Skip to main content

Journal of Cryptographic Engineering OnlineFirst articles

25.11.2021 | Regular Paper

Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications

Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In this work, we provide three TI optimization techniques: First, a generic construction for …

Dušan Božilov, Miroslav Knežević, Ventzislav Nikov

24.11.2021 | Regular Paper

In-depth energy analysis of security algorithms and protocols for the Internet of Things

Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed, stored and/or communicated by these devices need to be secured, low-energy security mechanisms have …

Jori Winderickx, An Braeken, Dave Singelée, Nele Mentens

08.10.2021 | Regular Paper

Sycon: a new milestone in designing ASCON-like permutations

ASCON is one of the elegant designs of authenticated encryption with associated data (AEAD) that was selected as the first choice for lightweight applications in the CAESAR competition, which also has been submitted to NIST lightweight …

Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo

15.09.2021 | Regular Paper Open Access

Breaking TrustZone memory isolation and secure boot through malicious hardware on a modern FPGA-SoC

FPGA-SoCs are heterogeneous embedded computing platforms consisting of reconfigurable hardware and high-performance processing units. This combination offers flexibility and good performance for the design of embedded systems. However, allowing …

Mathieu Gross, Nisha Jacob, Andreas Zankl, Georg Sigl

31.08.2021 | Regular Paper Open Access

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents

Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly reduced the estimated quantum security of the isogeny-based commutative group action key-exchange protocol CSIDH. This paper refines the estimates …

Jorge Chávez-Saab, Jesús-Javier Chi-Domínguez, Samuel Jaques, Francisco Rodríguez-Henríquez

04.08.2021 | Regular Paper

Rank estimation with bounded error via exponential sampling

Efficient rank estimation algorithms are of prime interest in security evaluation against side channel attacks (SCA) and recently also for password strength estimators. In a side channel setting it allows estimating the remaining security after an …

Liron David, Avishai Wool

01.07.2021 | Regular Paper Open Access

Modelling cryptographic distinguishers using machine learning

Cryptanalysis is the development and study of attacks against cryptographic primitives and protocols. Many cryptographic properties rely on the difficulty of generating an adversary who, given an object sampled from one of two classes, correctly …

Carlo Brunetta, Pablo Picazo-Sanchez

19.05.2021 | Regular Paper

Improved fault analysis on SIMECK ciphers

The advances of Internet of Things (IoT) have had a fundamental impact and influence on sharping our rich living experiences. However, since IoT devices are usually resource-constrained, lightweight block ciphers have played a major role in …

Duc-Phong Le, Rongxing Lu, Ali A. Ghorbani

12.04.2021 | Regular Paper

Security and efficiency trade-offs for elliptic curve Diffie–Hellman at the 128-bit and 224-bit security levels

Within the transport layer security (TLS) protocol version 1.3, RFC 7748 specifies elliptic curves targeted at the 128-bit and the 224-bit security levels. For the 128-bit security level, the Montgomery curve Curve25519 and its birationally …

Kaushik Nath, Palash Sarkar

13.02.2021 | Regular Paper Open Access

Parallel modular multiplication using 512-bit advanced vector instructions

RSA fault-injection countermeasure via interleaved parallel multiplication

Applications such as public-key cryptography are critically reliant on the speed of modular multiplication for their performance. This paper introduces a new block-based variant of Montgomery multiplication, the Block Product Scanning (BPS) …

Benjamin Buhrow, Barry Gilbert, Clifton Haider

01.02.2021 | Regular Paper

Physical security in the post-quantum era

A survey on side-channel analysis, random number generators, and physically unclonable functions

Over the past decades, quantum technology has seen consistent progress, with notable recent developments in the field of quantum computers. Traditionally, this trend has been primarily seen as a serious risk for cryptography; however, a positive …

Sreeja Chowdhury, Ana Covic, Rabin Yu Acharya, Spencer Dupee, Fatemeh Ganji, Domenic Forte

07.01.2021 | Regular Paper

Spectral approach to process the (multivariate) high-order template attack against any masking scheme

Cryptographic software is particularly vulnerable to side-channel attacks when programmed in embedded devices. Indeed, the leakage is particularly intense compared to the noise level, making it mandatory for the developer to implement side-channel …

Maamar Ouladj, Sylvain Guilley, Philippe Guillot, Farid Mokrane

04.12.2020 | Regular Paper Open Access

Melting SNOW-V: improved lightweight architectures

SNOW-V is a stream cipher proposed by Ekdahl et al. at IACR ToSC 2019(3) with an objective to be deployed as the encryption primitive in 5G systems. The stream cipher offers 256-bit security and is ready for deployment in the post-quantum era, in …

Andrea Caforio, Fatih Balli, Subhadeep Banik