Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Utilizing layout effects for analog logic locking17
Scoring the predictions: a way to improve profiling side-channel attacks16
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA14
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor14
Leaking secrets in homomorphic encryption with side-channel attacks11
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers11
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN10
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography10
A systematic study of data augmentation for protected AES implementations9
Differential fault attack on SPN-based sponge and SIV-like AE schemes7
A side-channel attack on a masked and shuffled software implementation of Saber7
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning7
Programmable access-controlled and generic erasable PUF design and its applications7
Quantum random number generator on IBM QX7
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case6
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna6
Fault attack on Enocoro stream cipher family6
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA5
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS5
Photonic power firewalls5
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1285
Complete group law for genus 2 Jacobians on Jacobian coordinates5
Subgroup membership testing on elliptic curves via the Tate pairing4
Spoofing attacks against vehicular FMCW radar4
Spatial dependency analysis to extract information from side-channel mixtures: extended version4
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications4
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing4
High-speed SABER key encapsulation mechanism in 65nm CMOS3
Attribute-based encryption with enforceable obligations3
A framework for leaking secrets to past instructions3
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming3
Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform3
0.02157998085022