Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention35
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation26
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA13
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers12
Progressive and efficient verification for digital signatures: extensions and experimental results10
Secret-free security: a survey and tutorial10
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1289
Regularizers to the rescue: fighting overfitting in deep learning-based side-channel analysis9
Rank estimation with bounded error via exponential sampling8
Photonic power firewalls7
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation7
Utilizing layout effects for analog logic locking7
Complete group law for genus 2 Jacobians on Jacobian coordinates7
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities6
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor6
Rethinking modular multi-exponentiation in real-world applications5
Scoring the predictions: a way to improve profiling side-channel attacks5
Montgomery-friendly primes and applications to cryptography5
Keep it unbiased: a comparison between estimation of distribution algorithms and deep learning for human interaction-free side-channel analysis5
Generic SCARE: reverse engineering without knowing the algorithm nor the machine4
Fast verification and public key storage optimization for unstructured lattice-based signatures4
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version)4
Optimization of the algorithm to compute the guaranteed number of activations in $$\textsf{XS}$$-circuits and its application to the analysis of block ciphers4
A systematic study of data augmentation for protected AES implementations4
Probabilistic root finding in code-based cryptography4
Leaking secrets in homomorphic encryption with side-channel attacks4
StringENT test suite: ENT battery revisited for efficient P value computation4
A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost4
0.032379150390625