Journal of Cryptographic Engineering

短名J. Cryptogr. Eng.
Journal Impact1.50
国际分区COMPUTER SCIENCE, THEORY & METHODS(Q2)
期刊索引SCI Q3中科院 4 区
ISSN2190-8508, 2190-8516
h-index34
国内分区计算机科学(4区)计算机科学计算机理论方法(4区)

JOURNAL OF CRYPTOGRAPHIC ENGINEERING (JCEN) 提供有关密码工程中的体系结构、算法、技术、工具、实现和应用的高质量科学研究,包括密码硬件、密码嵌入式系统、侧信道攻击和对策以及嵌入式安全。 JCEN 服务于对加密硬件和嵌入式安全感兴趣的学术和企业研发社区。JCEN 发表关于广泛和不同主题的重要研究,包括:公钥密码学、秘密密钥密码学和后量子密码学密码学实现包括密码处理器、物理不可克隆函数、真实和确定的随机数生成器、高效的软件和硬件架构攻击实现及其对策,例如侧信道攻击、故障攻击、硬件篡改和逆向工程技术真实世界密码系统的安全评估、安全嵌入式的形式化方法和验证工具提供可证明的安全性和衡量安全性的指标的设计最先进的密码学应用,例如物联网、RFID、IP 保护、由模拟和数字组件组成的网络物理系统、汽车安全和可信计算

期刊主页投稿网址
涉及主题计算机科学数学计算机安全算法操作系统密码学计算机网络工程类程序设计语言加密物理理论计算机科学算术生物旁道攻击电气工程量子力学嵌入式系统数学分析公钥密码术计算机硬件几何学
出版信息出版商: Springer Science + Business Media出版周期: 4 issues per year期刊类型: journal
基本数据创刊年份: 2011原创研究文献占比100.00%自引率:6.70%Gold OA占比: 29.41%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

A systematic study of data augmentation for protected AES implementations

2024-8-29

Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures

2024-8-13

Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis

2024-8-7

Progressive and efficient verification for digital signatures: extensions and experimental results

2024-8-5

Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS

2024-8-4

MOSFHET: Optimized Software for FHE over the Torus

2024-7-24

An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA

2024-6-1

Differential fault attack on SPN-based sponge and SIV-like AE schemes

2024-5-24

Universal Gaussian elimination hardware for cryptographic purposes

2024-5-22

Generic SCARE: reverse engineering without knowing the algorithm nor the machine

2024-5-17

Montgomery curve arithmetic revisited

2024-5-13

Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions

2024-4-23

Scoring the predictions: a way to improve profiling side-channel attacks

2024-4-8

Utilizing layout effects for analog logic locking

2024-4-6

Complete group law for genus 2 Jacobians on Jacobian coordinates

2024-4-1

Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN

2024-3-20

Energy efficient triple-modular exponential techniques for batch verification schemes

2024-3-16

Amplitude-modulated EM side-channel attack on provably secure masked AES

2024-3-14

Editorial about PROOFS 2021

2024-1-29

Leaking secrets in homomorphic encryption with side-channel attacks

2024-1-12

Breaking KASLR on mobile devices without any use of cache memory (extended version)

2024-1-5

Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis

2023-12-16

Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation

2023-12-13

Quantum random number generator on IBM QX

2023-12-7

A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost

2023-11-4

The ASHES 2021 special issue at JCEN

2023-11-1

SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures

2023-10-16

Restricted near collision attack on Plantlet

2023-10-9

Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations

2023-10-3

The Asymmetric five-card trick: working with variable encoding in card-based protocols

2023-8-31

Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA

2023-8-30

Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography

2023-8-24

Correction to: Subgroup membership testing on elliptic curves via the Tate pairing

2023-8-17

Probabilistic root finding in code-based cryptography

2023-7-31

Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis

2023-7-21

AutoPOI: automated points of interest selection for side-channel analysis

2023-7-20

CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler

2023-7-6

Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128

2023-6-26

Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version

2023-6-20

A faster method for fault attack resistance in static/ephemeral CSIDH

2023-6-16

Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference

2023-6-13

Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit

2023-6-2

MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case

2023-5-29

Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)

2023-5-29

No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis

2023-5-28

Spoofing attacks against vehicular FMCW radar

2023-5-22

Attribute-based encryption with enforceable obligations

2023-4-29

A side-channel attack on a masked and shuffled software implementation of Saber

2023-4-25

StringENT test suite: ENT battery revisited for efficient P value computation

2023-4-1

A novel non-profiled side channel attack based on multi-output regression neural network

2023-3-31

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司