BibTeX bibliography jcryptoeng.bib

Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%% BibTeX-file{
%%% author = "Nelson H. F. Beebe",
%%% version = "1.26",
%%% date = "08 August 2024",
%%% time = "08:52:25 MDT",
%%% filename = "jcryptoeng.bib",
%%% address = "University of Utah
%%% Department of Mathematics, 110 LCB
%%% 155 S 1400 E RM 233
%%% Salt Lake City, UT 84112-0090
%%% USA",
%%% telephone = "+1 801 581 5254",
%%% FAX = "+1 801 581 4148",
%%% URL = "https://www.math.utah.edu/~beebe",
%%% checksum = "21832 8393 31450 343490",
%%% email = "beebe at math.utah.edu, beebe at acm.org,
%%% beebe at computer.org (Internet)",
%%% codetable = "ISO/ASCII",
%%% keywords = "bibliography; BibTeX; Journal of
%%% Cryptographic Engineering",
%%% license = "public domain",
%%% supported = "yes",
%%% docstring = "This is a COMPLETE bibliography of the
%%% Journal of Cryptographic Engineering (CODEN
%%% none, ISSN 2190-8508 (print), 2190-8516
%%% (electronic)), published by Springer.
%%%
%%% Publication began with volume 1, number 1, in
%%% 2011, and the journal currently appears
%%% quarterly.
%%%
%%% The journal has World-Wide Web sites at
%%%
%%% http://link.springer.com/journal/13389
%%% http://link.springer.com/journal/volumesAndIssues/13389
%%% http://www.springer.com/computer/security+and+cryptology/journal/13389
%%%
%%% At version 1.26, the year coverage looked
%%% like this:
%%%
%%% 2011 ( 28) 2016 ( 23) 2021 ( 29)
%%% 2012 ( 23) 2017 ( 27) 2022 ( 27)
%%% 2013 ( 22) 2018 ( 24) 2023 ( 31)
%%% 2014 ( 24) 2019 ( 27) 2024 ( 29)
%%% 2015 ( 21) 2020 ( 23)
%%%
%%% Article: 358
%%%
%%% Total entries: 358
%%%
%%% Data for the bibliography have been collected
%%% primarily from the publisher Web site.
%%%
%%% Spelling has been verified with the UNIX
%%% spell and GNU ispell programs using the
%%% exception dictionary stored in the companion
%%% file with extension .sok.
%%%
%%% BibTeX citation tags are uniformly chosen
%%% as name:year:abbrev, where name is the
%%% family name of the first author or editor,
%%% year is a 4-digit number, and abbrev is a
%%% 3-letter condensation of important title
%%% words. Citation tags were automatically
%%% generated by software developed for the
%%% BibNet Project.
%%%
%%% In this bibliography, entries are sorted in
%%% publication order, using ``bibsort -byvolume''.
%%%
%%% The checksum field above contains a CRC-16
%%% checksum as the first value, followed by the
%%% equivalent of the standard UNIX wc (word
%%% count) utility output of lines, words, and
%%% characters. This is produced by Robert
%%% Solovay's checksum utility.",
%%% }
%%% ====================================================================
@Preamble{
 "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi" #
 "\ifx \undefined \mathrm \def \mathrm #1{{\rm #1}}\fi"
}
%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
 University of Utah,
 Department of Mathematics, 110 LCB,
 155 S 1400 E RM 233,
 Salt Lake City, UT 84112-0090, USA,
 Tel: +1 801 581 5254,
 FAX: +1 801 581 4148,
 e-mail: \path|beebe@math.utah.edu|,
 \path|beebe@acm.org|,
 \path|beebe@computer.org| (Internet),
 URL: \path|https://www.math.utah.edu/~beebe/|"}
%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-CRYPTO-ENG = "Journal of Cryptographic Engineering"}
%%% ====================================================================
%%% Bibliography entries, in publication order:
@Article{Koc:2011:IBC,
 author = "{\c{C}}etin Kaya Ko{\c{c}}",
 title = "Introduction to the {{\booktitle{Journal of
 Cryptographic Engineering}}}",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "1--3",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0007-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://cs.ucsb.edu/~koc/docs/j75.pdf;
 http://link.springer.com/article/10.1007/s13389-011-0007-x;
 http://link.springer.com/content/pdf/10.1007/s13389-011-0007-x.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kocher:2011:IDP,
 author = "Paul Kocher and Joshua Jaffe and Benjamin Jun and
 Pankaj Rohatgi",
 title = "Introduction to differential power analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "5--27",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0006-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0006-y;
 http://link.springer.com/content/pdf/10.1007/s13389-011-0006-y.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Molter:2011:SPA,
 author = "H. Gregor Molter and Marc St{\"o}ttinger and Abdulhadi
 Shoufan and Falko Strenzke",
 title = "A simple power analysis attack on a {McEliece}
 cryptoprocessor",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "29--36",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0001-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0001-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guneysu:2011:UHC,
 author = "Tim G{\"u}neysu",
 title = "Utilizing hard cores of modern {FPGA} devices for
 high-performance cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "37--55",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0002-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0002-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dominguez-Oviedo:2011:ALE,
 author = "Agustin Dominguez-Oviedo and M. Anwar Hasan",
 title = "Algorithm-level error detection for {Montgomery}
 ladder-based {ECSM}",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "57--69",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0003-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0003-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Skorobogatov:2011:SMS,
 author = "Sergei Skorobogatov",
 title = "Synchronization method for {SCA} and fault attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "71--77",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0004-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0004-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hocquet:2011:HPN,
 author = "C{\'e}dric Hocquet and Dina Kamel and Francesco
 Regazzoni and Jean-Didier Legat and Denis Flandre and
 David Bol and Fran{\c{c}}ois-Xavier Standaert",
 title = "Harvesting the potential of nano-{CMOS} for
 lightweight cryptography: an ultra-low-voltage 65 nm
 {AES} coprocessor for passive {RFID} tags",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "79--86",
 month = apr,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0005-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0005-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCa,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "1",
 pages = "??--??",
 month = apr,
 year = "2011",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:30 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Moreno:2011:SRB,
 author = "Carlos Moreno and M. Anwar Hasan",
 title = "{SPA}-resistant binary exponentiation with optimal
 execution time",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "2",
 pages = "87--99",
 month = aug,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0008-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0008-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Beuchat:2011:LAU,
 author = "Jean-Luc Beuchat and Eiji Okamoto and Teppei
 Yamazaki",
 title = "A low-area unified hardware architecture for the {AES}
 and the cryptographic hash function {ECHO}",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "2",
 pages = "101--121",
 month = aug,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0009-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0009-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Doget:2011:USC,
 author = "Julien Doget and Emmanuel Prouff and Matthieu Rivain
 and Fran{\c{c}}ois-Xavier Standaert",
 title = "Univariate side channel attacks and leakage modeling",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "2",
 pages = "123--144",
 month = aug,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0010-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0010-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Whitnall:2011:FEF,
 author = "Carolyn Whitnall and Elisabeth Oswald",
 title = "A fair evaluation framework for comparing side-channel
 distinguishers",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "2",
 pages = "145--160",
 month = aug,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0011-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0011-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Goundar:2011:SMW,
 author = "Raveen R. Goundar and Marc Joye and Atsuko Miyaji and
 Matthieu Rivain and Alexandre Venelli",
 title = "Scalar multiplication on {Weierstra{\ss}} elliptic
 curves from Co-{$Z$} arithmetic",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "2",
 pages = "161--176",
 month = aug,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0012-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0012-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCb,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "2",
 pages = "??--??",
 month = aug,
 year = "2011",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Katzenbeisser:2011:RPL,
 author = "Stefan Katzenbeisser and {\"U}nal Kocaba{\v{s}} and
 Vincent van der Leest and Ahmad-Reza Sadeghi and
 Geert-Jan Schrijen and Christian Wachsmann",
 title = "Recyclable {PUFs}: logically reconfigurable {PUFs}",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "177--186",
 month = nov,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0016-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0016-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Taverne:2011:SSM,
 author = "Jonathan Taverne and Armando Faz-Hern{\'a}ndez and
 Diego F. Aranha and Francisco
 Rodr{\'\i}guez-Henr{\'\i}quez and Darrel Hankerson and
 Julio L{\'o}pez",
 title = "Speeding scalar multiplication over binary elliptic
 curves using the new carry-less multiplication
 instruction",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "187--199",
 month = nov,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0017-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0017-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Meloni:2011:HPG,
 author = "Nicolas M{\'e}loni and Christophe Negre and M. Anwar
 Hasan",
 title = "High performance {GHASH} and impacts of a class of
 unconventional bases",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "201--218",
 month = nov,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0013-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0013-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Tunstall:2011:PCD,
 author = "Michael Tunstall",
 title = "Practical complexity differential cryptanalysis and
 fault analysis of {AES}",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "219--230",
 month = nov,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0018-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0018-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Medwed:2011:EAS,
 author = "Marcel Medwed and Fran{\c{c}}ois-Xavier Standaert",
 title = "Extractors against side-channel attacks: weak or
 strong?",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "231--241",
 month = nov,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0014-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0014-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Brier:2011:MFA,
 author = "{\'E}ric Brier and David Naccache and Phong Q. Nguyen
 and Mehdi Tibouchi",
 title = "Modulus fault attacks against {RSA--CRT} signatures",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "243--253",
 month = nov,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0015-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0015-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCc,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "3",
 pages = "??--??",
 month = nov,
 year = "2011",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:31 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dichtl:2011:NMB,
 author = "Markus Dichtl",
 title = "A new method of black box power analysis and a fast
 algorithm for optimal key search",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "255--264",
 month = dec,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0019-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0019-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Endo:2011:CGC,
 author = "Sho Endo and Takeshi Sugawara and Naofumi Homma and
 Takafumi Aoki and Akashi Satoh",
 title = "An on-chip glitchy-clock generator for testing fault
 injection attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "265--270",
 month = dec,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0022-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0022-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Avanzi:2011:SCA,
 author = "Roberto Avanzi and Simon Hoerder and Dan Page and
 Michael Tunstall",
 title = "Side-channel attacks on the {McEliece} and
 {Niederreiter} public-key cryptosystems",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "271--281",
 month = dec,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0024-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 note = "See erratum \cite{Avanzi:2012:ESC}.",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0024-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Strenzke:2011:MAS,
 author = "Falko Strenzke",
 title = "Message-aimed side channel and fault attacks against
 public key cryptosystems with homomorphic properties",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "283--292",
 month = dec,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0020-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0020-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hospodar:2011:MLS,
 author = "Gabriel Hospodar and Benedikt Gierlichs and Elke {De
 Mulder} and Ingrid Verbauwhede and Joos Vandewalle",
 title = "Machine learning in side-channel analysis: a first
 study",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "293--302",
 month = dec,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0023-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0023-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lux:2011:TSD,
 author = "Alexander Lux and Artem Starostin",
 title = "A tool for static detection of timing channels in
 {Java}",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "303--313",
 month = dec,
 year = "2011",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0021-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0021-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2011:HCd,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "1",
 number = "4",
 pages = "??--??",
 month = dec,
 year = "2011",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Grabher:2012:EMD,
 author = "P. Grabher and J. Gro{\ss}sch{\"a}dl and S. Hoerder
 and K. J{\"a}rvinen and D. Page and S. Tillich and M.
