Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Utilizing layout effects for analog logic locking18
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA16
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers16
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor15
Scoring the predictions: a way to improve profiling side-channel attacks14
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography13
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN11
Programmable access-controlled and generic erasable PUF design and its applications10
A systematic study of data augmentation for protected AES implementations9
Leaking secrets in homomorphic encryption with side-channel attacks8
A side-channel attack on a masked and shuffled software implementation of Saber8
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna7
Fault attack on Enocoro stream cipher family7
Differential fault attack on SPN-based sponge and SIV-like AE schemes7
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System7
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning7
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case7
Quantum random number generator on IBM QX7
Complete group law for genus 2 Jacobians on Jacobian coordinates6
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA5
Photonic power firewalls5
Spoofing attacks against vehicular FMCW radar5
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1285
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS5
Spatial dependency analysis to extract information from side-channel mixtures: extended version4
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing4
High-speed SABER key encapsulation mechanism in 65nm CMOS3
Attribute-based encryption with enforceable obligations3
Fast verification and public key storage optimization for unstructured lattice-based signatures3
Subgroup membership testing on elliptic curves via the Tate pairing3
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications3
Faster multiplication over $${\mathbb {F}}_2[X]$$ using AVX512 instruction set and VPCLMULQDQ instruction3
A framework for leaking secrets to past instructions3
Extended version: enabling lattice-based post-quantum cryptography on the opentitan platform3
A comprehensive tolerant algebraic side-channel attack over modern ciphers using constraint programming3
High throughput pipelined implementation of SHA3 hash algorithm on FPGA3
0.023772954940796