                  curves . . . . . . . . . . . . . . . . . 241--258
                     Murat Cenk   Karatsuba-like formulae and their
                                  associated techniques  . . . . . . . . . 259--269

Journal of Cryptographic Engineering
Volume 8, Number 4, November, 2018

           Luckas A. Farias and   
         Bruno C. Albertini and   
         Paulo S. L. M. Barreto   A class of safe and efficient binary
                                  Edwards curves . . . . . . . . . . . . . 271--283
        Kimmo Järvinen and   
            Sujoy Sinha Roy and   
             Ingrid Verbauwhede   Arithmetic of $ \tau $-adic expansions
                                  for lightweight Koblitz curve
                                  cryptography . . . . . . . . . . . . . . 285--300
               Liran Lerman and   
            Romain Poussier and   
         Olivier Markowitch and   
François-Xavier Standaert   Template attacks versus machine learning
                                  revisited and the curse of
                                  dimensionality in side-channel analysis:
                                  extended version . . . . . . . . . . . . 301--313
                John DeVale and   
                Ryan Rakvic and   
                     Kevin Rudd   Another dimension in integrated circuit
                                  trust  . . . . . . . . . . . . . . . . . 315--326
            Sandip Karmakar and   
        Dipanwita Roy Chowdhury   Scan-based side channel attack on stream
                                  ciphers and its prevention . . . . . . . 327--340
                 Boris Skori\'c   A trivial debiasing scheme for Helper
                                  Data Systems . . . . . . . . . . . . . . 341--349
               Yssouf Dosso and   
             Fabien Herbaut and   
      Nicolas Méloni and   
            Pascal Véron   Euclidean addition chains scalar
                                  multiplication on curves with efficient
                                  endomorphism . . . . . . . . . . . . . . 351--367


Journal of Cryptographic Engineering
Volume 9, Number 1, April, 2019

           Aaron Hutchinson and   
                 Koray Karabina   Constructing multidimensional
                                  differential addition chains and their
                                  applications . . . . . . . . . . . . . . 1--19
               Lejla Batina and   
        \Lukasz Chmielewski and   
   Louiza Papachristodoulou and   
              Peter Schwabe and   
               Michael Tunstall   Online template attacks  . . . . . . . . 21--36
              Ibrahima Diop and   
                Yanis Linge and   
               Thomas Ordas and   
        Pierre-Yvan Liardet and   
               Philippe Maurine   From theory to practice: horizontal
                                  attacks on protected implementations of
                                  modular exponentiations  . . . . . . . . 37--52
                Dhiman Saha and   
        Dipanwita Roy Chowdhury   Internal differential fault analysis of
                                  parallelizable ciphers in the
                                  counter-mode . . . . . . . . . . . . . . 53--67
            Subhadeep Banik and   
            Andrey Bogdanov and   
            Francesco Regazzoni   Compact circuits for combined AES
                                  encryption/decryption  . . . . . . . . . 69--83
                Alan G. Konheim   Horst Feistel: the inventor of LUCIFER,
                                  the cryptographic algorithm that changed
                                  cryptology . . . . . . . . . . . . . . . 85--100

Journal of Cryptographic Engineering
Volume 9, Number 2, June, 2019

                   Rei Ueno and   
              Naofumi Homma and   
            Yasuyuki Nogami and   
                  Takafumi Aoki   Highly efficient $ \textit {GF}(2^8) $
                                  inversion circuit based on hybrid GF
                                  representations  . . . . . . . . . . . . 101--113
           Jean-Marc Robert and   
           Christophe Negre and   
                Thomas Plantard   Efficient Fixed-base exponentiation and
                                  scalar multiplication based on a
                                  multiplicative splitting exponent
                                  recoding . . . . . . . . . . . . . . . . 115--136
       Thomas Unterluggauer and   
               Mario Werner and   
                 Stefan Mangard   MEAS: memory encryption and
                                  authentication secure against
                                  side-channel attacks . . . . . . . . . . 137--158
          Biagio Peccerillo and   
           Sandro Bartolini and   
   Çetin Kaya Koç   Parallel bitsliced AES through PHAST: a
                                  single-source high-performance library
                                  for multi-cores and GPUs . . . . . . . . 159--171
             Michael Hutter and   
               Michael Tunstall   Constant-time higher-order
                                  Boolean-to-arithmetic masking  . . . . . 173--184
            Vincent Herbert and   
             Bhaskar Biswas and   
              Caroline Fontaine   Design and implementation of low-depth
                                  pairing-based homomorphic encryption
                                  scheme . . . . . . . . . . . . . . . . . 185--201

