Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention35
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation26
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA13
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers12
Secret-free security: a survey and tutorial10
Progressive and efficient verification for digital signatures: extensions and experimental results10
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1289
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis9
Rank estimation with bounded error via exponential sampling8
Complete group law for genus 2 Jacobians on Jacobian coordinates7
Photonic power firewalls7
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation7
Utilizing layout effects for analog logic locking7
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor6
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities6
Rethinking modular multi-exponentiation in real-world applications5
Scoring the predictions: a way to improve profiling side-channel attacks5
Montgomery-friendly primes and applications to cryptography5
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis5
Generic SCARE: reverse engineering without knowing the algorithm nor the machine4
Fast verification and public key storage optimization for unstructured lattice-based signatures4
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)4
Optimization of the algorithm to compute the guaranteed number of activations in $$\textsf{XS}$$-circuits and its application to the analysis of block ciphers4
A systematic study of data augmentation for protected AES implementations4
Probabilistic root finding in code-based cryptography4
Leaking secrets in homomorphic encryption with side-channel attacks4
StringENT test suite: ENT battery revisited for efficient P value computation4
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost4
0.063102960586548