 W{\'o}jcik",
 title = "An exploration of mechanisms for dynamic cryptographic
 instruction set extension",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "1--18",
 month = may,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0025-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0025-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gouvea:2012:ESI,
 author = "Conrado P. L. Gouv{\^e}a and Leonardo B. Oliveira and
 Julio L{\'o}pez",
 title = "Efficient software implementation of public-key
 cryptography on sensor networks using the {MSP430X}
 microcontroller",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "19--29",
 month = may,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0029-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0029-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gueron:2012:ESI,
 author = "Shay Gueron",
 title = "Efficient software implementations of modular
 exponentiation",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "31--43",
 month = may,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0031-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0031-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2012:AAS,
 author = "Claude Carlet and Jean-Charles Faug{\`e}re and
 Christopher Goyet and Gu{\'e}na{\"e}l Renault",
 title = "Analysis of the algebraic side channel attack",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "45--62",
 month = may,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0028-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0028-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Elaabid:2012:PT,
 author = "M. Abdelaziz Elaabid and Sylvain Guilley",
 title = "Portability of templates",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "63--74",
 month = may,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0030-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0030-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Avanzi:2012:ESC,
 author = "Roberto Avanzi and Simon Hoerder and Dan Page and
 Michael Tunstall",
 title = "Erratum to: Side-channel attacks on the {McEliece} and
 {Niederreiter} public-key cryptosystems",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "75--75",
 month = may,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-011-0026-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 note = "See \cite{Avanzi:2011:SCA}.",
 URL = "http://link.springer.com/article/10.1007/s13389-011-0026-7;
 http://link.springer.com/content/pdf/10.1007/s13389-011-0026-7.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2012:HCa,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "1",
 pages = "??--??",
 month = may,
 year = "2012",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bernstein:2012:HSH,
 author = "Daniel J. Bernstein and Niels Duif and Tanja Lange and
 Peter Schwabe and Bo-Yin Yang",
 title = "High-speed high-security signatures",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "2",
 pages = "77--89",
 month = sep,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0027-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0027-1;
 http://link.springer.com/content/pdf/10.1007/s13389-012-0027-1.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hasan:2012:SMS,
 author = "M. Anwar Hasan and Christophe Negre",
 title = "Sequential multiplier with sub-linear gate
 complexity",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "2",
 pages = "91--97",
 month = sep,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0035-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0035-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yen:2012:MEA,
 author = "Sung-Ming Yen and Chien-Ning Chen and SangJae Moon",
 title = "Multi-exponentiation algorithm based on binary {GCD}
 computation and its application to side-channel
 countermeasure",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "2",
 pages = "99--110",
 month = sep,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0032-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0032-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Roche:2012:HOG,
 author = "Thomas Roche and Emmanuel Prouff",
 title = "Higher-order glitch free implementation of the {AES}
 using {Secure Multi--Party Computation} protocols",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "2",
 pages = "111--127",
 month = sep,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0033-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0033-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bringer:2012:PAA,
 author = "Julien Bringer and Herv{\'e} Chabanne and Thanh Ha
 Le",
 title = "Protecting {AES} against side-channel analysis using
 wire-tap codes",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "2",
 pages = "129--141",
 month = sep,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0034-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0034-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2012:HCb,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "2",
 pages = "??--??",
 month = sep,
 year = "2012",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:32 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kasper:2012:SCB,
 author = "Markus Kasper and Amir Moradi and Georg T. Becker and
 Oliver Mischke and Tim G{\"u}neysu and Christof Paar
 and Wayne Burleson",
 title = "Side channels as building blocks",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "3",
 pages = "143--159",
 month = oct,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0040-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0040-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mather:2012:PSC,
 author = "Luke Mather and Elisabeth Oswald",
 title = "Pinpointing side-channel information leaks in web
 applications",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "3",
 pages = "161--177",
 month = oct,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0036-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0036-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Trujillo-Olaya:2012:APV,
 author = "Vladimir Trujillo-Olaya and Timothy Sherwood and
 {\c{C}}etin Kaya Ko{\c{c}}",
 title = "Analysis of performance versus security in hardware
 realizations of small elliptic curves for lightweight
 applications",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "3",
 pages = "179--188",
 month = oct,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0039-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0039-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Shariati:2012:AEE,
 author = "Saloomeh Shariati and Fran{\c{c}}ois-Xavier Standaert
 and Laurent Jacques and Benoit Macq",
 title = "Analysis and experimental evaluation of image-based
 {PUFs}",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "3",
 pages = "189--206",
 month = oct,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0041-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0041-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Anonymous:2012:HCc,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "3",
 pages = "??--??",
 month = oct,
 year = "2012",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rolt:2012:SAS,
 author = "Jean Da Rolt and Amitabh Das and Santosh Ghosh and
 Giorgio {Di Natale} and Marie-Lise Flottes and Bruno
 Rouzeyre and Ingrid Verbauwhede",
 title = "Scan attacks on side-channel and fault attack
 resistant public-key implementations",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "4",
 pages = "207--219",
 month = nov,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0045-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0045-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Baldwin:2012:CES,
 author = "Brian Baldwin and Raveen R. Goundar and Mark Hamilton
 and William P. Marnane",
 title = "Co-{$Z$} {ECC} scalar multiplications for hardware,
 software and hardware-software co-design on embedded
 systems",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "4",
 pages = "221--240",
 month = nov,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0042-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0042-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gueron:2012:PMS,
 author = "Shay Gueron and Vlad Krasnov",
 title = "Parallelizing message schedules to accelerate the
 computations of hash functions",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "4",
 pages = "241--253",
 month = nov,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0037-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0037-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koeberl:2012:PDA,
 author = "Patrick Koeberl and Jiangtao Li and Roel Maes and
 Anand Rajan and Claire Vishik and Marcin W{\'o}jcik and
 Wei Wu",
 title = "A practical device authentication scheme using {SRAM}
 {PUFs}",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "4",
 pages = "255--269",
 month = nov,
 year = "2012",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0043-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0043-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Anonymous:2012:HCd,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "2",
 number = "4",
 pages = "??--??",
 month = nov,
 year = "2012",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:33 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Prouff:2013:ICS,
 author = "Emmanuel Prouff and Patrick Schaumont",
 title = "Introduction to the {CHES 2012} special issue",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "1--1",
 month = apr,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0055-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0055-5;
 http://link.springer.com/content/pdf/10.1007/s13389-013-0055-5.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schlosser:2013:SPE,
 author = "Alexander Schl{\"o}sser and Dmitry Nedospasov and
 Juliane Kr{\"a}mer and Susanna Orlic and Jean-Pierre
 Seifert",
 title = "Simple photonic emission analysis of {AES}",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "3--15",
 month = apr,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0053-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0053-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ruhrmair:2013:PUP,
 author = "Ulrich R{\"u}hrmair and Marten van Dijk",
 title = "On the practical use of physical unclonable functions
 in oblivious transfer and bit commitment protocols",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "17--28",
 month = apr,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0052-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0052-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Heyse:2013:CBC,
 author = "Stefan Heyse and Tim G{\"u}neysu",
 title = "Code-based cryptography on reconfigurable hardware:
 tweaking {Niederreiter} encryption for performance",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "29--43",
 month = apr,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0056-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0056-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gerard:2013:UOL,
 author = "Beno{\^\i}t G{\'e}rard and Fran{\c{c}}ois-Xavier
 Standaert",
 title = "Unified and optimized linear collision attacks and
 their application in a non-profiled setting: extended
 version",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "45--58",
 month = apr,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0051-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0051-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Fouque:2013:ARC,
 author = "Pierre-Alain Fouque and Nicolas Guillermin and
 Delphine Leresteux and Mehdi Tibouchi and
 Jean-Christophe Zapalowicz",
 title = "Attacking {RSA--CRT} signatures with faults on
 {Montgomery} multiplication",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "59--72",
 month = apr,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0050-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0050-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCa,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "1",
 pages = "??--??",
 month = apr,
 year = "2013",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ali:2013:DFA,
 author = "Sk Subidh Ali and Debdeep Mukhopadhyay and Michael
 Tunstall",
 title = "Differential fault analysis of {AES}: towards reaching
 its limits",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "2",
 pages = "73--97",
 month = jun,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0046-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0046-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Montminy:2013:ICD,
 author = "David P. Montminy and Rusty O. Baldwin and Michael A.
 Temple and Eric D. Laspe",
 title = "Improving cross-device attacks using zero-mean
 unit-variance normalization",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "2",
 pages = "99--110",
 month = jun,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0038-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0038-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Akinyele:2013:CFR,
 author = "Joseph A. Akinyele and Christina Garman and Ian Miers
 and Matthew W. Pagano and Michael Rushanan and Matthew
 Green and Aviel D. Rubin",
 title = "{Charm}: a framework for rapidly prototyping
 cryptosystems",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "2",
 pages = "111--128",
 month = jun,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0057-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0057-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kurdziel:2013:MPO,
 author = "Michael T. Kurdziel and Marcin Lukowiak and Michael A.
 Sanfilippo",
 title = "Minimizing performance overhead in memory encryption",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "2",
 pages = "129--138",
 month = jun,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0047-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0047-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCb,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "2",
 pages = "??--??",
 month = jun,
 year = "2013",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mohamed:2013:IAS,
 author = "Mohamed Saied Emam Mohamed and Stanislav Bulygin and
 Michael Zohner and Annelie Heuser and Michael Walter
 and Johannes Buchmann",
 title = "Improved algebraic side-channel attack on {AES}",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "3",
 pages = "139--156",
 month = sep,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0059-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0059-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Christofi:2013:FVC,
 author = "Maria Christofi and Boutheina Chetali and Louis Goubin
 and David Vigilant",
 title = "Formal verification of a {CRT--RSA} implementation
 against fault attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "3",
 pages = "157--167",
 month = sep,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0049-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0049-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Briais:2013:FST,
 author = "S{\'e}bastien Briais and Jean-Luc Danger and Sylvain
 Guilley",
 title = "A formal study of two physical countermeasures against
 side channel attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "3",
 pages = "169--180",
 month = sep,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0054-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0054-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Brown:2013:TTC,
 author = "Mark Brown",
 title = "Toward a taxonomy of communications security models",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "3",
 pages = "181--195",
 month = sep,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0058-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0058-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCc,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "3",
 pages = "??--??",
 month = sep,
 year = "2013",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:34 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yamamoto:2013:VEP,
 author = "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
 and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh",
 title = "Variety enhancement of {PUF} responses using the
 locations of random outputting {RS} latches",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "4",
 pages = "197--211",
 month = nov,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-012-0044-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-012-0044-0;
 http://link.springer.com/content/pdf/10.1007/s13389-012-0044-0.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Bhasin:2013:CHA,
 author = "Shivam Bhasin and Sylvain Guilley and Annelie Heuser
 and Jean-Luc Danger",
 title = "From cryptography to hardware: analyzing and
 protecting embedded {Xilinx} {BRAM} for cryptographic
 applications",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "4",
 pages = "213--225",
 month = nov,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0048-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0048-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kamal:2013:SHI,
 author = "Abdel Alim Kamal and Amr M. Youssef",
 title = "Strengthening hardware implementations of
 {NTRUEncrypt} against fault analysis attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "4",
 pages = "227--240",
 month = nov,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0061-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0061-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Danger:2013:SSC,
 author = "Jean-Luc Danger and Sylvain Guilley and Philippe
 Hoogvorst and C{\'e}dric Murdica and David Naccache",
 title = "A synthesis of side-channel attacks on elliptic curve
 cryptography in smart-cards",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "4",
 pages = "241--265",
 month = nov,
 year = "2013",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0062-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0062-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2013:HCd,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "3",
 number = "4",
 pages = "??--??",
 month = nov,
 year = "2013",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bertoni:2014:ICS,
 author = "Guido Bertoni and Jean-S{\'e}bastien Coron",
 title = "Introduction to the {CHES 2013} special issue",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "1--1",
 month = apr,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0076-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0076-8;
 http://link.springer.com/content/pdf/10.1007/s13389-014-0076-8.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Oliveira:2014:TFP,
 author = "Thomaz Oliveira and Julio L{\'o}pez and Diego F.
 Aranha and Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
 title = "Two is the fastest prime: lambda coordinates for
 binary elliptic curves",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "3--17",
 month = apr,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0069-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0069-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Becker:2014:SDL,
 author = "Georg T. Becker and Francesco Regazzoni and Christof
 Paar and Wayne P. Burleson",
 title = "Stealthy dopant-level hardware {Trojans}: extended
 version",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "19--31",
 month = apr,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0068-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0068-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{DeMulder:2014:UBS,
 author = "Elke {De Mulder} and Michael Hutter and Mark E. Marson
 and Peter Pearson",
 title = "Using {Bleichenbacher}'s solution to the hidden number
 problem to attack nonce leaks in $ 384$-bit {ECDSA}:
 extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "33--45",
 month = apr,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0072-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0072-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Grosso:2014:MVM,
 author = "Vincent Grosso and Fran{\c{c}}ois-Xavier Standaert and
 Sebastian Faust",
 title = "Masking vs. multiparty computation: how large is the
 gap for {AES}?",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "47--57",
 month = apr,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0073-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0073-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sugawara:2014:MSC,
 author = "Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki
 and Mitsuru Shiozaki and Takeshi Fujino",
 title = "On measurable side-channel leaks inside {ASIC} design
 primitives",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "59--73",
 month = apr,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0078-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0078-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HCa,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "1",
 pages = "??--??",
 month = apr,
 year = "2014",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:35 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Almeida:2014:LPB,
 author = "Leonardo C. Almeida and Ewerton R. Andrade and Paulo
 S. L. M. Barreto and Marcos A. {Simplicio, Jr.}",
 title = "{Lyra}: password-based key derivation with tunable
 memory and processing costs",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "2",
 pages = "75--89",
 month = jun,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0063-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0063-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Negre:2014:EBP,
 author = "Chistophe Negre",
 title = "Efficient binary polynomial multiplication based on
 optimized {Karatsuba} reconstruction",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "2",
 pages = "91--106",
 month = jun,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0066-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0066-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2014:ASC,
 author = "Claude Carlet and Jean-Luc Danger and Sylvain Guilley
 and Emmanuel Prouff Houssem Maghrebi",
 title = "Achieving side-channel high-order correlation immunity
 with leakage squeezing",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "2",
 pages = "107--121",
 month = jun,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0067-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0067-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Biasi:2014:SEC,
 author = "Felipe P. Biasi and Paulo S. L. M. Barreto and Rafael
 Misoczki and Wilson V. Ruggiero",
 title = "Scaling efficient code-based cryptosystems for
 embedded platforms",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "2",
 pages = "123--134",
 month = jun,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0070-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0070-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Paul:2014:DSC,
 author = "Goutam Paul and Anupam Chattopadhyay",
 title = "Designing stream ciphers with scalable data-widths: a
 case study with {HC-128}",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "2",
 pages = "135--143",
 month = jun,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0071-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0071-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HCb,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "2",
 pages = "??--??",
 month = jun,
 year = "2014",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Moro:2014:FVS,
 author = "N. Moro and K. Heydemann and E. Encrenaz and B.