Journal of Cryptographic Engineering
Volume 9, Number 3, September, 2019

             Sayandeep Saha and   
              Ujjawal Kumar and   
       Debdeep Mukhopadhyay and   
                Pallab Dasgupta   An automated framework for exploitable
                                  fault identification in block ciphers    203--219
                Nils Wisiol and   
                 Marian Margraf   Why attackers lose: design and security
                                  analysis of arbitrarily large XOR
                                  arbiter PUFs . . . . . . . . . . . . . . 221--230
       In\`es Ben~El~Ouahma and   
         Quentin L. Meunier and   
           Karine Heydemann and   
            Emmanuelle Encrenaz   Side-channel robustness analysis of
                                  masked assembly codes using a symbolic
                                  approach . . . . . . . . . . . . . . . . 231--242
          Christoph Baumann and   
             Oliver Schwarz and   
                       Mads Dam   On the verification of system-level
                                  information flow properties for
                                  virtualized execution platforms  . . . . 243--261
                Poulami Das and   
         Debapriya Basu Roy and   
           Debdeep Mukhopadhyay   Automatic generation of HCCA-resistant
                                  scalar multiplication algorithm by
                                  proper sequencing of field multiplier
                                  operands . . . . . . . . . . . . . . . . 263--275
  Rémi Géraud and   
                 David Naccache   Mixed-radix Naccache--Stern encryption   277--282
                Daniel Dinu and   
              Yann Le Corre and   
        Dmitry Khovratovich and   
          Léo Perrin and   
Johann Großschädl and   
                  Alex Biryukov   Triathlon of lightweight block ciphers
                                  for the Internet of Things . . . . . . . 283--302
              Claude Carlet and   
           Abderrahman Daif and   
            Sylvain Guilley and   
        Cédric Tavernier   Polynomial direct sum masking to protect
                                  against both SCA and FIA . . . . . . . . 303--312

Journal of Cryptographic Engineering
Volume 9, Number 4, November, 2019

          Shinichi Kawamura and   
              Yuichi Komano and   
              Hideo Shimizu and   
                Tomoko Yonemura   RNS Montgomery reduction algorithms
                                  using quadratic residuosity  . . . . . . 313--331
             Gokay Saldamli and   
                   Yoo-Jin Baek   Uniform Montgomery multiplier  . . . . . 333--339
                Nir Drucker and   
                    Shay Gueron   A toolbox for software optimization of
                                  QC--MDPC code-based cryptosystems  . . . 341--357
            Gustavo Banegas and   
    Ricardo Custódio and   
                 Daniel Panario   A new class of irreducible pentanomials
                                  for polynomial-based multipliers in
                                  binary fields  . . . . . . . . . . . . . 359--373
          Marco Cianfriglia and   
            Stefano Guarino and   
          Massimo Bernaschi and   
            Flavio Lombardi and   
                 Marco Pedicini   Kite attack: reshaping the cube attack
                                  for a flexible GPU-based maxterm search  375--392
                Alla Levina and   
             Roman Mostovoi and   
            Daria Sleptsova and   
             Lavrentii Tcvetkov   Physical model of sensitive data leakage
                                  from PC-based cryptographic systems  . . 393--400
                     Tao Wu and   
                    Ruomei Wang   Fast unified elliptic curve point
                                  multiplication for NIST prime curves on
                                  FPGAs  . . . . . . . . . . . . . . . . . 401--410


