Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents29
A survey of algorithmic methods in IC reverse engineering23
A large-scale comprehensive evaluation of single-slice ring oscillator and PicoPUF bit cells on 28-nm Xilinx FPGAs16
Physical security in the post-quantum era13
x-only point addition formula and faster compressed SIKE12
Low-cost distance-spoofing attack on FMCW radar and its feasibility study on countermeasure12
A new read–write collision-based SRAM PUF implemented on Xilinx FPGAs9
Electromagnetic fault injection against a complex CPU, toward new micro-architectural fault models9
Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC8
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning8
Melting SNOW-V: improved lightweight architectures8
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols7
A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and prevention7
A novel non-profiled side channel attack based on multi-output regression neural network7
Montgomery-friendly primes and applications to cryptography7
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis6
Secret-free security: a survey and tutorial6
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware5
Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC5
Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA5
Streamlined NTRU Prime on FPGA5
High-speed SABER key encapsulation mechanism in 65nm CMOS5
Programmable access-controlled and generic erasable PUF design and its applications5
Sycon: a new milestone in designing ASCON-like permutations5
In-depth energy analysis of security algorithms and protocols for the Internet of Things5
Improved algebraic attacks on lightweight block ciphers5
Post-quantum hybrid key exchange: a systematic mapping study4
Improved fault analysis on SIMECK ciphers4
Faster characteristic three polynomial multiplication and its application to NTRU Prime decapsulation4
A critical view on the real-world security of logic locking4
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities4
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications4
0.041373014450073