 Robisson",
 title = "Formal verification of a software countermeasure
 against instruction skip attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "3",
 pages = "145--156",
 month = sep,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0077-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0077-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Belaid:2014:TFR,
 author = "Sonia Bela{\"\i}d and Fabrizio {De Santis} and Johann
 Heyszl and Stefan Mangard and Marcel Medwed and
 J{\o}rn-Marc Schmidt and Fran{\c{c}}ois-Xavier
 Standaert and Stefan Tillich",
 title = "Towards fresh re-keying with leakage-resilient {PRFs}:
 cipher design principles and analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "3",
 pages = "157--171",
 month = sep,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0079-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0079-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rauzy:2014:FPC,
 author = "Pablo Rauzy and Sylvain Guilley",
 title = "A formal proof of countermeasures against fault
 injection attacks on {CRT--RSA}",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "3",
 pages = "173--185",
 month = sep,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0065-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0065-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kamel:2014:ULI,
 author = "Dina Kamel and Mathieu Renauld and Denis Flandre and
 Fran{\c{c}}ois-Xavier Standaert",
 title = "Understanding the limitations and improving the
 relevance of {SPICE} simulations in side-channel
 security evaluations",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "3",
 pages = "187--195",
 month = sep,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0080-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0080-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Tiran:2014:MLF,
 author = "S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and
 P. Maurine",
 title = "A model of the leakage in the frequency domain and its
 application to {CPA} and {DPA}",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "3",
 pages = "197--212",
 month = sep,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0074-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0074-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HCc,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "3",
 pages = "??--??",
 month = sep,
 year = "2014",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Aug 20 18:51:36 MDT 2014",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schindler:2014:PAP,
 author = "Werner Schindler and Andreas Wiemers",
 title = "Power attacks in the presence of exponent blinding",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "4",
 pages = "213--236",
 month = nov,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0081-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Feb 10 08:19:07 MST 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0081-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Karati:2014:NAB,
 author = "Sabyasachi Karati and Abhijit Das and Dipanwita
 Roychowdhury and Bhargav Bellur and Debojyoti
 Bhattacharya and Aravind Iyer",
 title = "New algorithms for batch verification of standard
 {ECDSA} signatures",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "4",
 pages = "237--258",
 month = nov,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0082-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Feb 10 08:19:07 MST 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0082-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Clavier:2014:PIS,
 author = "Christophe Clavier and Jean-Luc Danger and Guillaume
 Duc and M. Abdelaziz Elaabid and Beno{\^\i}t G{\'e}rard
 and Sylvain Guilley and Annelie Heuser and Michael
 Kasper and Yang Li and Victor Lomn{\'e} and Daisuke
 Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent
 Sauvage and Werner Schindler and et al",
 title = "Practical improvements of side-channel attacks on
 {AES}: feedback from the 2nd {DPA} contest",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "4",
 pages = "259--274",
 month = nov,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0075-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Feb 10 08:19:07 MST 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0075-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bos:2014:CTM,
 author = "Joppe W. Bos",
 title = "Constant time modular inversion",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "4",
 pages = "275--281",
 month = nov,
 year = "2014",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0084-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Feb 10 08:19:07 MST 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0084-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Anonymous:2014:HC,
 author = "Anonymous",
 title = "Help \& Contacts",
 journal = j-J-CRYPTO-ENG,
 volume = "4",
 number = "4",
 pages = "??--??",
 month = nov,
 year = "2014",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Feb 10 08:19:07 MST 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Templin:2015:NPA,
 author = "Joshua R. Templin and Jason R. Hamlet",
 title = "A new power-aware {FPGA} design metric",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "1",
 pages = "1--11",
 month = apr,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-013-0060-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-013-0060-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Banik:2015:IDF,
 author = "Subhadeep Banik and Subhamoy Maitra and Santanu
 Sarkar",
 title = "Improved differential fault attack on {MICKEY 2.0}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "1",
 pages = "13--29",
 month = apr,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0083-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0083-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Faz-Hernandez:2015:ESA,
 author = "Armando Faz-Hern{\'a}ndez and Patrick Longa and Ana H.
 S{\'a}nchez",
 title = "Efficient and secure algorithms for {GLV}-based scalar
 multiplication and their implementation on {GLV--GLS}
 curves (extended version)",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "1",
 pages = "31--52",
 month = apr,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0085-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0085-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{OFlynn:2015:SSC,
 author = "Colin O'Flynn and Zhizhang Chen",
 title = "Synchronous sampling and clock recovery of internal
 oscillators for side channel analysis and fault
 injection",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "1",
 pages = "53--69",
 month = apr,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0087-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0087-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Batina:2015:ICS,
 author = "Lejla Batina and M. J. B. Robshaw",
 title = "Introduction to the {CHES 2014} special issue",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "71--72",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0098-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0098-x;
 http://link.springer.com/content/pdf/10.1007/s13389-015-0098-x.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Coron:2015:FEP,
 author = "Jean-S{\'e}bastien Coron and Arnab Roy and Srinivas
 Vivek",
 title = "Fast evaluation of polynomials over binary finite
 fields and application to side-channel
 countermeasures",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "73--83",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0099-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0099-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sugawara:2015:RSD,
 author = "Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii
 and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki
 and Takeshi Fujino",
 title = "Reversing stealthy dopant-level circuits",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "85--94",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0102-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0102-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Genkin:2015:GYH,
 author = "Daniel Genkin and Itamar Pipman and Eran Tromer",
 title = "Get your hands off my laptop: physical side-channel
 key-extraction attacks on {PCs}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "95--112",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0100-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0100-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Vliegen:2015:PFE,
 author = "Jo Vliegen and Nele Mentens and Dirk Koch and Dries
 Schellekens and Ingrid Verbauwhede",
 title = "Practical feasibility evaluation and improvement of a
 pay-per-use licensing scheme for hardware {IP} cores in
 {Xilinx} {FPGAs}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "113--122",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0088-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0088-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lerman:2015:MLA,
 author = "Liran Lerman and Gianluca Bontempi and Olivier
 Markowitch",
 title = "A machine learning approach against a masked {AES}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "123--139",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0089-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0089-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gueron:2015:FPF,
 author = "Shay Gueron and Vlad Krasnov",
 title = "Fast prime field elliptic-curve cryptography with $
 256$-bit primes",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "2",
 pages = "141--151",
 month = jun,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0090-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0090-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guo:2015:SAC,
 author = "Xiaofei Guo and Debdeep Mukhopadhyay and Chenglu Jin
 and Ramesh Karri",
 title = "Security analysis of concurrent error detection
 against differential fault analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "3",
 pages = "153--169",
 month = sep,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0092-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0092-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Perin:2015:VHC,
 author = "Guilherme Perin and Laurent Imbert and Philippe
 Maurine and Lionel Torres",
 title = "Vertical and horizontal correlation attacks on
 {RNS}-based exponentiations",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "3",
 pages = "171--185",
 month = sep,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0095-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0095-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yamamoto:2015:NME,
 author = "Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto
 and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh
 and Naoya Torii",
 title = "A new method for enhancing variety and maintaining
 reliability of {PUF} responses and its evaluation on
 {ASICs}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "3",
 pages = "187--199",
 month = sep,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-014-0091-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-014-0091-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Hutter:2015:MMA,
 author = "Michael Hutter and Peter Schwabe",
 title = "Multiprecision multiplication on {AVR} revisited",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "3",
 pages = "201--214",
 month = sep,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0093-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0093-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "AVR ATmega 8-bit microcontroller; Karatsuba
 multiplication; microcontroller; multiple-precision
 multiplication",
}
@Article{Bluhm:2015:FSI,
 author = "Manuel Bluhm and Shay Gueron",
 title = "Fast software implementation of binary elliptic curve
 cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "3",
 pages = "215--226",
 month = sep,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0094-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Aug 8 10:42:46 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0094-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "Binary elliptic curve; Binary field arithmetic; ECDHE;
 ECDSA; Intel AVX pclmulqdq instruction; Mul\&add;
 Scalar multiplication; Side-channel protection",
}
@Article{Fei:2015:SBS,
 author = "Yunsi Fei and A. Adam Ding and Jian Lao and Liwei
 Zhang",
 title = "A statistics-based success rate model for {DPA} and
 {CPA}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "4",
 pages = "227--243",
 month = nov,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0107-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Oct 19 14:22:58 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0107-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hamlet:2015:TOI,
 author = "Jason R. Hamlet and Robert W. Brocato",
 title = "Throughput-optimized implementations of {QUAD}",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "4",
 pages = "245--254",
 month = nov,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0109-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Oct 19 14:22:58 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0109-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lerman:2015:BVD,
 author = "Liran Lerman and Gianluca Bontempi and Olivier
 Markowitch",
 title = "The bias-variance decomposition in profiled attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "4",
 pages = "255--267",
 month = nov,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0106-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Oct 19 14:22:58 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0106-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bongiovanni:2015:DVT,
 author = "Simone Bongiovanni and Francesco Centurelli and
 Giuseppe Scotti and Alessandro Trifiletti",
 title = "Design and validation through a frequency-based metric
 of a new countermeasure to protect nanometer {ICs} from
 side-channel attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "4",
 pages = "269--288",
 month = nov,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0096-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Oct 19 14:22:58 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0096-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cenk:2015:SNR,
 author = "Murat Cenk and M. Anwar Hasan",
 title = "Some new results on binary polynomial multiplication",
 journal = j-J-CRYPTO-ENG,
 volume = "5",
 number = "4",
 pages = "289--303",
 month = nov,
 year = "2015",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0101-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Oct 19 14:22:58 MDT 2015",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0101-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Konheim:2016:ATM,
 author = "Alan G. Konheim",
 title = "Automated teller machines: their history and
 authentication protocols",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "1",
 pages = "1--29",
 month = apr,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0104-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Apr 7 09:34:40 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0104-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aldaya:2016:ABT,
 author = "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
 Sarmiento and Santiago S{\'a}nchez-Solano",
 title = "{AES T-Box} tampering attack",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "1",
 pages = "31--48",
 month = apr,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0103-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Apr 7 09:34:40 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0103-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ferradi:2016:WOC,
 author = "Houda Ferradi and R{\'e}mi G{\'e}raud and David
 Naccache and Assia Tria",
 title = "When organized crime applies academic results: a
 forensic analysis of an in-card listening device",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "1",
 pages = "49--59",
 month = apr,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0112-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Apr 7 09:34:40 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0112-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bayon:2016:FME,
 author = "Pierre Bayon and Lilian Bossuet and Alain Aubert and
 Viktor Fischer",
 title = "Fault model of electromagnetic attacks targeting ring
 oscillator-based true random number generators",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "1",
 pages = "61--74",
 month = apr,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0113-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Apr 7 09:34:40 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/prng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0113-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saarinen:2016:BAC,
 author = "Markku-Juhani O. Saarinen",
 title = "The {BRUTUS} automatic cryptanalytic framework",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "1",
 pages = "75--82",
 month = apr,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0114-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Apr 7 09:34:40 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-015-0114-1;
 http://link.springer.com/content/pdf/10.1007/s13389-015-0114-1.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guneysu:2016:ICS,
 author = "Tim G{\"u}neysu and Helena Handschuh",
 title = "Introduction to the {CHES 2015} special issue",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "2",
 pages = "83--84",
 month = jun,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0130-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon May 30 07:49:01 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0130-9;
 http://link.springer.com/content/pdf/10.1007/s13389-016-0130-9.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schneider:2016:LAM,
 author = "Tobias Schneider and Amir Moradi",
 title = "Leakage assessment methodology",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "2",
 pages = "85--99",
 month = jun,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0120-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon May 30 07:49:01 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0120-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schindler:2016:EEB,
 author = "Werner Schindler",
 title = "Exclusive exponent blinding is not enough to prevent
 any timing attack on {RSA}",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "2",
 pages = "101--119",
 month = jun,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0124-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon May 30 07:49:01 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0124-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Maes:2016:SKG,
 author = "Roel Maes and Vincent van der Leest and Erik van der
 Sluis and Frans Willems",
 title = "Secure key generation from biased {PUFs}: extended
 version",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "2",
 pages = "121--137",
 month = jun,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0125-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon May 30 07:49:01 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0125-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Reparaz:2016:MRL,
 author = "Oscar Reparaz and Sujoy Sinha Roy and Ruan de Clercq
 and Frederik Vercauteren and Ingrid Verbauwhede",
 title = "Masking ring-{LWE}",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "2",
 pages = "139--153",
 month = jun,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0126-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon May 30 07:49:01 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0126-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Coisel:2016:ICD,
 author = "Iwen Coisel and Ignacio Sanchez",
 title = "Improved cryptanalysis of the {DECT} standard cipher",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "2",
 pages = "155--169",
 month = jun,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0127-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon May 30 07:49:01 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0127-4;
 http://link.springer.com/content/pdf/10.1007/s13389-016-0127-4.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lemire:2016:FBU,
 author = "Daniel Lemire and Owen Kaser",
 title = "Faster $ 64$-bit universal hashing using carry-less
 multiplications",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "171--185",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0110-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/hash.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0110-5;
 http://link.springer.com/article/10.1007/s13389-015-0110-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Goundar:2016:IFA,
 author = "Raveen R. Goundar and Marc Joye",
 title = "Inversion-free arithmetic on elliptic curves through
 isomorphisms",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "187--199",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0131-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0131-8;
 http://link.springer.com/article/10.1007/s13389-016-0131-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rauzy:2016:FPS,
 author = "Pablo Rauzy and Sylvain Guilley and Zakaria Najm",
 title = "Formally proved security of assembly code against
 power analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "201--216",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0105-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0105-2;
 http://link.springer.com/article/10.1007/s13389-015-0105-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robisson:2016:PFC,
 author = "Bruno Robisson and H{\'e}l{\`e}ne {Le Bouder}",
 title = "Physical functions: the common factor of side-channel
 and fault attacks?",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "217--227",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0111-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0111-4;
 http://link.springer.com/article/10.1007/s13389-015-0111-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Galindo:2016:ILR,
 author = "David Galindo and Johann Gro{\ss}sch{\"a}dl and Zhe
 Liu and Praveen Kumar Vadnala and Srinivas Vivek",
 title = "Implementation of a leakage-resilient {ElGamal} key
 encapsulation mechanism",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "229--238",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0121-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0121-x;
 http://link.springer.com/content/pdf/10.1007/s13389-016-0121-x.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ngo:2016:MTA,
 author = "Xuan Thuy Ngo and Zakaria Najm and Shivam Bhasin and
 Sylvain Guilley and Jean-Luc Danger",
 title = "Method taking into account process dispersion to
 detect hardware {Trojan Horse} by side-channel
 analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "239--247",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0129-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0129-2;
 http://link.springer.com/article/10.1007/s13389-016-0129-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ganji:2016:PLA,
 author = "Fatemeh Ganji and Shahin Tajik and Jean-Pierre
 Seifert",
 title = "{PAC} learning of arbiter {PUFs}",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "3",
 pages = "249--258",
 month = sep,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0119-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Mon Sep 12 08:05:12 MDT 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0119-4;
 http://link.springer.com/article/10.1007/s13389-016-0119-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Bos:2016:SEC,
 author = "Joppe W. Bos and Craig Costello and Patrick Longa and
 Michael Naehrig",
 title = "Selecting elliptic curves for cryptography: an
 efficiency and security analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "4",
 pages = "259--286",
 month = nov,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0097-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Nov 17 07:32:46 MST 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0097-y;
 http://link.springer.com/article/10.1007/s13389-015-0097-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wenger:2016:HBF,
 author = "Erich Wenger and Paul Wolfger",
 title = "Harder, better, faster, stronger: elliptic curve
 discrete logarithm computations on {FPGAs}",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "4",
 pages = "287--297",
 month = nov,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-015-0108-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Nov 17 07:32:46 MST 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-015-0108-z;
 http://link.springer.com/article/10.1007/s13389-015-0108-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Khalid:2016:RRP,
 author = "Ayesha Khalid and Muhammad Hassan and Goutam Paul and
 Anupam Chattopadhyay",
 title = "{RunFein}: a rapid prototyping framework for {Feistel}
 and {SPN}-based block ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "4",
 pages = "299--323",
 month = nov,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0116-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Nov 17 07:32:46 MST 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0116-7;
 http://link.springer.com/article/10.1007/s13389-016-0116-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Moein:2016:HAA,
 author = "Samer Moein and Fayez Gebali and T. Aaron Gulliver",
 title = "Hardware attacks: an algebraic approach",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "4",
 pages = "325--337",
 month = nov,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0117-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Nov 17 07:32:46 MST 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0117-6;
 http://link.springer.com/article/10.1007/s13389-016-0117-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ghafar:2016:SRV,
 author = "Amir Hamzah Abd Ghafar and Muhammad Rezal Kamel
 Ariffin",
 title = "{SPA} on {Rabin} variant with public key {$ N = p^2 q
 $}",
 journal = j-J-CRYPTO-ENG,
 volume = "6",
 number = "4",
 pages = "339--346",
 month = nov,
 year = "2016",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0118-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Nov 17 07:32:46 MST 2016",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0118-5;
 http://link.springer.com/article/10.1007/s13389-016-0118-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carbone:2017:MIA,
 author = "Mathieu Carbone and Yannick Teglia and Gilles R.
