Journal of Cryptographic Engineering

Papers
(The median citation count of Journal of Cryptographic Engineering is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention35
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation26
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA13
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers12
Secret-free security: a survey and tutorial10
Progressive and efficient verification for digital signatures: extensions and experimental results10
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1289
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis9
Rank estimation with bounded error via exponential sampling8
Complete group law for genus 2 Jacobians on Jacobian coordinates7
Photonic power firewalls7
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation7
Utilizing layout effects for analog logic locking7
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor6
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities6
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis5
Rethinking modular multi-exponentiation in real-world applications5
Scoring the predictions: a way to improve profiling side-channel attacks5
Montgomery-friendly primes and applications to cryptography5
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost4
Generic SCARE: reverse engineering without knowing the algorithm nor the machine4
Fast verification and public key storage optimization for unstructured lattice-based signatures4
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)4
Optimization of the algorithm to compute the guaranteed number of activations in $$\textsf{XS}$$-circuits and its application to the analysis of block ciphers4
A systematic study of data augmentation for protected AES implementations4
Probabilistic root finding in code-based cryptography4
Leaking secrets in homomorphic encryption with side-channel attacks4
StringENT test suite: ENT battery revisited for efficient P value computation4
Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels3
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography3
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN3
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions3
Improving recent side-channel attacks against the DES key schedule2
Montgomery curve arithmetic revisited2
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents2
A critical view on the real-world security of logic locking2
Development of the RISC-V entropy source interface2
Programmable access-controlled and generic erasable PUF design and its applications2
The elliptic net algorithm revisited2
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture2
Subgroup membership testing on elliptic curves via the Tate pairing2
Spoofing attacks against vehicular FMCW radar2
Design and implementation of a novel cryptographically secure pseudorandom number generator2
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS2
Spatial dependency analysis to extract information from side-channel mixtures: extended version2
Breaking KASLR on mobile devices without any use of cache memory (extended version)2
Modelling cryptographic distinguishers using machine learning1
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations1
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning1
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis1
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA1
Six shades lighter: a bit-serial implementation of the AES family1
A relation calculus for reasoning about t-probing security1
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis1
Editorial about PROOFS 20211
In-depth energy analysis of security algorithms and protocols for the Internet of Things1
The ASHES 2021 special issue at JCEN1
Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures1
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing1
Fault analysis of the PRINCE family of lightweight ciphers1
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures1
Post-quantum hybrid key exchange: a systematic mapping study1
0.039299011230469