Journal of Cryptographic Engineering
Volume 10, Number 1, April, 2020

             Damien Jauvart and   
            Nadia El Mrabet and   
     Jacques J. A. Fournier and   
                   Louis Goubin   Improving side-channel attacks against
                                  pairing-based cryptography . . . . . . . 1--16
              Gilles Barthe and   
            Sonia Bela\"\id and   
 François Dupressoir and   
        Pierre-Alain Fouque and   
   Benjamin Grégoire and   
François-Xavier Standaert and   
              Pierre-Yves Strub   Improved parallel mask refreshing
                                  algorithms: generic solutions with
                                  parametrized non-interference and
                                  automated optimizations  . . . . . . . . 17--26
     Rodrigo Abarzúa and   
      Santi Martínez and   
            Valeria Mendoza and   
       Nicolas Thériault   Same value analysis on Edwards curves    27--48
               Louis Goubin and   
            Pascal Paillier and   
            Matthieu Rivain and   
                    Junwei Wang   How to reveal the secrets of an obscure
                                  white-box implementation . . . . . . . . 49--66
             Oliver Willers and   
           Christopher Huth and   
             Jorge Guajardo and   
              Helmut Seidel and   
                  Peter Deutsch   On the feasibility of deriving
                                  cryptographic keys from MEMS sensors . . 67--83
              Yuanyuan Zhou and   
François-Xavier Standaert   Deep learning mitigates but does not
                                  annihilate the need of aligned traces
                                  and a generalized ResNet model for
                                  side-channel attacks . . . . . . . . . . 85--95

Journal of Cryptographic Engineering
Volume 10, Number 2, June, 2020

               Joppe W. Bos and   
           Simon J. Friedberger   Faster modular arithmetic for
                                  isogeny-based crypto on embedded devices 97--109
Laurent-Stéphane Didier and   
        Fangan-Yssouf Dosso and   
            Pascal Véron   Efficient modular operations using the
                                  adapted modular number system  . . . . . 111--133
           Benjamin Hettwer and   
              Stefan Gehrer and   
               Tim Güneysu   Applications of machine learning
                                  techniques in side-channel attacks: a
                                  survey . . . . . . . . . . . . . . . . . 135--162
             Ryad Benadjila and   
            Emmanuel Prouff and   
        Rémi Strullu and   
             Eleonora Cagli and   
            Cécile Dumas   Deep learning for side-channel analysis
                                  and introduction to ASCAD database . . . 163--188
  Mohammad Ali Orumiehchiha and   
              Saeed Rostami and   
              Elham Shakour and   
                 Josef Pieprzyk   A differential fault attack on the WG
                                  family of stream ciphers . . . . . . . . 189--195

Journal of Cryptographic Engineering
Volume 10, Number 3, September, 2020

      Alessandro De Piccoli and   
            Andrea Visconti and   
           Ottavio Giulio Rizzo   Polynomial multiplication over binary
                                  finite fields: new upper bounds  . . . . 197--210
             Rafael J. Cruz and   
   Antonio Guimarães and   
                Diego F. Aranha   Efficient and secure software
                                  implementations of Fantomas  . . . . . . 211--228
            Matthias Hiller and   
      Ludwig Kürzinger and   
                     Georg Sigl   Review of error correction for PUFs and
                                  evaluation on state-of-the-art FPGAs . . 229--247
        Dimitrios Schoinianakis   Residue arithmetic systems in
                                  cryptography: a survey on modern
                                  security applications  . . . . . . . . . 249--267
                Andreas Wiemers   A remark on a success rate model for
                                  side-channel attack analysis . . . . . . 269--274
            Bastian Richter and   
                    Amir Moradi   Template attacks on nano-scale CMOS
                                  devices  . . . . . . . . . . . . . . . . 275--285

