Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers38
Utilizing layout effects for analog logic locking15
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA13
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor13
Scoring the predictions: a way to improve profiling side-channel attacks12
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography11
Leaking secrets in homomorphic encryption with side-channel attacks11
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN10
Programmable access-controlled and generic erasable PUF design and its applications9
A systematic study of data augmentation for protected AES implementations9
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning7
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents7
Differential fault attack on SPN-based sponge and SIV-like AE schemes7
A side-channel attack on a masked and shuffled software implementation of Saber7
Quantum random number generator on IBM QX7
Fault attack on Enocoro stream cipher family6
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case6
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna6
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1285
Complete group law for genus 2 Jacobians on Jacobian coordinates5
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA5
Photonic power firewalls5
Rank estimation with bounded error via exponential sampling5
Subgroup membership testing on elliptic curves via the Tate pairing4
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS4
Spatial dependency analysis to extract information from side-channel mixtures: extended version4
Spoofing attacks against vehicular FMCW radar4
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing4
0.028365135192871