Journal of Cryptographic Engineering
短名 | J. Cryptogr. Eng. |
Journal Impact | 1.50 |
国际分区 | COMPUTER SCIENCE, THEORY & METHODS(Q2) |
期刊索引 | SCI Q3中科院 4 区 |
ISSN | 2190-8508, 2190-8516 |
h-index | 34 |
国内分区 | 计算机科学(4区)计算机科学计算机理论方法(4区) |
JOURNAL OF CRYPTOGRAPHIC ENGINEERING (JCEN) 提供有关密码工程中的体系结构、算法、技术、工具、实现和应用的高质量科学研究,包括密码硬件、密码嵌入式系统、侧信道攻击和对策以及嵌入式安全。 JCEN 服务于对加密硬件和嵌入式安全感兴趣的学术和企业研发社区。JCEN 发表关于广泛和不同主题的重要研究,包括:公钥密码学、秘密密钥密码学和后量子密码学密码学实现包括密码处理器、物理不可克隆函数、真实和确定的随机数生成器、高效的软件和硬件架构攻击实现及其对策,例如侧信道攻击、故障攻击、硬件篡改和逆向工程技术真实世界密码系统的安全评估、安全嵌入式的形式化方法和验证工具提供可证明的安全性和衡量安全性的指标的设计最先进的密码学应用,例如物联网、RFID、IP 保护、由模拟和数字组件组成的网络物理系统、汽车安全和可信计算
期刊主页投稿网址涉及主题 | 计算机科学数学计算机安全算法操作系统密码学计算机网络工程类程序设计语言加密物理理论计算机科学算术生物旁道攻击电气工程量子力学嵌入式系统数学分析公钥密码术计算机硬件几何学 |
出版信息 | 出版商: Springer Science + Business Media,出版周期: 4 issues per year,期刊类型: journal |
基本数据 | 创刊年份: 2011,原创研究文献占比: 100.00%,自引率:6.70%, Gold OA占比: 29.41% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
A systematic study of data augmentation for protected AES implementations
2024-8-29
Extended version—to be, or not to be stateful: post-quantum secure boot using hash-based signatures
2024-8-13
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis
2024-8-7
Progressive and efficient verification for digital signatures: extensions and experimental results
2024-8-5
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS
2024-8-4
MOSFHET: Optimized Software for FHE over the Torus
2024-7-24
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA
2024-6-1
Differential fault attack on SPN-based sponge and SIV-like AE schemes
2024-5-24
Universal Gaussian elimination hardware for cryptographic purposes
2024-5-22
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
2024-5-17
Montgomery curve arithmetic revisited
2024-5-13
Cross-layer analysis of clock glitch fault injection while fetching variable-length instructions
2024-4-23
Scoring the predictions: a way to improve profiling side-channel attacks
2024-4-8
Utilizing layout effects for analog logic locking
2024-4-6
Complete group law for genus 2 Jacobians on Jacobian coordinates
2024-4-1
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN
2024-3-20
Energy efficient triple-modular exponential techniques for batch verification schemes
2024-3-16
Amplitude-modulated EM side-channel attack on provably secure masked AES
2024-3-14
Editorial about PROOFS 2021
2024-1-29
Leaking secrets in homomorphic encryption with side-channel attacks
2024-1-12
Breaking KASLR on mobile devices without any use of cache memory (extended version)
2024-1-5
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis
2023-12-16
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation
2023-12-13
Quantum random number generator on IBM QX
2023-12-7
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost
2023-11-4
The ASHES 2021 special issue at JCEN
2023-11-1
SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
2023-10-16
Restricted near collision attack on Plantlet
2023-10-9
Tampering with the flash memory of microcontrollers: permanent fault injection via laser illumination during read operations
2023-10-3
The Asymmetric five-card trick: working with variable encoding in card-based protocols
2023-8-31
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA
2023-8-30
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography
2023-8-24
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing
2023-8-17
Probabilistic root finding in code-based cryptography
2023-7-31
Autoencoder-enabled model portability for reducing hyperparameter tuning efforts in side-channel analysis
2023-7-21
AutoPOI: automated points of interest selection for side-channel analysis
2023-7-20
CPU-Doctor: when a device’s heart-beat can be an acoustic side-channel disassembler
2023-7-6
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
2023-6-26
Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version
2023-6-20
A faster method for fault attack resistance in static/ephemeral CSIDH
2023-6-16
Performance of hierarchical transforms in homomorphic encryption: a case study on logistic regression inference
2023-6-13
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit
2023-6-2
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case
2023-5-29
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)
2023-5-29
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis
2023-5-28
Spoofing attacks against vehicular FMCW radar
2023-5-22
Attribute-based encryption with enforceable obligations
2023-4-29
A side-channel attack on a masked and shuffled software implementation of Saber
2023-4-25
StringENT test suite: ENT battery revisited for efficient P value computation
2023-4-1
A novel non-profiled side channel attack based on multi-output regression neural network
2023-3-31
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远