Journal of Cryptographic Engineering

Papers
(The median citation count of Journal of Cryptographic Engineering is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers38
Utilizing layout effects for analog logic locking15
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor13
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA13
Scoring the predictions: a way to improve profiling side-channel attacks12
Leaking secrets in homomorphic encryption with side-channel attacks11
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography11
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN10
A systematic study of data augmentation for protected AES implementations9
Programmable access-controlled and generic erasable PUF design and its applications9
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents7
Differential fault attack on SPN-based sponge and SIV-like AE schemes7
A side-channel attack on a masked and shuffled software implementation of Saber7
Quantum random number generator on IBM QX7
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning7
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case6
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna6
Fault attack on Enocoro stream cipher family6
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA5
Photonic power firewalls5
Rank estimation with bounded error via exponential sampling5
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1285
Complete group law for genus 2 Jacobians on Jacobian coordinates5
Spatial dependency analysis to extract information from side-channel mixtures: extended version4
Spoofing attacks against vehicular FMCW radar4
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing4
Subgroup membership testing on elliptic curves via the Tate pairing4
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS4
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications3
Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform3
High-speed SABER key encapsulation mechanism in 65nm CMOS3
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit2
Attribute-based encryption with enforceable obligations2
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions2
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture2
A framework for leaking secrets to past instructions2
Amplitude-modulated EM side-channel attack on provably secure masked AES2
Isadora: automated information-flow property generation for hardware security verification2
Sycon: a new milestone in designing ASCON-like permutations2
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming2
High throughput pipelined implementation of SHA3 hash algorithm on FPGA2
Editorial about PROOFS 20212
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures2
SPSA: Semi-Permanent Stuck-At fault analysis of AES Rijndael SBox2
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols2
Best interleave size of GIFT-128 on 64-bit ARM processor2
Faster multiplication over $${\mathbb {F}}_2[X]$$ using AVX512 instruction set and VPCLMULQDQ instruction2
Fast verification and public key storage optimization for unstructured lattice-based signatures2
A critical view on the real-world security of logic locking2
Homomorphic encryption for stochastic computing2
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version2
The ASHES 2020 special issue at JCEN2
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation1
In-depth energy analysis of security algorithms and protocols for the Internet of Things1
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis1
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation1
Improving recent side-channel attacks against the DES key schedule1
A flexible efficient and configurable number theoretic transform architecture implemented on FPGA1
Probabilistic root finding in code-based cryptography1
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention1
A relation calculus for reasoning about t-probing security1
0.049679040908813