Journal of Cryptographic Engineering
Volume 10, Number 4, November, 2020

               Lejla Batina and   
                   Nele Mentens   PROOFS 2018 Editorial  . . . . . . . . . 287--287
                Manaar Alam and   
       Debdeep Mukhopadhyay and   
       Sai Praveen Kadiyala and   
               Siew-Kei Lam and   
        Thambipillai Srikanthan   Improving accuracy of HPC-based malware
                                  classification for embedded platforms
                                  using gradient descent optimization  . . 289--303
           Danilo Sijaci\'c and   
              Josep Balasch and   
                 Bohan Yang and   
              Santosh Ghosh and   
             Ingrid Verbauwhede   Towards efficient and automated
                                  side-channel evaluations at design time  305--319
                   Mael Gay and   
                 Batya Karp and   
                Osnat Keren and   
                    Ilia Polian   Error control scheme for malicious and
                                  natural faults in cryptographic modules  321--336
              Maamar Ouladj and   
            Nadia El Mrabet and   
            Sylvain Guilley and   
           Philippe Guillot and   
       Gilles Millérioux   On the power of template attacks in
                                  highly multivariate context  . . . . . . 337--354
              Anubhab Baksi and   
                Dhiman Saha and   
                 Sumanta Sarkar   To infect or not to infect: a critical
                                  analysis of infective countermeasures in
                                  fault attacks  . . . . . . . . . . . . . 355--374


Journal of Cryptographic Engineering
Volume 11, Number 1, April, 2021

               Sze Ling Yeo and   
               Duc-Phong Le and   
                Khoongming Khoo   Improved algebraic attacks on
                                  lightweight block ciphers  . . . . . . . 1--19
Amanda Cristina Davi Resende and   
        Diego de Freitas Aranha   Faster unbalanced Private Set
                                  Intersection in the semi-honest setting  21--38
          Olivier Bronchain and   
           Tobias Schneider and   
François-Xavier Standaert   Reducing risks through simplicity: high
                                  side-channel security for lazy engineers 39--55
          Geovandro Pereira and   
            Javad Doliskani and   
                      David Jao   $x$-only point addition formula and
                                  faster compressed SIKE . . . . . . . . . 57--69
     Rodrigo Abarzúa and   
           Claudio Valencia and   
             Julio López   Survey on performance and security
                                  problems of countermeasures for passive
                                  side-channel attacks on ECC  . . . . . . 71--102

Journal of Cryptographic Engineering
Volume 11, Number 2, June, 2021

           Karine Heydemann and   
                     Letitia Li   Editorial about PROOFS 2019  . . . . . . 103--104
              Fatemeh Ganji and   
               Shahin Tajik and   
              Pascal Stauss and   
        Jean-Pierre Seifert and   
           Mark Tehranipoor and   
                  Domenic Forte   Rock'n'roll PUFs: crafting provably
                                  secure PUFs from less secure ones
                                  (extended version) . . . . . . . . . . . 105--118
                  Wei Cheng and   
              Claude Carlet and   
               Kouassi Goli and   
            Jean-Luc Danger and   
                Sylvain Guilley   Detecting faults in inner product
                                  masking scheme . . . . . . . . . . . . . 119--133
            Thomas Perianin and   
     Sebastien Carré and   
             Victor Dyseryn and   
               Adrien Facon and   
                Sylvain Guilley   End-to-end automated cache-timing attack
                                  driven by machine learning . . . . . . . 135--146
                Osnat Keren and   
                    Ilia Polian   IPM-RED: combining higher-order masking
                                  with robust error detection  . . . . . . 147--160
                   Rei Ueno and   
            Junko Takahashi and   
            Yu-ichi Hayashi and   
                  Naofumi Homma   A method for constructing sliding
                                  windows leak from noisy cache timing
                                  information  . . . . . . . . . . . . . . 161--170
                 Dina Kamel and   
            Davide Bellizia and   
          Olivier Bronchain and   
François-Xavier Standaert   Side-channel analysis of a learning
                                  parity with physical noise processor . . 171--179
 Michael John Jacobson, Jr. and   
               Prabhat Kushwaha   Removable weak keys for discrete
                                  logarithm-based cryptography . . . . . . 181--195
           Karine Heydemann and   
                     Letitia Li   Correction to: Editorial about PROOFS
                                  2019 . . . . . . . . . . . . . . . . . . 197--197