 Ducharme and Philippe Maurine",
 title = "Mutual information analysis: higher-order statistical
 moments, efficiency and efficacy",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "1--17",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0123-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0123-8;
 http://link.springer.com/article/10.1007/s13389-016-0123-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Guilley:2017:EAP,
 author = "Sylvain Guilley",
 title = "Editorial about {PROOFS 2015}",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "19--20",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0140-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0140-7;
 http://link.springer.com/content/pdf/10.1007/s13389-016-0140-7.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Idrissi:2017:TCM,
 author = "Noreddine El Janati {El Idrissi} and Guillaume
 Bouffard and Jean-Louis Lanet and Said {El Hajji}",
 title = "Trust can be misplaced",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "21--34",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0142-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0142-5;
 http://link.springer.com/article/10.1007/s13389-016-0142-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nashimoto:2017:BOA,
 author = "Shoei Nashimoto and Naofumi Homma and Yu-ichi Hayashi
 and Junko Takahashi and Hitoshi Fuji and Takafumi
 Aoki",
 title = "Buffer overflow attack with multiple fault injection
 and a proven countermeasure",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "35--46",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0136-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0136-3;
 http://link.springer.com/article/10.1007/s13389-016-0136-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robisson:2017:SSM,
 author = "Bruno Robisson and Michel Agoyan and Patrick Soquet
 and S{\'e}bastien Le-Henaff and Franck Wajsb{\"u}rt and
 Pirouz Bazargan-Sabet and Guillaume Phan",
 title = "Smart security management in secure devices",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "47--61",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0143-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0143-4;
 http://link.springer.com/article/10.1007/s13389-016-0143-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lugou:2017:STU,
 author = "Florian Lugou and Ludovic Apvrille and Aur{\'e}lien
 Francillon",
 title = "{SMASHUP}: a toolchain for unified verification of
 hardware\slash software co-designs",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "63--74",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0145-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0145-2;
 http://link.springer.com/article/10.1007/s13389-016-0145-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Azzi:2017:ULC,
 author = "Sabine Azzi and Bruno Barras and Maria Christofi and
 David Vigilant",
 title = "Using linear codes as a fault countermeasure for
 nonlinear operations: application to {AES} and formal
 verification",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "75--85",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0138-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0138-1;
 http://link.springer.com/article/10.1007/s13389-016-0138-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sauvage:2017:MLF,
 author = "Laurent Sauvage and Tarik Graba and Thibault
 Porteboeuf",
 title = "Multi-level formal verification",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "1",
 pages = "87--95",
 month = apr,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0144-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun Apr 2 17:26:33 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/accesspage/article/10.1007/s13389-016-0144-3;
 http://link.springer.com/article/10.1007/s13389-016-0144-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gierlichs:2017:ICS,
 author = "Benedikt Gierlichs and Axel Y. Poschmann",
 title = "Introduction to the {CHES 2016} special issue",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "2",
 pages = "97--98",
 month = jun,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0158-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jun 24 12:13:17 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/content/pdf/10.1007/s13389-017-0158-5.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yarom:2017:CTA,
 author = "Yuval Yarom and Daniel Genkin and Nadia Heninger",
 title = "{CacheBleed}: a timing attack on {OpenSSL}
 constant-time {RSA}",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "2",
 pages = "99--112",
 month = jun,
 year = "2017",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jun 24 12:13:17 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ganji:2017:HNM,
 author = "Fatemeh Ganji and Shahin Tajik and Fabian
 F{\"a}{\ss}ler and Jean-Pierre Seifert",
 title = "Having no mathematical model may not secure {PUFs}",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "2",
 pages = "113--128",
 month = jun,
 year = "2017",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jun 24 12:13:17 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Durvaux:2017:TEL,
 author = "Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois-Xavier
 Standaert and Santos Merino {Del Pozo}",
 title = "Towards easy leakage certification: extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "2",
 pages = "129--147",
 month = jun,
 year = "2017",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jun 24 12:13:17 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Boss:2017:SBS,
 author = "Erik Boss and Vincent Grosso and Tim G{\"u}neysu and
 Gregor Leander and Amir Moradi and Tobias Schneider",
 title = "Strong 8ドル$-bit {Sboxes} with efficient masking in
 hardware extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "2",
 pages = "149--165",
 month = jun,
 year = "2017",
 CODEN = "????",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jun 24 12:13:17 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bottinelli:2017:CAC,
 author = "Paul Bottinelli and Joppe W. Bos",
 title = "Computational aspects of correlation power analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "3",
 pages = "167--181",
 month = sep,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0122-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Aug 25 11:38:26 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0122-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ordas:2017:EFI,
 author = "S. Ordas and L. Guillaume-Sage and P. Maurine",
 title = "Electromagnetic fault injection: the curse of
 flip-flops",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "3",
 pages = "183--197",
 month = sep,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0128-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Aug 25 11:38:26 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0128-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Swierczynski:2017:IPH,
 author = "Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe
 and Amir Moradi and Christof Paar",
 title = "Interdiction in practice --- Hardware {Trojan} against
 a high-security {USB} flash drive",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "3",
 pages = "199--211",
 month = sep,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0132-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Aug 25 11:38:26 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0132-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mayhew:2017:OHL,
 author = "Matthew Mayhew and Radu Muresan",
 title = "An overview of hardware-level statistical power
 analysis attack countermeasures",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "3",
 pages = "213--244",
 month = sep,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0133-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Aug 25 11:38:26 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0133-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Negre:2017:ERM,
 author = "Christophe Negre and Thomas Plantard",
 title = "Efficient regular modular exponentiation using
 multiplicative half-size splitting",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "3",
 pages = "245--253",
 month = sep,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0134-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Aug 25 11:38:26 MDT 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0134-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Schindler:2017:GPA,
 author = "Werner Schindler and Andreas Wiemers",
 title = "Generic power attacks on {RSA} with {CRT} and exponent
 blinding: new results",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "255--272",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0146-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0146-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aldaya:2017:SVB,
 author = "Alejandro Cabrera Aldaya and Alejandro J. Cabrera
 Sarmiento and Santiago S{\'a}nchez-Solano",
 title = "{SPA} vulnerabilities of the binary extended
 {Euclidean} algorithm",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "273--285",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0135-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Nov 23 09:04:19 MST 2017",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0135-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Pasalic:2017:EIG,
 author = "Enes Pasalic and Anupam Chattopadhyay and WeiGuo
 Zhang",
 title = "Efficient implementation of generalized
 {Maiorana--McFarland} class of cryptographic
 functions",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "287--295",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0139-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0139-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Homma:2017:IPS,
 author = "Naofumi Homma",
 title = "Introduction to the {PROOFS 2016} special section",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "297--298",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0173-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0173-6;
 https://link.springer.com/content/pdf/10.1007/s13389-017-0173-6.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bhattacharya:2017:FFA,
 author = "Sarani Bhattacharya and Debdeep Mukhopadhyay",
 title = "Formal fault analysis of branch predictors: attacking
 countermeasures of asymmetric key ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "299--310",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0165-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0165-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Breier:2017:SAS,
 author = "Jakub Breier and Dirmanto Jap and Shivam Bhasin",
 title = "A study on analyzing side-channel resistant encoding
 schemes with respect to fault attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "311--320",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0166-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0166-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dugardin:2017:UME,
 author = "Margaux Dugardin and Sylvain Guilley and Martin Moreau
 and Zakaria Najm and Pablo Rauzy",
 title = "Using modular extension to provably protect {Edwards}
 curves against fault attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "321--330",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0167-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0167-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bruneau:2017:OSC,
 author = "Nicolas Bruneau and Sylvain Guilley and Annelie Heuser
 and Damien Marion and Olivier Rioul",
 title = "Optimal side-channel attacks for multivariate leakages
 and multiple models",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "331--341",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0170-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0170-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Picek:2017:TAV,
 author = "Stjepan Picek and Annelie Heuser and Sylvain Guilley",
 title = "Template attack versus {Bayes} classifier",
 journal = j-J-CRYPTO-ENG,
 volume = "7",
 number = "4",
 pages = "343--351",
 month = nov,
 year = "2017",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0172-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0172-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ge:2018:SMT,
 author = "Qian Ge and Yuval Yarom and David Cock and Gernot
 Heiser",
 title = "A survey of microarchitectural timing attacks and
 countermeasures on contemporary hardware",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "1",
 pages = "1--27",
 month = apr,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0141-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0141-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chakraborti:2018:TUT,
 author = "Avik Chakraborti and Anupam Chattopadhyay and Muhammad
 Hassan and Mridul Nandi",
 title = "{TriviA} and {uTriviA}: two fast and secure
 authenticated encryption schemes",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "1",
 pages = "29--48",
 month = apr,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0137-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0137-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chakraborty:2018:DED,
 author = "Debrup Chakraborty and Cuauhtemoc Mancillas L{\'o}pez
 and Palash Sarkar",
 title = "Disk encryption: do we need to preserve length?",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "1",
 pages = "49--69",
 month = apr,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-016-0147-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-016-0147-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saarinen:2018:ACB,
 author = "Markku-Juhani O. Saarinen",
 title = "Arithmetic coding and blinding countermeasures for
 lattice signatures",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "1",
 pages = "71--84",
 month = apr,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0149-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0149-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ferradi:2018:RPN,
 author = "Houda Ferradi and R{\'e}mi G{\'e}raud and Diana Maimut
 and David Naccache and Amaury de Wargny",
 title = "Regulating the pace of {von Neumann} correctors",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "1",
 pages = "85--91",
 month = apr,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0153-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0153-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Fischer:2018:ICS,
 author = "Wieland Fischer and Naofumi Homma",
 title = "Introduction to the {CHES 2017} special issue",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "2",
 pages = "93--94",
 month = jun,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0189-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0189-6;
 https://link.springer.com/content/pdf/10.1007/s13389-018-0189-6.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chou:2018:MRT,
 author = "Tung Chou",
 title = "{McBits} revisited: toward a fast constant-time
 code-based {KEM}",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "2",
 pages = "95--107",
 month = jun,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0186-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0186-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gross:2018:UMA,
 author = "Hannes Gross and Stefan Mangard",
 title = "A unified masking approach",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "2",
 pages = "109--124",
 month = jun,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0184-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0184-y;
 https://link.springer.com/content/pdf/10.1007/s13389-018-0184-y.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Immler:2018:YRC,
 author = "Vincent Immler and Robert Specht and Florian
 Unterstein",
 title = "Your rails cannot hide from localized {EM}: how
 dual-rail logic fails on {FPGAs} --- extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "2",
 pages = "125--139",
 month = jun,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0185-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0185-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hatzivasilis:2018:RLB,
 author = "George Hatzivasilis and Konstantinos Fysarakis and
 Ioannis Papaefstathiou and Charalampos Manifavas",
 title = "A review of lightweight block ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "2",
 pages = "141--184",
 month = jun,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0160-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sun May 27 08:23:24 MDT 2018",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0160-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Rodriguez-Henriquez:2018:SIH,
 author = "Francisco Rodr{\'\i}guez-Henr{\'\i}quez and Erkay
 Savas",
 title = "Special issue in honor of {Peter Lawrence
 Montgomery}",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "185--187",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0168-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0168-3;
 https://link.springer.com/content/pdf/10.1007/s13389-017-0168-3.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bajard:2018:MRW,
 author = "Jean-Claude Bajard and Julien Eynard and Nabil
 Merkiche",
 title = "{Montgomery} reduction within the context of residue
 number system arithmetic",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "189--200",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0154-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0154-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Savas:2018:MI,
 author = "Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}",
 title = "{Montgomery} inversion",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "201--210",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0161-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0161-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dai:2018:SAM,
 author = "Wangchen Dai and Ray C. C. Cheung",
 title = "Spectral arithmetic in {Montgomery} modular
 multiplication",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "211--226",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0151-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0151-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Costello:2018:MCT,
 author = "Craig Costello and Benjamin Smith",
 title = "{Montgomery} curves and their arithmetic",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "227--240",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0157-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0157-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Oliveira:2018:MLB,
 author = "Thomaz Oliveira and Julio L{\'o}pez and Francisco
 Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
 title = "The {Montgomery} ladder on binary elliptic curves",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "241--258",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0163-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0163-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cenk:2018:KLF,
 author = "Murat Cenk",
 title = "{Karatsuba}-like formulae and their associated
 techniques",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "3",
 pages = "259--269",
 month = sep,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0155-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0155-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Farias:2018:CSE,
 author = "Luckas A. Farias and Bruno C. Albertini and Paulo S.
