Journal of Cryptographic Engineering

Papers
(The TQCC of Journal of Cryptographic Engineering is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers37
Utilizing layout effects for analog logic locking28
Scoring the predictions: a way to improve profiling side-channel attacks13
An efficient hardware accelerator for NTT-based polynomial multiplication using FPGA12
Remote side-channel analysis of the loop PUF using a TDC-based voltage sensor11
Programmable access-controlled and generic erasable PUF design and its applications10
Leaking secrets in homomorphic encryption with side-channel attacks10
A systematic study of data augmentation for protected AES implementations10
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography8
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents7
Deep round key recovery attacks and countermeasure in persistent fault model: a case study on GIFT and KLEIN7
A side-channel attack on a masked and shuffled software implementation of Saber7
Improved fault analysis on SIMECK ciphers6
Quantum random number generator on IBM QX6
Differential fault attack on SPN-based sponge and SIV-like AE schemes6
Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning6
MaskSIMD-lib: on the performance gap of a generic C optimized assembly and wide vector extensions for masked software with an Ascon-p test case5
Remote fault injection attack against cryptographic modules via intentional electromagnetic interference from an antenna5
Fault attack on Enocoro stream cipher family5
Differential fault attacks on the lightweight authenticated encryption algorithm CLX-1285
Photonic power firewalls4
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing4
Six shades lighter: a bit-serial implementation of the AES family4
Complete group law for genus 2 Jacobians on Jacobian coordinates4
Research and implementation of large-scale S-box for MK-3 algorithm based on polynomial basis: in FPGA4
Spatial dependency analysis to extract information from side-channel mixtures: extended version4
Spoofing attacks against vehicular FMCW radar4
Rank estimation with bounded error via exponential sampling4
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS4
Subgroup membership testing on elliptic curves via the Tate pairing4
0.10513997077942