Journal of Cryptographic Engineering
Volume 11, Number 3, September, 2021

            Chip-Hong Chang and   
          Daniel E. Holcomb and   
       Ulrich Rührmair and   
              Patrick Schaumont   The ASHES 2019 special issue at JCEN . . 199--200
           Mitsuru Shiozaki and   
                 Takeshi Fujino   Simple electromagnetic analysis attack
                                  based on geometric leak on ASIC
                                  implementation of ring-oscillator PUF    201--212
               Yuqiao Zhang and   
                 Ayush Jain and   
                Pinchen Cui and   
                  Ziqi Zhou and   
                    Ujjwal Guin   A novel topology-guided attack and its
                                  countermeasure towards secure logic
                                  locking  . . . . . . . . . . . . . . . . 213--226
                Chongyan Gu and   
            Chip-Hong Chang and   
               Weiqiang Liu and   
                Neil Hanley and   
              Jack Miskelly and   
           Máire O'Neill   A large-scale comprehensive evaluation
                                  of single-slice ring oscillator and
                                  PicoPUF bit cells on 28-nm Xilinx FPGAs  227--238
              Sahan Bandara and   
                Michel A. Kinsy   Adaptive caches as a defense mechanism
                                  against cache side-channel attacks . . . 239--255
         Florian Unterstein and   
                Nisha Jacob and   
                Neil Hanley and   
                Chongyan Gu and   
                  Johann Heyszl   SCA secure and updatable crypto engines
                                  for FPGA SoC bitstream decryption:
                                  extended version . . . . . . . . . . . . 257--272
         Keyvan Ramezanpour and   
                Paul Ampadu and   
                  William Diehl   Fault intensity map analysis with neural
                                  network key distinguisher  . . . . . . . 273--288
            Shoei Nashimoto and   
             Daisuke Suzuki and   
             Noriyuki Miura and   
            Tatsuya Machida and   
              Kohei Matsuda and   
                  Makoto Nagata   Low-cost distance-spoofing attack on
                                  FMCW radar and its feasibility study on
                                  countermeasure . . . . . . . . . . . . . 289--298
              Leonid Azriel and   
              Julian Speith and   
              Nils Albartus and   
                Ran Ginosar and   
              Avi Mendelson and   
                  Christof Paar   A survey of algorithmic methods in IC
                                  reverse engineering  . . . . . . . . . . 299--315

Journal of Cryptographic Engineering
Volume 11, Number 4, November, 2021

                 James Howe and   
            Marco Martinoli and   
           Elisabeth Oswald and   
            Francesco Regazzoni   Exploring Parallelism to Improve the
                                  Performance of FrodoKEM in Hardware  . . 317--327
       Lucas Pandolfo Perin and   
           Gustavo Zambonin and   
    Ricardo Custódio and   
                Lucia Moura and   
                 Daniel Panario   Improved constant-sum encodings for
                                  hash-based signatures  . . . . . . . . . 329--351
          Thomas Trouchkine and   
Sébanjila Kevin Bukasa and   
        Mathieu Escouteloup and   
            Ronan Lashermes and   
             Guillaume Bouffard   Electromagnetic fault injection against
                                  a complex CPU, toward new
                                  micro-architectural fault models . . . . 353--367
          Johannes Mittmann and   
               Werner Schindler   Timing attacks and local timing attacks
                                  against Barrett's modular multiplication
                                  algorithm  . . . . . . . . . . . . . . . 369--397
         Jean Claude Bajard and   
               Sylvain Duquesne   Montgomery-friendly primes and
                                  applications to cryptography . . . . . . 399--415
Sergio Roldán Lombardía and   
                Fatih Balli and   
                Subhadeep Banik   Six shades lighter: a bit-serial
                                  implementation of the AES family . . . . 417--439