 L. M. Barreto",
 title = "A class of safe and efficient binary {Edwards}
 curves",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "271--283",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0174-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0174-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jarvinen:2018:ATA,
 author = "Kimmo J{\"a}rvinen and Sujoy Sinha Roy and Ingrid
 Verbauwhede",
 title = "Arithmetic of $ \tau $-adic expansions for lightweight
 {Koblitz} curve cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "285--300",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0182-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0182-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lerman:2018:TAV,
 author = "Liran Lerman and Romain Poussier and Olivier
 Markowitch and Fran{\c{c}}ois-Xavier Standaert",
 title = "Template attacks versus machine learning revisited and
 the curse of dimensionality in side-channel analysis:
 extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "301--313",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0162-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0162-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{DeVale:2018:ADI,
 author = "John DeVale and Ryan Rakvic and Kevin Rudd",
 title = "Another dimension in integrated circuit trust",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "315--326",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0164-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0164-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Karmakar:2018:SBS,
 author = "Sandip Karmakar and Dipanwita Roy Chowdhury",
 title = "Scan-based side channel attack on stream ciphers and
 its prevention",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "327--340",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0178-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0178-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Skoric:2018:TDS,
 author = "Boris Skori{\'c}",
 title = "A trivial debiasing scheme for {Helper Data Systems}",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "341--349",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0183-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0183-z;
 https://link.springer.com/content/pdf/10.1007/s13389-018-0183-z.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dosso:2018:EAC,
 author = "Yssouf Dosso and Fabien Herbaut and Nicolas M{\'e}loni
 and Pascal V{\'e}ron",
 title = "{Euclidean} addition chains scalar multiplication on
 curves with efficient endomorphism",
 journal = j-J-CRYPTO-ENG,
 volume = "8",
 number = "4",
 pages = "351--367",
 month = nov,
 year = "2018",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0190-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:50 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0190-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hutchinson:2019:CMD,
 author = "Aaron Hutchinson and Koray Karabina",
 title = "Constructing multidimensional differential addition
 chains and their applications",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "1",
 pages = "1--19",
 month = apr,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0177-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0177-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Batina:2019:OTA,
 author = "Lejla Batina and {\L}ukasz Chmielewski and Louiza
 Papachristodoulou and Peter Schwabe and Michael
 Tunstall",
 title = "Online template attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "1",
 pages = "21--36",
 month = apr,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0171-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0171-8;
 https://link.springer.com/content/pdf/10.1007/s13389-017-0171-8.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Diop:2019:TPH,
 author = "Ibrahima Diop and Yanis Linge and Thomas Ordas and
 Pierre-Yvan Liardet and Philippe Maurine",
 title = "From theory to practice: horizontal attacks on
 protected implementations of modular exponentiations",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "1",
 pages = "37--52",
 month = apr,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0181-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0181-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saha:2019:IDF,
 author = "Dhiman Saha and Dipanwita Roy Chowdhury",
 title = "Internal differential fault analysis of parallelizable
 ciphers in the counter-mode",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "1",
 pages = "53--67",
 month = apr,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0179-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0179-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Banik:2019:CCC,
 author = "Subhadeep Banik and Andrey Bogdanov and Francesco
 Regazzoni",
 title = "Compact circuits for combined {AES} encryption\slash
 decryption",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "1",
 pages = "69--83",
 month = apr,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0176-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0176-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Konheim:2019:HFI,
 author = "Alan G. Konheim",
 title = "{Horst Feistel}: the inventor of {LUCIFER}, the
 cryptographic algorithm that changed cryptology",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "1",
 pages = "85--100",
 month = apr,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0198-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0198-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ueno:2019:HEG,
 author = "Rei Ueno and Naofumi Homma and Yasuyuki Nogami and
 Takafumi Aoki",
 title = "Highly efficient {$ \textit {GF}(2^8) $} inversion
 circuit based on hybrid {GF} representations",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "2",
 pages = "101--113",
 month = jun,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0187-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0187-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robert:2019:EFB,
 author = "Jean-Marc Robert and Christophe Negre and Thomas
 Plantard",
 title = "Efficient Fixed-base exponentiation and scalar
 multiplication based on a multiplicative splitting
 exponent recoding",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "2",
 pages = "115--136",
 month = jun,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0196-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0196-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Unterluggauer:2019:MME,
 author = "Thomas Unterluggauer and Mario Werner and Stefan
 Mangard",
 title = "{MEAS}: memory encryption and authentication secure
 against side-channel attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "2",
 pages = "137--158",
 month = jun,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0180-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0180-2;
 https://link.springer.com/content/pdf/10.1007/s13389-018-0180-2.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Peccerillo:2019:PBA,
 author = "Biagio Peccerillo and Sandro Bartolini and {\c{C}}etin
 Kaya Ko{\c{c}}",
 title = "Parallel bitsliced {AES} through {PHAST}: a
 single-source high-performance library for multi-cores
 and {GPUs}",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "2",
 pages = "159--171",
 month = jun,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-017-0175-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-017-0175-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hutter:2019:CTH,
 author = "Michael Hutter and Michael Tunstall",
 title = "Constant-time higher-order {Boolean}-to-arithmetic
 masking",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "2",
 pages = "173--184",
 month = jun,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0191-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0191-z",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Herbert:2019:DIL,
 author = "Vincent Herbert and Bhaskar Biswas and Caroline
 Fontaine",
 title = "Design and implementation of low-depth pairing-based
 homomorphic encryption scheme",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "2",
 pages = "185--201",
 month = jun,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0192-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:51 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0192-y",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saha:2019:AFE,
 author = "Sayandeep Saha and Ujjawal Kumar and Debdeep
 Mukhopadhyay and Pallab Dasgupta",
 title = "An automated framework for exploitable fault
 identification in block ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "203--219",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00203-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00203-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wisiol:2019:WAL,
 author = "Nils Wisiol and Marian Margraf",
 title = "Why attackers lose: design and security analysis of
 arbitrarily large {XOR} arbiter {PUFs}",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "221--230",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00204-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00204-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{BenElOuahma:2019:SCR,
 author = "In{\`e}s {Ben El Ouahma} and Quentin L. Meunier and
 Karine Heydemann and Emmanuelle Encrenaz",
 title = "Side-channel robustness analysis of masked assembly
 codes using a symbolic approach",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "231--242",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00205-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00205-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Baumann:2019:VSL,
 author = "Christoph Baumann and Oliver Schwarz and Mads Dam",
 title = "On the verification of system-level information flow
 properties for virtualized execution platforms",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "243--261",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00216-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00216-4;
 https://link.springer.com/content/pdf/10.1007/s13389-019-00216-4.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Das:2019:AGH,
 author = "Poulami Das and Debapriya Basu Roy and Debdeep
 Mukhopadhyay",
 title = "Automatic generation of {HCCA}-resistant scalar
 multiplication algorithm by proper sequencing of field
 multiplier operands",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "263--275",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00219-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00219-1",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Geraud:2019:MRN,
 author = "R{\'e}mi G{\'e}raud and David Naccache",
 title = "Mixed-radix {Naccache--Stern} encryption",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "277--282",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0188-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0188-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dinu:2019:TLB,
 author = "Daniel Dinu and Yann {Le Corre} and Dmitry
 Khovratovich and L{\'e}o Perrin and Johann
 Gro{\ss}sch{\"a}dl and Alex Biryukov",
 title = "Triathlon of lightweight block ciphers for the
 {Internet of Things}",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "283--302",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0193-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0193-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2019:PDS,
 author = "Claude Carlet and Abderrahman Daif and Sylvain Guilley
 and C{\'e}dric Tavernier",
 title = "Polynomial direct sum masking to protect against both
 {SCA} and {FIA}",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "3",
 pages = "303--312",
 month = sep,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0194-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Oct 2 11:24:52 MDT 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0194-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kawamura:2019:RMR,
 author = "Shinichi Kawamura and Yuichi Komano and Hideo Shimizu
 and Tomoko Yonemura",
 title = "{RNS} {Montgomery} reduction algorithms using
 quadratic residuosity",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "313--331",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0195-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0195-8;
 https://link.springer.com/content/pdf/10.1007/s13389-018-0195-8.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saldamli:2019:UMM,
 author = "Gokay Saldamli and Yoo-Jin Baek",
 title = "Uniform {Montgomery} multiplier",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "333--339",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00213-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00213-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Drucker:2019:TSO,
 author = "Nir Drucker and Shay Gueron",
 title = "A toolbox for software optimization of {QC--MDPC}
 code-based cryptosystems",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "341--357",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-00200-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-00200-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Banegas:2019:NCI,
 author = "Gustavo Banegas and Ricardo Cust{\'o}dio and Daniel
 Panario",
 title = "A new class of irreducible pentanomials for
 polynomial-based multipliers in binary fields",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "359--373",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-0197-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-0197-6;
 https://link.springer.com/content/pdf/10.1007/s13389-018-0197-6.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cianfriglia:2019:KAR,
 author = "Marco Cianfriglia and Stefano Guarino and Massimo
 Bernaschi and Flavio Lombardi and Marco Pedicini",
 title = "Kite attack: reshaping the cube attack for a flexible
 {GPU}-based maxterm search",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "375--392",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00217-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00217-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Levina:2019:PMS,
 author = "Alla Levina and Roman Mostovoi and Daria Sleptsova and
 Lavrentii Tcvetkov",
 title = "Physical model of sensitive data leakage from
 {PC}-based cryptographic systems",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "393--400",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00215-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00215-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wu:2019:FUE,
 author = "Tao Wu and Ruomei Wang",
 title = "Fast unified elliptic curve point multiplication for
 {NIST} prime curves on {FPGAs}",
 journal = j-J-CRYPTO-ENG,
 volume = "9",
 number = "4",
 pages = "401--410",
 month = nov,
 year = "2019",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00211-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Nov 30 08:02:44 MST 2019",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00211-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389w",
}
@Article{Jauvart:2020:ISC,
 author = "Damien Jauvart and Nadia El Mrabet and Jacques J. A.
 Fournier and Louis Goubin",
 title = "Improving side-channel attacks against pairing-based
 cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "1",
 pages = "1--16",
 month = apr,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-00201-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 8 10:09:54 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-00201-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Barthe:2020:IPM,
 author = "Gilles Barthe and Sonia Bela{\"\i}d and Fran{\c{c}}ois
 Dupressoir and Pierre-Alain Fouque and Benjamin
 Gr{\'e}goire and Fran{\c{c}}ois-Xavier Standaert and
 Pierre-Yves Strub",
 title = "Improved parallel mask refreshing algorithms: generic
 solutions with parametrized non-interference and
 automated optimizations",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "1",
 pages = "17--26",
 month = apr,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-018-00202-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 8 10:09:54 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-018-00202-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Abarzua:2020:SVA,
 author = "Rodrigo Abarz{\'u}a and Santi Mart{\'\i}nez and
 Valeria Mendoza and Nicolas Th{\'e}riault",
 title = "Same value analysis on {Edwards} curves",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "1",
 pages = "27--48",
 month = apr,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00206-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 8 10:09:54 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00206-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Goubin:2020:HRS,
 author = "Louis Goubin and Pascal Paillier and Matthieu Rivain
 and Junwei Wang",
 title = "How to reveal the secrets of an obscure white-box
 implementation",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "1",
 pages = "49--66",
 month = apr,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00207-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 8 10:09:54 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00207-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Willers:2020:FDC,
 author = "Oliver Willers and Christopher Huth and Jorge Guajardo
 and Helmut Seidel and Peter Deutsch",
 title = "On the feasibility of deriving cryptographic keys from
 {MEMS} sensors",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "1",
 pages = "67--83",
 month = apr,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00208-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 8 10:09:54 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00208-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Zhou:2020:DLM,
 author = "Yuanyuan Zhou and Fran{\c{c}}ois-Xavier Standaert",
 title = "Deep learning mitigates but does not annihilate the
 need of aligned traces and a generalized {ResNet} model
 for side-channel attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "1",
 pages = "85--95",
 month = apr,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00209-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 8 10:09:54 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00209-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bos:2020:FMA,
 author = "Joppe W. Bos and Simon J. Friedberger",
 title = "Faster modular arithmetic for isogeny-based crypto on
 embedded devices",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "2",
 pages = "97--109",
 month = jun,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00214-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jul 25 08:32:22 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00214-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Didier:2020:EMO,
 author = "Laurent-St{\'e}phane Didier and Fangan-Yssouf Dosso
 and Pascal V{\'e}ron",
 title = "Efficient modular operations using the adapted modular
 number system",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "2",
 pages = "111--133",
 month = jun,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00221-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jul 25 08:32:22 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00221-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hettwer:2020:AML,
 author = "Benjamin Hettwer and Stefan Gehrer and Tim
 G{\"u}neysu",
 title = "Applications of machine learning techniques in
 side-channel attacks: a survey",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "2",
 pages = "135--162",
 month = jun,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00212-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jul 25 08:32:22 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00212-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Benadjila:2020:DLS,
 author = "Ryad Benadjila and Emmanuel Prouff and R{\'e}mi
 Strullu and Eleonora Cagli and C{\'e}cile Dumas",
 title = "Deep learning for side-channel analysis and
 introduction to {ASCAD} database",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "2",
 pages = "163--188",
 month = jun,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00220-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jul 25 08:32:22 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00220-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Orumiehchiha:2020:DFA,
 author = "Mohammad Ali Orumiehchiha and Saeed Rostami and Elham
 Shakour and Josef Pieprzyk",
 title = "A differential fault attack on the {WG} family of
 stream ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "2",
 pages = "189--195",
 month = jun,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00222-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Jul 25 08:32:22 MDT 2020",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00222-x",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Piccoli:2020:PMB,
 author = "Alessandro {De Piccoli} and Andrea Visconti and
 Ottavio Giulio Rizzo",
 title = "Polynomial multiplication over binary finite fields:
 new upper bounds",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "3",
 pages = "197--210",
 month = sep,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00210-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:04 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00210-w",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cruz:2020:ESS,
 author = "Rafael J. Cruz and Antonio Guimar{\~a}es and Diego F.
