Skip to main content
main-content

Journal of Cryptographic Engineering OnlineFirst articles

20.01.2019 | Regular Paper

A toolbox for software optimization of QC-MDPC code-based cryptosystems

The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based on problems that remain intractable even with large-scale quantum computers. One …

12.01.2019 | Regular Paper

Improving side-channel attacks against pairing-based cryptography

Side-channel attacks are a serious threat against secret data involved in cryptographic calculations, as, for instance, pairing-based cryptography which is a promising tool for the IoT. We focus our work on correlation power analysis (CPA) attack …

12.01.2019 | Regular Paper

Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations

Refreshing algorithms are a critical ingredient for secure masking. They are instrumental in enabling sound composability properties for complex circuits, and their randomness requirements dominate the performance overheads in (very) high-order …

21.11.2018 | Regular Paper

Horst Feistel: the inventor of LUCIFER, the cryptographic algorithm that changed cryptology

This paper documents the early life of Horst Feistel, in particular, the events shaping his career. His creativity led to the development of today’s high-grade cryptographic algorithms. We describe Feistel’s successful escape from Nazi Germany …

12.11.2018 | Regular Paper

Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding

Digital signature algorithm (DSA) (resp. ECDSA) involves modular exponentiation (resp. scalar multiplication) of a public and known base by a random one-time exponent. In order to speed up this operation, well-known methods take advantage of the …

Aktuelle Ausgaben

Über diese Zeitschrift

The Journal of Cryptographic Engineering (JCEN) offers high-quality scientific articles presenting methods, techniques, tools, implementations, and applications of research in cryptographic engineering, including cryptographic hardware, cryptographic embedded systems, and embedded security. JCEN aims to serve the academic and corporate R&D community interested in cryptographic hardware and embedded security by offering a focused journal drawing together archival papers that are presently scattered across various journals.

JCEN’s broad and varied coverage includes Cryptographic Hardware for both pubic-key and secret-key cryptography; Cryptographic Software for embedded systems, including implementation, libraries and cryptographic algorithms targeting embedded devices; Attacks and Countermeasures; Tools and Methodologies; Applications and Implementation Environments and more.

JCEN benefits the academic and corporate R&D community interested in cryptographic hardware and embedded security.

Weitere Informationen

Premium Partner

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung

Unternehmen haben das Innovationspotenzial der eigenen Mitarbeiter auch außerhalb der F&E-Abteilung erkannt. Viele Initiativen zur Partizipation scheitern in der Praxis jedoch häufig. Lesen Sie hier  - basierend auf einer qualitativ-explorativen Expertenstudie - mehr über die wesentlichen Problemfelder der mitarbeiterzentrierten Produktentwicklung und profitieren Sie von konkreten Handlungsempfehlungen aus der Praxis.
Jetzt gratis downloaden!

Bildnachweise