Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs28
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents26
A survey of algorithmic methods in IC reverse engineering17
Residue arithmetic systems in cryptography: a survey on modern security applications16
A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs14
Towards efficient and automated side-channel evaluations at design time12
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure11
x-only point addition formula and faster compressed SIKE11
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks9
Physical security in the post-quantum era9
Faster unbalanced Private Set Intersection in the semi-honest setting8
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models8
Rock’n’roll PUFs: crafting provably secure pufs from less secure ones (extended version)7
On the power of template attacks in highly multivariate context7
End-to-end automated cache-timing attack driven by machine learning7
Montgomery-friendly primes and applications to cryptography7
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols7
Melting SNOW-V: improved lightweight architectures7
A novel non-profiled side channel attack based on multi-output regression neural network6
Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC6
A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs6
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning6
Improved algebraic attacks on lightweight block ciphers5
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware5
Secret-free security: a survey and tutorial5
Sycon: a new milestone in designing ASCON-like permutations5
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis4
Programmable access-controlled and generic erasable PUF design and its applications4
Improved fault analysis on SIMECK ciphers4
In-depth energy analysis of security algorithms and protocols for the Internet of Things4
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC4
Post-quantum hybrid key exchange: a systematic mapping study4
0.022212982177734