Journal of Cryptographic Engineering
Volume 12, Number 1, April, 2022

       Maria Chiara Molteni and   
              Vittorio Zaccaria   A relation calculus for reasoning about
                                  $t$-probing security . . . . . . . . . . 1--14
              Dusan Bozilov and   
        Miroslav Knezevi\'c and   
               Ventzislav Nikov   Optimized threshold implementations:
                                  securing cryptographic accelerators for
                                  low-energy and low-latency applications  15--51
             Andrea Caforio and   
                Fatih Balli and   
                Subhadeep Banik   Melting SNOW-V: improved lightweight
                                  architectures  . . . . . . . . . . . . . 53--73
              Maamar Ouladj and   
            Sylvain Guilley and   
                  Farid Mokrane   Spectral approach to process the
                                  (multivariate) high-order template
                                  attack against any masking scheme  . . . 75--93
            Benjamin Buhrow and   
              Barry Gilbert and   
                 Clifton Haider   Parallel modular multiplication using
                                  512-bit advanced vector instructions . . 95--105
               Kaushik Nath and   
                  Palash Sarkar   Security and efficiency trade-offs for
                                  elliptic curve Diffie--Hellman at the
                                  128-bit and 224-bit security levels  . . 107--121

Journal of Cryptographic Engineering
Volume 12, Number 2, June, 2022

             Carlo Brunetta and   
           Pablo Picazo-Sanchez   Modelling cryptographic distinguishers
                                  using machine learning . . . . . . . . . 123--135
            Jori Winderickx and   
                 An Braeken and   
                   Nele Mentens   In-depth energy analysis of security
                                  algorithms and protocols for the
                                  Internet of Things . . . . . . . . . . . 137--149
                Liron David and   
                   Avishai Wool   Rank estimation with bounded error via
                                  exponential sampling . . . . . . . . . . 151--168
               Duc-Phong Le and   
                Rongxing Lu and   
                Ali A. Ghorbani   Improved fault analysis on SIMECK
                                  ciphers  . . . . . . . . . . . . . . . . 169--180
              Mathieu Gross and   
                Nisha Jacob and   
                     Georg Sigl   Breaking TrustZone memory isolation and
                                  secure boot through malicious hardware
                                  on a modern FPGA-SoC . . . . . . . . . . 181--196
                Fanghui Liu and   
              Waldemar Cruz and   
                 Laurent Michel   A comprehensive tolerant algebraic
                                  side-channel attack over modern ciphers
                                  using constraint programming . . . . . . 197--228

Journal of Cryptographic Engineering
Volume 12, Number 3, September, 2022

             Susanne Engels and   
               Max Hoffmann and   
                  Christof Paar   A critical view on the real-world
                                  security of logic locking  . . . . . . . 229--244
          Jean-Max Dutertre and   
         Amir-Pasha Mirbaha and   
             David Naccache and   
                     Assia Tria   Photonic power firewalls . . . . . . . . 245--254
              Juan Di Mauro and   
            Eduardo Salazar and   
                Hugo D. Scolnik   Design and implementation of a novel
                                  cryptographically secure pseudorandom
                                  number generator . . . . . . . . . . . . 255--265
           Sreeja Chowdhury and   
                  Ana Covic and   
           Rabin Yu Acharya and   
              Spencer Dupee and   
              Fatemeh Ganji and   
                  Domenic Forte   Physical security in the post-quantum
                                  era  . . . . . . . . . . . . . . . . . . 267--303
          Kalikinkar Mandal and   
                Dhiman Saha and   
             Sumanta Sarkar and   
                    Yosuke Todo   Sycon: a new milestone in designing
                                  ASCON-like permutations  . . . . . . . . 305--327
              Esra Yeniaras and   
                     Murat Cenk   Faster characteristic three polynomial
                                  multiplication and its application to
                                  NTRU Prime decapsulation . . . . . . . . 329--348
   Jorge Chávez-Saab and   
Jesús-Javier Chi-Dom\'ìnguez and   
              Samuel Jaques and   
Francisco Rodr\'ìguez-Henr\'ìquez   The SQALE of CSIDH: sublinear Vélu
                                  quantum-resistant isogeny action with
                                  low exponents  . . . . . . . . . . . . . 349--368

