Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Review of error correction for PUFs and evaluation on state-of-the-art FPGAs28
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents24
A survey of algorithmic methods in IC reverse engineering17
Residue arithmetic systems in cryptography: a survey on modern security applications16
A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs14
Towards efficient and automated side-channel evaluations at design time12
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure11
A differential fault attack on the WG family of stream ciphers10
x-only point addition formula and faster compressed SIKE10
Physical security in the post-quantum era9
Faster unbalanced Private Set Intersection in the semi-honest setting8
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks8
Rock’n’roll PUFs: crafting provably secure pufs from less secure ones (extended version)7
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models7
End-to-end automated cache-timing attack driven by machine learning7
On the power of template attacks in highly multivariate context7
Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC6
Montgomery-friendly primes and applications to cryptography6
A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs6
Melting SNOW-V: improved lightweight architectures6
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware5
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols4
In-depth energy analysis of security algorithms and protocols for the Internet of Things4
Secret-free security: a survey and tutorial4
Improved fault analysis on SIMECK ciphers4
Post-quantum hybrid key exchange: a systematic mapping study4
A novel non-profiled side channel attack based on multi-output regression neural network4
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC4
Improved algebraic attacks on lightweight block ciphers4
A novel topology-guided attack and its countermeasure towards secure logic locking3
Sycon: a new milestone in designing ASCON-like permutations3
Detecting faults in inner product masking scheme3
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation3
A remark on a success rate model for side-channel attack analysis3
High-speed SABER key encapsulation mechanism in 65nm CMOS3
Modelling cryptographic distinguishers using machine learning3
Streamlined NTRU Prime on FPGA3
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning3
0.017411947250366