default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2022
Volume 2022, Number 1, 2022
- Xavier Bonnetain, Samuel Jaques:
Quantum Period Finding against Symmetric Primitives in Practice. 1-27 - Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. 28-68 - Jan Sebastian Götte, Björn Scheuermann:
Can't Touch This: Inertial HSMs Thwart Advanced Physical Attacks. 69-93 - Xiangren Chen, Bohan Yang, Shouyi Yin, Shaojun Wei, Leibo Liu:
CFNTT: Scalable Radix-2/4 NTT Multiplication Architecture with an Efficient Conflict-free Memory Mapping Scheme. 94-126 - Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang:
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4. 127-151 - Tung Chou, Jin-Han Liou:
A Constant-time AVX2 Implementation of a Variant of ROLLO. 152-174 - Ben Marshall, Dan Page, James Webb:
MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices. 175-220 - Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang:
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1. 221-244 - Kyung-Ah Shim, Sangyub Lee, Namhun Koo:
Efficient Implementations of Rainbow and UOV using AVX2. 245-269 - Cankun Zhao, Neng Zhang, Hanning Wang, Bohan Yang, Wenping Zhu, Zhengdong Li, Min Zhu, Shouyi Yin, Shaojun Wei, Leibo Liu:
A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium. 270-295 - Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. 296-322 - David Knichel, Pascal Sasdrich, Amir Moradi:
Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets. 323-344 - Jens Trautmann, Arthur Beckers, Lennert Wouters, Stefan Wildermann, Ingrid Verbauwhede, Jürgen Teich:
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces. 345-366 - Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. 367-390 - Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. 391-413 - Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. 414-460 - Francesco Berti, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Romain Poussier, François-Xavier Standaert, Balazs Udvarhelyi:
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB. 461-481 - Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede:
Polynomial multiplication on embedded vector architectures. 482-505 - Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu:
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking. 506-556 - Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. 557-588 - David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich:
Automated Generation of Masked Hardware. 589-629 - Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun:
Composite Enclaves: Towards Disaggregated Trusted Execution. 630-656 - Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran:
VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs. 657-678 - Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi:
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency. 679-721 - Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy:
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs. 722-761
Volume 2022, Number 2, 2022
- Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. 1-40 - Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
Highly Vectorized SIKE for AVX-512. 41-68 - Yaacov Belenky, Vadim Bugaenko, Leonid Azriel, Hennadii Chernyshchyk, Ira Dushar, Oleg Karavaev, Oleh Maksimenko, Yulia Ruda, Valery Teper, Yury Kreimer:
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM). 69-91 - Peter A. Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo:
Towards a Formal Treatment of Logic Locking. 92-114 - Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel Van Beirendonck, Ingrid Verbauwhede:
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography. 115-139 - Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? 140-165 - Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. 166-191 - Antonio de la Piedra, Marloes Venema, Greg Alpár:
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption. 192-239 - Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. 240-265 - Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi:
Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits. 266-288 - Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao:
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. 289-311
Volume 2022, Number 3, 2022
- Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó:
A Security Model for Randomization-based Protected Caches. 1-25 - Jonas Ruchti, Michael Gruber, Michael Pehl:
When the Decoder Has to Look Twice: Glitching a PUF Error Correction. 26-70 - Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. 71-113 - David Knichel, Amir Moradi:
Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks. 114-140 - Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. 141-164 - Kathrin Garb, Marvin Xhemrishi, Ludwig Kürzinger, Christoph Frisch:
The Wiretap Channel for Capacitive PUF-Based Security Enclosures. 165-191 - Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. 192-222 - Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder:
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE. 223-263 - Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluderovic, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso:
SIKE Channels Zero-Value Side-Channel Attacks on SIKE. 264-289 - Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, Yang Su:
Side-Channel Masking with Common Shares. 290-329 - Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. 330-366 - Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. 367-390 - Aleksa Deric, Daniel E. Holcomb:
Know Time to Die - Integrity Checking for Zero Trust Chiplet-based Systems Using Between-Die Delay PUFs. 391-412 - Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. 413-437 - Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg:
Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures. 438-462
Volume 2022, Number 4, 2022
- Davide Bellizia, Clément Hoffmann, Dina Kamel, Pierrick Méaux, François-Xavier Standaert:
When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors. 1-24 - Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. 25-55 - Pascal Nasahl, Miguel Osorio, Pirmin Vogel, Michael Schaffner, Timothy Trippel, Dominic Rizzo, Stefan Mangard:
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element. 56-87 - Adriaan Peetermans, Ingrid Verbauwhede:
An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining. 88-109 - Thales Bandiera Paiva, Routo Terada:
Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM. 110-134 - Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme:
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation. 135-162 - Kavya Sreedhar, Mark Horowitz, Christopher Torng:
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion. 163-187 - Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
Randomness Optimization for Gadget Compositions in Higher-Order Masking. 188-227 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks. 228-254 - Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu:
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. 255-284 - Yanbin Li, Jiajie Zhu, Yuxin Huang, Zhe Liu, Ming Tang:
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber. 285-310 - Nicolai Müller, Amir Moradi:
PROLEAD A Probing-Based Hardware Leakage Detection Tool. 311-348 - Erdem Alkim, Vincent Hwang, Bo-Yin Yang:
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4. 349-371 - Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal:
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. 372-396 - Aron Gohr, Friederike Laus, Werner Schindler:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis A Report on the CHES Challenge Side-Channel Contest 2020. 397-437 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:
PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors. 438-462 - Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne P. Burleson, Takeshi Sugawara:
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers. 463-489 - Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma:
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. 490-526 - Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie:
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge. 527-552 - Olivier Bronchain, Gaëtan Cassiers:
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs. 553-588 - Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran:
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks. 589-613 - Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. 614-636 - Jeroen Delvaux:
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber. 637-660 - Marc Joye:
SoK: Fully Homomorphic Encryption over the [Discretized] Torus. 661-692 - Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard:
Riding the Waves Towards Generic Single-Cycle Masking in Hardware. 693-717 - Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU. 718-750 - Pantea Kiaei, Patrick Schaumont:
SoC Root Canal! Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs. 751-773 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. 774-799 - Qian Guo, Andreas Johansson, Thomas Johansson:
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations. 800-827 - Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. 828-861 - Bodo Selmke, Maximilian Pollanka, Andreas Duensing, Emanuele Strieder, Hayden Wen, Michael Mittermair, Reinhard Kienberger, Georg Sigl:
On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection. 862-885 - Anca Radulescu, Pantelimon George Popescu, Marios O. Choudary:
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys. 886-905
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.