Journal of Cryptographic Engineering
Volume 12, Number 4, November, 2022

            Chip-Hong Chang and   
       Stefan Katzenbeisser and   
       Ulrich Rührmair and   
              Patrick Schaumont   The ASHES 2020 special issue at JCEN . . 369--370
  Markku-Juhani O. Saarinen and   
          G. Richard Newell and   
                   Ben Marshall   Development of the RISC-V entropy source
                                  interface  . . . . . . . . . . . . . . . 371--386
           Ulrich Rührmair   Secret-free security: a survey and
                                  tutorial . . . . . . . . . . . . . . . . 387--412
                Chenglu Jin and   
             Wayne Burleson and   
            Marten van Dijk and   
           Ulrich Rührmair   Programmable access-controlled and
                                  generic erasable PUF design and its
                                  applications . . . . . . . . . . . . . . 413--432
                  Amit Jana and   
               Anirban Nath and   
                Goutam Paul and   
                    Dhiman Saha   Differential fault analysis of NORX
                                  using variants of coupon collector
                                  problem  . . . . . . . . . . . . . . . . 433--459
               Jacob Fustos and   
            Michael Bechtel and   
                    Heechul Yun   A framework for leaking secrets to past
                                  instructions . . . . . . . . . . . . . . 461--473
           Anup Kumar Kundu and   
                     Aikata and   
          Banashri Karmakar and   
                    Dhiman Saha   Fault analysis of the PRINCE family of
                                  lightweight ciphers  . . . . . . . . . . 475--494
            Rijoy Mukherjee and   
     Sree Ranjani Rajendran and   
       Rajat Subhra Chakraborty   A comprehensive survey of physical and
                                  logic testing techniques for Hardware
                                  Trojan detection and prevention  . . . . 495--522


Journal of Cryptographic Engineering
Volume 13, Number 1, April, 2023

            Andreas Wiemers and   
              Johannes Mittmann   Improving recent side-channel attacks
                                  against the DES key schedule . . . . . . 1--17
                Ihsan Cicek and   
                  Ahmad Al Khas   A new read-write collision-based SRAM
                                  PUF implemented on Xilinx FPGAs  . . . . 19--36
           Jean-Marc Robert and   
            Pascal Véron   Faster multiplication over $ \mathbb
                                  {F}_2 [X] $ using AVX512 instruction set
                                  and VPCLMULQDQ instruction . . . . . . . 37--55
               Vidal Attias and   
              Luigi Vigneri and   
                Vassil Dimitrov   Rethinking modular multi-exponentiation
                                  in real-world applications . . . . . . . 57--70
    Alexandre Augusto Giron and   
    Ricardo Custódio and   
Francisco Rodríguez-Henríquez   Post-quantum hybrid key exchange: a
                                  systematic mapping study . . . . . . . . 71--88
                   Gora Adj and   
Jesús-Javier Chi-Domínguez and   
Francisco Rodríguez-Henríquez   Karatsuba-based square-root Vélu's
                                  formulas applied to two isogeny-based
                                  protocols  . . . . . . . . . . . . . . . 89--106
Pradeep Kumar Goud Nadikuda and   
                Lakshmi Boppana   Low area-time complexity point
                                  multiplication architecture for ECC over
                                  $ {\rm GF}(2^m) $ using polynomial basis 107--123
               Dmitrii Koshelev   Subgroup membership testing on elliptic
                                  curves via the Tate pairing  . . . . . . 125--128