 Aranha",
 title = "Efficient and secure software implementations of
 {Fantomas}",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "3",
 pages = "211--228",
 month = sep,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-019-00218-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:04 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-019-00218-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hiller:2020:REC,
 author = "Matthias Hiller and Ludwig K{\"u}rzinger and Georg
 Sigl",
 title = "Review of error correction for {PUFs} and evaluation
 on state-of-the-art {FPGAs}",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "3",
 pages = "229--247",
 month = sep,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00223-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:04 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00223-w;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00223-w.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Schoinianakis:2020:RAS,
 author = "Dimitrios Schoinianakis",
 title = "Residue arithmetic systems in cryptography: a survey
 on modern security applications",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "3",
 pages = "249--267",
 month = sep,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00231-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:04 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00231-w",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wiemers:2020:RSR,
 author = "Andreas Wiemers",
 title = "A remark on a success rate model for side-channel
 attack analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "3",
 pages = "269--274",
 month = sep,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00235-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:04 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00235-6;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00235-6.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Richter:2020:TAN,
 author = "Bastian Richter and Amir Moradi",
 title = "Template attacks on nano-scale {CMOS} devices",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "3",
 pages = "275--285",
 month = sep,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00225-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:04 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00225-8;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00225-8.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Batina:2020:PE,
 author = "Lejla Batina and Nele Mentens",
 title = "{PROOFS} 2018 Editorial",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "4",
 pages = "287--287",
 month = nov,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00248-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00248-1;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00248-1.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Alam:2020:IAH,
 author = "Manaar Alam and Debdeep Mukhopadhyay and Sai Praveen
 Kadiyala and Siew-Kei Lam and Thambipillai Srikanthan",
 title = "Improving accuracy of {HPC}-based malware
 classification for embedded platforms using gradient
 descent optimization",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "4",
 pages = "289--303",
 month = nov,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00232-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00232-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sijacic:2020:TEA,
 author = "Danilo Sijaci{\'c} and Josep Balasch and Bohan Yang
 and Santosh Ghosh and Ingrid Verbauwhede",
 title = "Towards efficient and automated side-channel
 evaluations at design time",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "4",
 pages = "305--319",
 month = nov,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00233-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00233-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gay:2020:ECS,
 author = "Mael Gay and Batya Karp and Osnat Keren and Ilia
 Polian",
 title = "Error control scheme for malicious and natural faults
 in cryptographic modules",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "4",
 pages = "321--336",
 month = nov,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00234-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00234-7;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00234-7.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ouladj:2020:PTA,
 author = "Maamar Ouladj and Nadia {El Mrabet} and Sylvain
 Guilley and Philippe Guillot and Gilles
 Mill{\'e}rioux",
 title = "On the power of template attacks in highly
 multivariate context",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "4",
 pages = "337--354",
 month = nov,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00239-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00239-2",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Baksi:2020:IIC,
 author = "Anubhab Baksi and Dhiman Saha and Sumanta Sarkar",
 title = "To infect or not to infect: a critical analysis of
 infective countermeasures in fault attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "10",
 number = "4",
 pages = "355--374",
 month = nov,
 year = "2020",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00224-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00224-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yeo:2021:IAA,
 author = "Sze Ling Yeo and Duc-Phong Le and Khoongming Khoo",
 title = "Improved algebraic attacks on lightweight block
 ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "1",
 pages = "1--19",
 month = apr,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00237-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00237-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Resende:2021:FUP,
 author = "Amanda Cristina Davi Resende and Diego de Freitas
 Aranha",
 title = "Faster unbalanced {Private Set Intersection} in the
 semi-honest setting",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "1",
 pages = "21--38",
 month = apr,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00242-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00242-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bronchain:2021:RRT,
 author = "Olivier Bronchain and Tobias Schneider and
 Fran{\c{c}}ois-Xavier Standaert",
 title = "Reducing risks through simplicity: high side-channel
 security for lazy engineers",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "1",
 pages = "39--55",
 month = apr,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00241-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00241-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Pereira:2021:OPA,
 author = "Geovandro Pereira and Javad Doliskani and David Jao",
 title = "$x$-only point addition formula and faster compressed
 {SIKE}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "1",
 pages = "57--69",
 month = apr,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00245-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00245-4",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Abarzua:2021:SPS,
 author = "Rodrigo Abarz{\'u}a and Claudio Valencia and Julio
 L{\'o}pez",
 title = "Survey on performance and security problems of
 countermeasures for passive side-channel attacks on
 {ECC}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "1",
 pages = "71--102",
 month = apr,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00257-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri May 7 08:20:05 MDT 2021",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00257-8",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Heydemann:2021:EAP,
 author = "Karine Heydemann and Letitia Li",
 title = "Editorial about {PROOFS 2019}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "103--104",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00236-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 note = "See correction \cite{Heydemann:2021:CEA}.",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00236-5;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00236-5.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ganji:2021:RPC,
 author = "Fatemeh Ganji and Shahin Tajik and Pascal Stauss and
 Jean-Pierre Seifert and Mark Tehranipoor and Domenic
 Forte",
 title = "Rock'n'roll {PUFs}: crafting provably secure {PUFs}
 from less secure ones (extended version)",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "105--118",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00226-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00226-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Cheng:2021:DFI,
 author = "Wei Cheng and Claude Carlet and Kouassi Goli and
 Jean-Luc Danger and Sylvain Guilley",
 title = "Detecting faults in inner product masking scheme",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "119--133",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00227-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00227-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Perianin:2021:EEA,
 author = "Thomas Perianin and Sebastien Carr{\'e} and Victor
 Dyseryn and Adrien Facon and Sylvain Guilley",
 title = "End-to-end automated cache-timing attack driven by
 machine learning",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "135--146",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00228-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00228-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Keren:2021:IRC,
 author = "Osnat Keren and Ilia Polian",
 title = "{IPM-RED}: combining higher-order masking with robust
 error detection",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "147--160",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00229-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00229-4;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00229-4.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ueno:2021:MCS,
 author = "Rei Ueno and Junko Takahashi and Yu-ichi Hayashi and
 Naofumi Homma",
 title = "A method for constructing sliding windows leak from
 noisy cache timing information",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "161--170",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00230-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00230-x;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00230-x.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kamel:2021:SCA,
 author = "Dina Kamel and Davide Bellizia and Olivier Bronchain
 and Fran{\c{c}}ois-Xavier Standaert",
 title = "Side-channel analysis of a learning parity with
 physical noise processor",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "171--179",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00238-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00238-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jacobson:2021:RWK,
 author = "Michael John {Jacobson, Jr.} and Prabhat Kushwaha",
 title = "Removable weak keys for discrete logarithm-based
 cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "181--195",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00250-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00250-7",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Heydemann:2021:CEA,
 author = "Karine Heydemann and Letitia Li",
 title = "Correction to: {Editorial} about {PROOFS 2019}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "2",
 pages = "197--197",
 month = jun,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00266-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 note = "See \cite{Heydemann:2021:EAP}.",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00266-7;
 https://link.springer.com/content/pdf/10.1007/s13389-021-00266-7.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chang:2021:ASI,
 author = "Chip-Hong Chang and Daniel E. Holcomb and Ulrich
 R{\"u}hrmair and Patrick Schaumont",
 title = "The {ASHES 2019} special issue at {JCEN}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "199--200",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00270-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00270-x;
 https://link.springer.com/content/pdf/10.1007/s13389-021-00270-x.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Shiozaki:2021:SEA,
 author = "Mitsuru Shiozaki and Takeshi Fujino",
 title = "Simple electromagnetic analysis attack based on
 geometric leak on {ASIC} implementation of
 ring-oscillator {PUF}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "201--212",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00240-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00240-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Zhang:2021:NTG,
 author = "Yuqiao Zhang and Ayush Jain and Pinchen Cui and Ziqi
 Zhou and Ujjwal Guin",
 title = "A novel topology-guided attack and its countermeasure
 towards secure logic locking",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "213--226",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00243-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00243-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gu:2021:LSC,
 author = "Chongyan Gu and Chip-Hong Chang and Weiqiang Liu and
 Neil Hanley and Jack Miskelly and M{\'a}ire O'Neill",
 title = "A large-scale comprehensive evaluation of single-slice
 ring oscillator and {PicoPUF} bit cells on 28-nm
 {Xilinx FPGAs}",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "227--238",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00244-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00244-5;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00244-5.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 keywords = "physically unclonable functions (PUFs)",
}
@Article{Bandara:2021:ACD,
 author = "Sahan Bandara and Michel A. Kinsy",
 title = "Adaptive caches as a defense mechanism against cache
 side-channel attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "239--255",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00246-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00246-3",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Unterstein:2021:SSU,
 author = "Florian Unterstein and Nisha Jacob and Neil Hanley and
 Chongyan Gu and Johann Heyszl",
 title = "{SCA} secure and updatable crypto engines for {FPGA
 SoC} bitstream decryption: extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "257--272",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00247-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00247-2;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00247-2.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ramezanpour:2021:FIM,
 author = "Keyvan Ramezanpour and Paul Ampadu and William Diehl",
 title = "Fault intensity map analysis with neural network key
 distinguisher",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "273--288",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00249-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00249-0",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nashimoto:2021:LCD,
 author = "Shoei Nashimoto and Daisuke Suzuki and Noriyuki Miura
 and Tatsuya Machida and Kohei Matsuda and Makoto
 Nagata",
 title = "Low-cost distance-spoofing attack on {FMCW} radar and
 its feasibility study on countermeasure",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "289--298",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00252-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00252-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Azriel:2021:SAM,
 author = "Leonid Azriel and Julian Speith and Nils Albartus and
 Ran Ginosar and Avi Mendelson and Christof Paar",
 title = "A survey of algorithmic methods in {IC} reverse
 engineering",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "3",
 pages = "299--315",
 month = sep,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00268-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:55 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00268-5",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Howe:2021:EPI,
 author = "James Howe and Marco Martinoli and Elisabeth Oswald
 and Francesco Regazzoni",
 title = "Exploring Parallelism to Improve the Performance of
 {FrodoKEM} in Hardware",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "4",
 pages = "317--327",
 month = nov,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00258-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:56 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00258-7;
 https://link.springer.com/content/pdf/10.1007/s13389-021-00258-7.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Perin:2021:ICS,
 author = "Lucas Pandolfo Perin and Gustavo Zambonin and Ricardo
 Cust{\'o}dio and Lucia Moura and Daniel Panario",
 title = "Improved constant-sum encodings for hash-based
 signatures",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "4",
 pages = "329--351",
 month = nov,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00264-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:56 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00264-9",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Trouchkine:2021:EFI,
 author = "Thomas Trouchkine and S{\'e}banjila Kevin Bukasa and
 Mathieu Escouteloup and Ronan Lashermes and Guillaume
 Bouffard",
 title = "Electromagnetic fault injection against a complex
 {CPU}, toward new micro-architectural fault models",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "4",
 pages = "353--367",
 month = nov,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00259-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:56 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00259-6",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mittmann:2021:TAL,
 author = "Johannes Mittmann and Werner Schindler",
 title = "Timing attacks and local timing attacks against
 {Barrett}'s modular multiplication algorithm",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "4",
 pages = "369--397",
 month = nov,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00254-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:56 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-020-00254-3;
 https://link.springer.com/content/pdf/10.1007/s13389-020-00254-3.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bajard:2021:MFP,
 author = "Jean Claude Bajard and Sylvain Duquesne",
 title = "{Montgomery}-friendly primes and applications to
 cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "4",
 pages = "399--415",
 month = nov,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00260-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:56 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00260-z",
 abstract = "This paper deals with Montgomery-friendly primes
 designed for the modular reduction algorithm of
 Montgomery. These numbers are scattered in the
 literature and their properties are partially
 exploited. We exhibit a large family of
 Montgomery-friendly primes which give rise to efficient
 modular reduction algorithms. We develop two main
 outcomes. The first one is dedicated directly to
 cryptography, in particular for isogeny-based
 approaches and more generally to elliptic curves
 cryptography (ECC). We suggest more appropriate finite
 fields and curves in terms of complexity for the
 recommended security levels, for both isogeny-based
 cryptography and ECC. The second issue is mainly
 arithmetic (even if its main use is cryptography), and
 we propose families of alternative RNS bases. We show
 that, for dedicated architectures with word operators,
 we can reach, for a same or better complexity, larger
 RNS bases with Montgomery-friendly pairwise co-primes
 than the RNS bases generally used in the literature
 with pseudo-Mersenne numbers.",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lombardia:2021:SSL,
 author = "Sergio Rold{\'a}n Lombard{\'\i}a and Fatih Balli and
 Subhadeep Banik",
 title = "Six shades lighter: a bit-serial implementation of the
 {AES} family",
 journal = j-J-CRYPTO-ENG,
 volume = "11",
 number = "4",
 pages = "417--439",
 month = nov,
 year = "2021",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00265-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Wed Feb 2 10:55:56 MST 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "http://link.springer.com/article/10.1007/s13389-021-00265-8;
 https://link.springer.com/content/pdf/10.1007/s13389-021-00265-8.pdf",
 acknowledgement = ack-nhfb,
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Molteni:2022:RCR,
 author = "Maria Chiara Molteni and Vittorio Zaccaria",
 title = "A relation calculus for reasoning about $t$-probing
 security",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "1",
 pages = "1--14",
 month = apr,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00286-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Apr 16 13:18:32 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00286-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bozilov:2022:OTI,
 author = "Dusan Bozilov and Miroslav Knezevi{\'c} and Ventzislav
 Nikov",
 title = "Optimized threshold implementations: securing
 cryptographic accelerators for low-energy and
 low-latency applications",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "1",
 pages = "15--51",
 month = apr,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00276-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Apr 16 13:18:32 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00276-5",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Caforio:2022:MSV,