Journal of Cryptographic Engineering
Volume 13, Number 2, June, 2023

             Lo\"\ic Masure and   
            Rémi Strullu   Side-channel analysis against ANSSI's
                                  protected AES implementation on ARM:
                                  end-to-end attacks with multi-task
                                  learning . . . . . . . . . . . . . . . . 129--147
             Vincent Werner and   
          Laurent Maingault and   
              Marie-Laure Potet   An end-to-end approach to identify and
                                  exploit multi-fault injection
                                  vulnerabilities on microcontrollers  . . 149--165
               Bo-Yuan Peng and   
            Adrian Marotzke and   
              Ming-Han Tsai and   
                Bo-Yin Yang and   
                    Ho-Lin Chen   Streamlined NTRU Prime on FPGA . . . . . 167--186
        Sumit Kumar Debnath and   
             Sihem Mesnager and   
           Vikas Srivastava and   
           Saibal Kumar Pal and   
                 Nibedita Kundu   Mul-IBS: a multivariate identity-based
                                  signature scheme compatible with
                                  IoT-based NDN architecture . . . . . . . 187--199
             Priyanka Joshi and   
            Bodhisatwa Mazumdar   SPSA: Semi-Permanent Stuck-At fault
                                  analysis of AES Rijndael SBox  . . . . . 201--222
                  Yaxin Cui and   
                    Hong Xu and   
                    Lin Tan and   
                Huajin Chen and   
                     Wenfeng Qi   Construction of equivalent linear trails
                                  and multiple linear attack on
                                  reduced-round GIFT-64  . . . . . . . . . 223--234
       Elena Almaraz Luengo and   
Bittor Alaña Olivares and   
Luis Javier Garc\'ìa Villalba and   
     Julio Hernandez-Castro and   
            Darren Hurley-Smith   StringENT test suite: ENT battery
                                  revisited for efficient $P$ value
                                  computation  . . . . . . . . . . . . . . 235--249
             Ryusuke Koseki and   
                  Akira Ito and   
                   Rei Ueno and   
             Mehdi Tibouchi and   
                  Naofumi Homma   Homomorphic encryption for stochastic
                                  computing  . . . . . . . . . . . . . . . 251--263

Journal of Cryptographic Engineering
Volume 13, Number 3, September, 2023

             Iftekhar Salam and   
              Wei-Chuen Yau and   
    Raphaël C.-W. Phan and   
                 Josef Pieprzyk   Differential fault attacks on the
                                  lightweight authenticated encryption
                                  algorithm CLX-128  . . . . . . . . . . . 265--281
                Jason T. LeGrow   A faster method for fault attack
                                  resistance in static/ephemeral CSIDH . . 283--294
  Pedro Geraldo M. R. Alves and   
            Jheyne N. Ortiz and   
                Diego F. Aranha   Performance of hierarchical transforms
                                  in homomorphic encryption: a case study
                                  on logistic regression inference . . . . 295--310
             Maikel Kerkhof and   
                  Lichao Wu and   
            Guilherme Perin and   
                  Stjepan Picek   No (good) loss no gain: systematic
                                  evaluation of loss functions in deep
                                  learning-based side-channel analysis . . 311--324
                Dor Salomon and   
                    Itamar Levi   MaskSIMD-lib: on the performance gap of
                                  a generic C optimized assembly and wide
                                  vector extensions for masked software
                                  with an Ascon-$p$ test case  . . . . . . 325--342
               Hamed Arshad and   
       Pablo Picazo-Sanchez and   
         Christian Johansen and   
              Gerardo Schneider   Attribute-based encryption with
                                  enforceable obligations  . . . . . . . . 343--371
         Jean-Claude Bajard and   
         Kazuhide Fukushima and   
            Thomas Plantard and   
              Arnaud Sipasseuth   Fast verification and public key storage
                                  optimization for unstructured
                                  lattice-based signatures . . . . . . . . 373--388