 author = "Andrea Caforio and Fatih Balli and Subhadeep Banik",
 title = "Melting {SNOW-V}: improved lightweight architectures",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "1",
 pages = "53--73",
 month = apr,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00251-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Apr 16 13:18:32 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-020-00251-6",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ouladj:2022:SAP,
 author = "Maamar Ouladj and Sylvain Guilley and Farid Mokrane",
 title = "Spectral approach to process the (multivariate)
 high-order template attack against any masking scheme",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "1",
 pages = "75--93",
 month = apr,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-020-00253-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Apr 16 13:18:32 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-020-00253-4",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Buhrow:2022:PMM,
 author = "Benjamin Buhrow and Barry Gilbert and Clifton Haider",
 title = "Parallel modular multiplication using 512-bit advanced
 vector instructions",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "1",
 pages = "95--105",
 month = apr,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00256-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Apr 16 13:18:32 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/fparith.bib;
 https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00256-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nath:2022:SET,
 author = "Kaushik Nath and Palash Sarkar",
 title = "Security and efficiency trade-offs for elliptic curve
 {Diffie--Hellman} at the 128-bit and 224-bit security
 levels",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "1",
 pages = "107--121",
 month = apr,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00261-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Sat Apr 16 13:18:32 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00261-y",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Brunetta:2022:MCD,
 author = "Carlo Brunetta and Pablo Picazo-Sanchez",
 title = "Modelling cryptographic distinguishers using machine
 learning",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "2",
 pages = "123--135",
 month = jun,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00262-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 3 10:37:26 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00262-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Winderickx:2022:DEA,
 author = "Jori Winderickx and An Braeken and Nele Mentens",
 title = "In-depth energy analysis of security algorithms and
 protocols for the {Internet of Things}",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "2",
 pages = "137--149",
 month = jun,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00274-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 3 10:37:26 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00274-7",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{David:2022:REB,
 author = "Liron David and Avishai Wool",
 title = "Rank estimation with bounded error via exponential
 sampling",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "2",
 pages = "151--168",
 month = jun,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00269-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 3 10:37:26 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00269-4",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Le:2022:IFA,
 author = "Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani",
 title = "Improved fault analysis on {SIMECK} ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "2",
 pages = "169--180",
 month = jun,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00263-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 3 10:37:26 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00263-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gross:2022:BTM,
 author = "Mathieu Gross and Nisha Jacob and Georg Sigl",
 title = "Breaking {TrustZone} memory isolation and secure boot
 through malicious hardware on a modern {FPGA-SoC}",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "2",
 pages = "181--196",
 month = jun,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00273-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 3 10:37:26 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00273-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Liu:2022:CTA,
 author = "Fanghui Liu and Waldemar Cruz and Laurent Michel",
 title = "A comprehensive tolerant algebraic side-channel attack
 over modern ciphers using constraint programming",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "2",
 pages = "197--228",
 month = jun,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00280-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 3 10:37:26 MDT 2022",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00280-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Engels:2022:CVR,
 author = "Susanne Engels and Max Hoffmann and Christof Paar",
 title = "A critical view on the real-world security of logic
 locking",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "229--244",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00294-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00294-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Dutertre:2022:PPF,
 author = "Jean-Max Dutertre and Amir-Pasha Mirbaha and David
 Naccache and Assia Tria",
 title = "Photonic power firewalls",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "245--254",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00291-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00291-0",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{DiMauro:2022:DIN,
 author = "Juan {Di Mauro} and Eduardo Salazar and Hugo D.
 Scolnik",
 title = "Design and implementation of a novel cryptographically
 secure pseudorandom number generator",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "255--265",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00297-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/prng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00297-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chowdhury:2022:PSP,
 author = "Sreeja Chowdhury and Ana Covic and Rabin Yu Acharya
 and Spencer Dupee and Fatemeh Ganji and Domenic Forte",
 title = "Physical security in the post-quantum era",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "267--303",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00255-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00255-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mandal:2022:SNM,
 author = "Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar
 and Yosuke Todo",
 title = "{Sycon}: a new milestone in designing {ASCON}-like
 permutations",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "305--327",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00272-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00272-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Yeniaras:2022:FCT,
 author = "Esra Yeniaras and Murat Cenk",
 title = "Faster characteristic three polynomial multiplication
 and its application to {NTRU} Prime decapsulation",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "329--348",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00282-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00282-7",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chavez-Saab:2022:SCS,
 author = "Jorge Ch{\'a}vez-Saab and Jes{\'u}s-Javier
 Chi-Dom{\'{\i}}nguez and Samuel Jaques and Francisco
 Rodr{\'{\i}}guez-Henr{\'{\i}}quez",
 title = "The {SQALE} of {CSIDH}: sublinear {V{\'e}lu}
 quantum-resistant isogeny action with low exponents",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "3",
 pages = "349--368",
 month = sep,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00271-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00271-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chang:2022:ASI,
 author = "Chip-Hong Chang and Stefan Katzenbeisser and Ulrich
 R{\"u}hrmair and Patrick Schaumont",
 title = "The {ASHES 2020} special issue at {JCEN}",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "369--370",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00300-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00300-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Saarinen:2022:DRV,
 author = "Markku-Juhani O. Saarinen and G. Richard Newell and
 Ben Marshall",
 title = "Development of the {RISC-V} entropy source interface",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "371--386",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00275-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/linux.bib;
 https://www.math.utah.edu/pub/tex/bib/prng.bib;
 https://www.math.utah.edu/pub/tex/bib/risc-v.bib;
 https://www.math.utah.edu/pub/tex/bib/unix.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00275-6",
 abstract = "The RISC-V true random number generator (TRNG)
 architecture breaks with previous ISA TRNG practice by
 splitting the entropy source (ES) component away from
 cryptographic DRBGs into a separate privileged
 interface, and in its use of polling. The modular
 approach is suitable for the RISC-V hardware IP
 ecosystem, allows a significantly smaller
 implementation footprint on platforms that need it,
 while directly supporting current standards compliance
 testing methods. We describe the interface, its use in
 cryptography, and offer additional discussion,
 background, and rationale for various aspects of it.
 The design was informed by lessons learned from earlier
 mainstream ISAs, recently introduced SP 800-90B and
 FIPS 140-3 entropy audit requirements, AIS 31 and
 common criteria, current and emerging cryptographic
 needs such as post-quantum cryptography, and the goal
 of supporting a wide variety of RISC-V implementations
 and applications. Many of the architectural choices
 result from quantitative observations about random
 number generators in secure microcontrollers, the Linux
 kernel, and cryptographic libraries.",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ruhrmair:2022:SFS,
 author = "Ulrich R{\"u}hrmair",
 title = "Secret-free security: a survey and tutorial",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "387--412",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00283-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00283-6",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jin:2022:PAC,
 author = "Chenglu Jin and Wayne Burleson and Marten van Dijk and
 Ulrich R{\"u}hrmair",
 title = "Programmable access-controlled and generic erasable
 {PUF} design and its applications",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "413--432",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00284-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00284-z",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jana:2022:DFA,
 author = "Amit Jana and Anirban Nath and Goutam Paul and Dhiman
 Saha",
 title = "Differential fault analysis of {NORX} using variants
 of coupon collector problem",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "433--459",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00285-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00285-y",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Fustos:2022:FLS,
 author = "Jacob Fustos and Michael Bechtel and Heechul Yun",
 title = "A framework for leaking secrets to past instructions",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "461--473",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00289-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00289-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kundu:2022:FAP,
 author = "Anup Kumar Kundu and Aikata and Banashri Karmakar and
 Dhiman Saha",
 title = "Fault analysis of the {PRINCE} family of lightweight
 ciphers",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "475--494",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00290-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00290-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Mukherjee:2022:CSP,
 author = "Rijoy Mukherjee and Sree Ranjani Rajendran and Rajat
 Subhra Chakraborty",
 title = "A comprehensive survey of physical and logic testing
 techniques for {Hardware Trojan} detection and
 prevention",
 journal = j-J-CRYPTO-ENG,
 volume = "12",
 number = "4",
 pages = "495--522",
 month = nov,
 year = "2022",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00295-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:09 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00295-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Wiemers:2023:IRS,
 author = "Andreas Wiemers and Johannes Mittmann",
 title = "Improving recent side-channel attacks against the
 {DES} key schedule",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "1--17",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00279-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00279-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cicek:2023:NRW,
 author = "Ihsan Cicek and Ahmad {Al Khas}",
 title = "A new read-write collision-based {SRAM PUF}
 implemented on {Xilinx FPGAs}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "19--36",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00281-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/prng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00281-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Robert:2023:FMM,
 author = "Jean-Marc Robert and Pascal V{\'e}ron",
 title = "Faster multiplication over {$ \mathbb {F}_2 [X] $}
 using {AVX512} instruction set and {VPCLMULQDQ}
 instruction",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "37--55",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-021-00278-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-021-00278-3",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Attias:2023:RMM,
 author = "Vidal Attias and Luigi Vigneri and Vassil Dimitrov",
 title = "Rethinking modular multi-exponentiation in real-world
 applications",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "57--70",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00287-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00287-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Giron:2023:PQH,
 author = "Alexandre Augusto Giron and Ricardo Cust{\'o}dio and
 Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
 title = "Post-quantum hybrid key exchange: a systematic mapping
 study",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "71--88",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00288-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00288-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Adj:2023:KBS,
 author = "Gora Adj and Jes{\'u}s-Javier Chi-Dom{\'\i}nguez and
 Francisco Rodr{\'\i}guez-Henr{\'\i}quez",
 title = "{Karatsuba}-based square-root {V{\'e}lu}'s formulas
 applied to two isogeny-based protocols",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "89--106",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00293-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00293-y",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Nadikuda:2023:LAT,
 author = "Pradeep Kumar Goud Nadikuda and Lakshmi Boppana",
 title = "Low area-time complexity point multiplication
 architecture for {ECC} over {$ {\rm GF}(2^m) $} using
 polynomial basis",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "107--123",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00302-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00302-0",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koshelev:2023:SMT,
 author = "Dmitrii Koshelev",
 title = "Subgroup membership testing on elliptic curves via the
 {Tate} pairing",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "1",
 pages = "125--128",
 month = apr,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00296-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 note = "See correction \cite{Koshelev:2024:CSM}.",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00296-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Masure:2023:SCA,
 author = "Lo{\"\i}c Masure and R{\'e}mi Strullu",
 title = "Side-channel analysis against {ANSSI}'s protected
 {AES} implementation on {ARM}: end-to-end attacks with
 multi-task learning",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "129--147",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00311-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00311-7",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Werner:2023:EEA,
 author = "Vincent Werner and Laurent Maingault and Marie-Laure
 Potet",
 title = "An end-to-end approach to identify and exploit
 multi-fault injection vulnerabilities on
 microcontrollers",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "149--165",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00292-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00292-z",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Peng:2023:SNP,
 author = "Bo-Yuan Peng and Adrian Marotzke and Ming-Han Tsai and
 Bo-Yin Yang and Ho-Lin Chen",
 title = "Streamlined {NTRU} Prime on {FPGA}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "167--186",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00303-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00303-z",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Debnath:2023:MIM,
 author = "Sumit Kumar Debnath and Sihem Mesnager and Vikas
 Srivastava and Saibal Kumar Pal and Nibedita Kundu",
 title = "{Mul-IBS}: a multivariate identity-based signature
 scheme compatible with {IoT}-based {NDN} architecture",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "187--199",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00308-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00308-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Joshi:2023:SSP,
 author = "Priyanka Joshi and Bodhisatwa Mazumdar",
 title = "{SPSA}: Semi-Permanent Stuck-At fault analysis of {AES
 Rijndael SBox}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "201--222",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00301-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00301-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cui:2023:CEL,
 author = "Yaxin Cui and Hong Xu and Lin Tan and Huajin Chen and
 Wenfeng Qi",
 title = "Construction of equivalent linear trails and multiple
 linear attack on reduced-round {GIFT-64}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "223--234",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00298-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00298-7",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Luengo:2023:STS,
 author = "Elena Almaraz Luengo and Bittor Ala{\~n}a Olivares and
 Luis Javier Garc{\'{\i}}a Villalba and Julio
 Hernandez-Castro and Darren Hurley-Smith",
 title = "{StringENT} test suite: {ENT} battery revisited for
 efficient {$P$} value computation",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "235--249",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00313-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/prng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00313-5",
 abstract = "Random numbers play a key role in a wide variety of
 applications, ranging from mathematical simulation to
 cryptography. Generating random or pseudo-random
 numbers is not an easy task, especially when hardware,
 time and energy constraints are considered. In order to
 assess whether generators behave in a random fashion,
 there are several statistical test batteries. ENT is
 one of the simplest and most popular, at least in part
 due to its efficacy and speed. Nonetheless, only one of
 the tests of this suite provides a $p$ value, which is
 the most useful and standard way to determine whether
 the randomness hypothesis holds, for a certain
 significance level. As a consequence of this, rather
 arbitrary and at times misleading bounds are set in
 order to decide which intervals are acceptable for its
 results. This paper introduces an extension of the
 battery, named StringENT, which, while sticking to the
 fast speed that makes ENT popular and useful, still
 succeeds in providing $p$ values with which sound
 decisions can be made about the randomness of a
 sequence. It also highlights a flagrant randomness flaw
 that the classical ENT battery is not capable of
 detecting but the new StringENT notices, and introduces
 two additional tests.",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koseki:2023:HES,
 author = "Ryusuke Koseki and Akira Ito and Rei Ueno and Mehdi
 Tibouchi and Naofumi Homma",
 title = "Homomorphic encryption for stochastic computing",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "2",
 pages = "251--263",
 month = jun,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00299-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Jun 2 12:32:10 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00299-6",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Salam:2023:DFA,
 author = "Iftekhar Salam and Wei-Chuen Yau and Rapha{\"e}l C.-W.
 Phan and Josef Pieprzyk",
 title = "Differential fault attacks on the lightweight
 authenticated encryption algorithm {CLX-128}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "265--281",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00326-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00326-0",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{LeGrow:2023:FMF,
 author = "Jason T. LeGrow",
 title = "A faster method for fault attack resistance in
 static\slash ephemeral {CSIDH}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "283--294",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00318-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00318-0",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Alves:2023:PHT,
 author = "Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and
 Diego F. Aranha",
 title = "Performance of hierarchical transforms in homomorphic
 encryption: a case study on logistic regression
 inference",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "295--310",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00325-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00325-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kerkhof:2023:NGL,
 author = "Maikel Kerkhof and Lichao Wu and Guilherme Perin and
 Stjepan Picek",
 title = "No (good) loss no gain: systematic evaluation of loss
 functions in deep learning-based side-channel
 analysis",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "311--324",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00320-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00320-6",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Salomon:2023:MLP,
 author = "Dor Salomon and Itamar Levi",
 title = "{MaskSIMD-lib}: on the performance gap of a generic
 {C} optimized assembly and wide vector extensions for
 masked software with an {Ascon}-$p$ test case",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "325--342",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00322-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00322-4",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Arshad:2023:ABE,
 author = "Hamed Arshad and Pablo Picazo-Sanchez and Christian
 Johansen and Gerardo Schneider",
 title = "Attribute-based encryption with enforceable
 obligations",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "343--371",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00317-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00317-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Bajard:2023:FVP,
 author = "Jean-Claude Bajard and Kazuhide Fukushima and Thomas
 Plantard and Arnaud Sipasseuth",
 title = "Fast verification and public key storage optimization
 for unstructured lattice-based signatures",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "3",
 pages = "373--388",
 month = sep,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00309-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 10 16:09:48 MDT 2023",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00309-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Chang:2023:ASI,
 author = "Chip-Hong Chang and Stefan Katzenbeisser and Debdeep
 Mukhopadhyay and Ulrich R{\"u}hrmair",
 title = "The {ASHES 2021} special issue at {JCEN}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "389--390",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00338-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00338-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Deutschbein:2023:IAI,
 author = "Calvin Deutschbein and Andres Meza and Francesco
 Restuccia and Ryan Kastner and Cynthia Sturton",
 title = "{Isadora}: automated information-flow property
 generation for hardware security verification",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "391--407",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00306-w",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00306-w",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Vasselle:2023:SDA,
 author = "Aur{\'e}lien Vasselle and Hugues Thiebeauld and
 Philippe Maurine",
 title = "Spatial dependency analysis to extract information
 from side-channel mixtures: extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "409--425",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00307-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00307-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kuroda:2023:PAN,
 author = "Kunihiro Kuroda and Yuta Fukuda and Kota Yoshida and
 Takeshi Fujino",
 title = "Practical aspects on non-profiled deep-learning
 side-channel attacks against {AES} software
 implementation with two types of masking
 countermeasures including {RSM}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "427--442",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00312-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00312-6",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ngo:2023:SCA,
 author = "Kalle Ngo and Elena Dubrova and Thomas Johansson",
 title = "A side-channel attack on a masked and shuffled
 software implementation of {Saber}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "443--460",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00315-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00315-3",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Imran:2023:HSS,
 author = "Malik Imran and Felipe Almeida and Andrea Basso and
 Sujoy Sinha Roy and Samuel Pagliarini",
 title = "High-speed {SABER} key encapsulation mechanism in 65nm
 {CMOS}",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "461--471",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00316-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00316-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Komissarov:2023:SAA,
 author = "Rony Komissarov and Sharon Vaisman and Avishai Wool",
 title = "Spoofing attacks against vehicular {FMCW} radar",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "473--484",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00321-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00321-5",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Krachenfels:2023:TAD,
 author = "Thilo Krachenfels and Jean-Pierre Seifert and Shahin
 Tajik",
 title = "{Trojan} awakener: detecting dormant malicious
 hardware using laser logic state imaging (extended
 version)",
 journal = j-J-CRYPTO-ENG,
 volume = "13",
 number = "4",
 pages = "485--499",
 month = nov,
 year = "2023",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00323-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Fri Apr 19 08:14:26 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00323-3",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Oberhansl:2024:UIS,
 author = "Felix Oberhansl and Tim Fritzmann and Thomas
 P{\"o}ppelmann and Debapriya Basu Roy and Georg Sigl",
 title = "Uniform instruction set extensions for multiplications
 in contemporary and post-quantum cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "1--18",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00332-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00332-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kumar:2024:RNC,
 author = "Satyam Kumar and Sandip Kumar Mondal and Santanu
 Sarkar and Takanori Isobe and Anubhab Baksi and Avishek
 Adhikari",
 title = "Restricted near collision attack on {Plantlet}",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "19--34",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00336-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00336-y",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Ribeiro:2024:SPQ,
 author = "Leonardo A. D. S. Ribeiro and Jos{\'e} Paulo da Silva
 Lima and Ruy J. G. B. de Queiroz and Amirton B. Chagas
 and Jos{\'e} R. R. Junior and Jonysberg P. Quintino and
 Fabio Q. B. da Silva and Andr{\'e} L. M. Santos",
 title = "{SABER} post-quantum key encapsulation mechanism
 {(KEM)}: evaluating performance in {ARM} and x64
 architectures",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "35--41",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00337-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00337-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cai:2024:ENA,
 author = "Shiping Cai and Zhi Hu and Zheng-An Yao and Chang-An
 Zhao",
 title = "The elliptic net algorithm revisited",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "43--55",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00304-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00304-y",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Shao:2024:DSV,
 author = "Cuiping Shao and Dongyan Zhao and Huiyun Li and Song
 Cheng and Shunxian Gao and Liuqing Yang",
 title = "Detection of security vulnerabilities in cryptographic
 {ICs} against fault injection attacks based on
 compressed sensing and basis pursuit",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "57--70",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00324-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00324-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Marchiori:2024:PRF,
 author = "D{\'u}nia Marchiori and Ricardo Cust{\'o}dio and
 Daniel Panario and Lucia Moura",
 title = "Probabilistic root finding in code-based
 cryptography",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "71--85",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00329-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00329-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Gurler:2024:CGL,
 author = "Elif Ozbay Gurler and Huseyin Hisil",
 title = "Complete group law for genus 2 {Jacobians} on
 {Jacobian} coordinates",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "87--101",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00351-7",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00351-7",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Joshi:2024:DRK,
 author = "Priyanka Joshi and Bodhisatwa Mazumdar",
 title = "Deep round key recovery attacks and countermeasure in
 persistent fault model: a case study on {GIFT} and
 {KLEIN}",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "103--125",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00349-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00349-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Koshelev:2024:CSM,
 author = "Dmitrii Koshelev",
 title = "Correction to: {Subgroup} membership testing on
 elliptic curves via the {Tate} pairing",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "127--128",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00331-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 note = "See \cite{Koshelev:2023:SMT}.",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00331-3",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Zhang:2024:EAP,
 author = "Fan Zhang",
 title = "Editorial about {PROOFS 2021}",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "129--129",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00345-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00345-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Cheng:2024:TFB,
 author = "Wei Cheng and Yi Liu and Sylvain Guilley and Olivier
 Rioul",
 title = "Toward finding best linear codes for side-channel
 protections (extended version)",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "131--145",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-022-00305-x",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-022-00305-x",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lacombe:2024:CSA,
 author = "Guilhem Lacombe and David Feliot and Etienne Boespflug
 and Marie-Laure Potet",
 title = "Combining static analysis and dynamic symbolic
 execution in a toolchain to detect fault injection
 vulnerabilities",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "147--164",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00310-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00310-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Asano:2024:SBE,
 author = "Tamon Asano and Takeshi Sugawara",
 title = "Simulation-based evaluation of bit-interaction
 side-channel leakage on {RISC-V}: extended version",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "1",
 pages = "165--180",
 month = apr,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00319-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Tue Jun 25 13:48:06 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/risc-v.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00319-z",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
 remark = "The information leakage attack described here is
 successful against both ARM and the Western Digital
 SweRV EH1 RISC-V processor.",
}
@Article{Guillen:2024:AFC,
 author = "Luis Guillen",
 title = "The Asymmetric five-card trick: working with variable
 encoding in card-based protocols",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "181--192",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00333-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00333-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Sideris:2024:HAD,
 author = "Argyrios Sideris and Theodora Sanida and Minas
 Dasygenis",
 title = "Hardware acceleration design of the {SHA-3} for high
 throughput and low area on {FPGA}",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "193--205",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00334-0",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00334-0",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Viera:2024:TFM,
 author = "Raphael Viera and Jean-Max Dutertre and Rodrigo Silva
 Lima and Matthieu Pommies and Anthony Bertrand",
 title = "Tampering with the flash memory of microcontrollers:
 permanent fault injection via laser illumination during
 read operations",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "207--221",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00335-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00335-z",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Carlet:2024:MMB,
 author = "Claude Carlet and Abderrahman Daif and Sylvain Guilley
 and C{\'e}dric Tavernier",
 title = "A masking method based on orthonormal spaces,
 protecting several bytes against both {SCA} and {FIA}
 with a reduced cost",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "223--240",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00339-9",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00339-9",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aydin:2024:LSH,
 author = "Furkan Aydin and Aydin Aysu",
 title = "Leaking secrets in homomorphic encryption with
 side-channel attacks",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "241--251",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00340-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00340-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{kumar:2024:QRN,
 author = "Vaishnavi kumar and Padmapriya Pravinkumar",
 title = "Quantum random number generator on {IBM QX}",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "253--259",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00341-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib;
 https://www.math.utah.edu/pub/tex/bib/prng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00341-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Al-Muhammed:2024:BSC,
 author = "Muhammed Jassem Al-Muhammed",
 title = "Bit-sensitive chaos-based encryption technique with
 nonparametric memory loss-based key hiding code
 generation",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "261--279",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00343-z",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00343-z",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Seddigh:2024:BKM,
 author = "Milad Seddigh and Mahdi Esfahani and Sarani
 Bhattacharya and Mohammad Reza Aref and Hadi
 Soleimany",
 title = "Breaking {KASLR} on mobile devices without any use of
 cache memory (extended version)",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "281--294",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-023-00344-y",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-023-00344-y",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Vollala:2024:EET,
 author = "Satyanarayana Vollala",
 title = "Energy efficient triple-modular exponential techniques
 for batch verification schemes",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "295--309",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00348-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00348-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Aljafar:2024:ULE,
 author = "Muayad J. Aljafar and Florence Azais and Marie-Lise
 Flottes and Samuel Pagliarini",
 title = "Utilizing layout effects for analog logic locking",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "311--324",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00350-8",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00350-8",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Alshaer:2024:CLA,
 author = "Ihab Alshaer and Gijs Burghoorn and Brice Colombier
 and Christophe Deleuze and Vincent Beroulle and Paolo
 Maistri",
 title = "Cross-layer analysis of clock glitch fault injection
 while fetching variable-length instructions",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "325--342",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00352-6",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00352-6",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Kim:2024:MCA,
 author = "Kwang Ho Kim and Sihem Mesnager and Kyong Il Pak",
 title = "{Montgomery} curve arithmetic revisited",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "343--362",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00353-5",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00353-5",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Jana:2024:DFA,
 author = "Amit Jana and Goutam Paul",
 title = "Differential fault attack on {SPN}-based sponge and
 {SIV}-like {AE} schemes",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "363--381",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00354-4",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00354-4",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Hu:2024:UGE,
 author = "Jingwei Hu and Wen Wang and Kris Gaj and Donglong Chen
 and Huaxiong Wang",
 title = "Universal {Gaussian} elimination hardware for
 cryptographic purposes",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "383--397",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00355-3",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00355-3",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Lashermes:2024:GSR,
 author = "Ronan Lashermes and H{\'e}l{\`e}ne {Le Bouder}",
 title = "Generic {SCARE}: reverse engineering without knowing
 the algorithm nor the machine",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "399--414",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00356-2",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00356-2",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}
@Article{Salarifard:2024:EHA,
 author = "Raziyeh Salarifard and Hadi Soleimany",
 title = "An efficient hardware accelerator for {NTT}-based
 polynomial multiplication using {FPGA}",
 journal = j-J-CRYPTO-ENG,
 volume = "14",
 number = "2",
 pages = "415--426",
 month = jun,
 year = "2024",
 CODEN = "????",
 DOI = "https://doi.org/10.1007/s13389-024-00357-1",
 ISSN = "2190-8508 (print), 2190-8516 (electronic)",
 ISSN-L = "2190-8508",
 bibdate = "Thu Aug 8 07:34:12 MDT 2024",
 bibsource = "https://www.math.utah.edu/pub/tex/bib/jcryptoeng.bib",
 URL = "https://link.springer.com/article/10.1007/s13389-024-00357-1",
 acknowledgement = ack-nhfb,
 ajournal = "J. Crypto. Eng.",
 fjournal = "Journal of Cryptographic Engineering",
 journal-URL = "http://link.springer.com/journal/13389",
}

AltStyle によって変換されたページ (->オリジナル) /