


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2022
Volume 2022, Number 1, 2022
- Xavier Bonnetain, Samuel Jaques:

Quantum Period Finding against Symmetric Primitives in Practice. 1-27 - Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:

Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. 28-68 - Jan Sebastian Götte, Björn Scheuermann:

Can't Touch This: Inertial HSMs Thwart Advanced Physical Attacks. 69-93 - Xiangren Chen, Bohan Yang

, Shouyi Yin, Shaojun Wei, Leibo Liu:
CFNTT: Scalable Radix-2/4 NTT Multiplication Architecture with an Efficient Conflict-free Memory Mapping Scheme. 94-126 - Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang:

Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4. 127-151 - Tung Chou, Jin-Han Liou

:
A Constant-time AVX2 Implementation of a Variant of ROLLO. 152-174 - Ben Marshall, Dan Page, James Webb:

MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices. 175-220 - Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang:

Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1. 221-244 - Kyung-Ah Shim, Sangyub Lee

, Namhun Koo
:
Efficient Implementations of Rainbow and UOV using AVX2. 245-269 - Cankun Zhao

, Neng Zhang, Hanning Wang, Bohan Yang, Wenping Zhu, Zhengdong Li, Min Zhu, Shouyi Yin, Shaojun Wei, Leibo Liu:
A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium. 270-295 - Rei Ueno, Keita Xagawa

, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. 296-322 - David Knichel, Pascal Sasdrich

, Amir Moradi
:
Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets. 323-344 - Jens Trautmann

, Arthur Beckers, Lennert Wouters, Stefan Wildermann, Ingrid Verbauwhede
, Jürgen Teich:
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces. 345-366 - Hadi Soleimany, Nasour Bagheri, Hosein Hadipour

, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. 367-390 - Chao Sun

, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. 391-413 - Tim Fritzmann, Michiel Van Beirendonck

, Debapriya Basu Roy, Patrick Karl
, Thomas Schamberger, Ingrid Verbauwhede
, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. 414-460 - Francesco Berti, Shivam Bhasin, Jakub Breier

, Xiaolu Hou
, Romain Poussier, François-Xavier Standaert, Balazs Udvarhelyi:
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB. 461-481 - Hanno Becker, Jose Maria Bermudo Mera

, Angshuman Karmakar
, Joseph Yiu, Ingrid Verbauwhede
:
Polynomial multiplication on embedded vector architectures. 482-505 - Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu:

ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking. 506-556 - Jan Richter-Brockmann

, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. 557-588 - David Knichel, Amir Moradi

, Nicolai Müller
, Pascal Sasdrich
:
Automated Generation of Masked Hardware. 589-629 - Moritz Schneider, Aritra Dhar, Ivan Puddu

, Kari Kostiainen, Srdjan Capkun:
Composite Enclaves: Towards Disaggregated Trusted Execution. 630-656 - Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran

:
VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs. 657-678 - Tim Beyne

, Siemen Dhooghe
, Amir Moradi
, Aein Rezaei Shahmirzadi
:
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency. 679-721 - Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy

:
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs. 722-761
Volume 2022, Number 2, 2022
- Jean-Sébastien Coron

, François Gérard, Simon Montoya
, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. 1-40 - Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:

Highly Vectorized SIKE for AVX-512. 41-68 - Yaacov Belenky, Vadim Bugaenko, Leonid Azriel, Hennadii Chernyshchyk, Ira Dushar, Oleg Karavaev, Oleh Maksimenko, Yulia Ruda, Valery Teper, Yury Kreimer

:
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM). 69-91 - Peter A. Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo:

Towards a Formal Treatment of Logic Locking. 92-114 - Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel Van Beirendonck

, Ingrid Verbauwhede
:
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography. 115-139 - Melissa Azouaoui

, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? 140-165 - Satyam Kumar

, Vishnu Asutosh Dasu
, Anubhab Baksi, Santanu Sarkar
, Dirmanto Jap, Jakub Breier
, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. 166-191 - Antonio de la Piedra, Marloes Venema

, Greg Alpár:
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption. 192-239 - Pierre-Alain Fouque

, Paul Kirchner
, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. 240-265 - Nicolai Müller

, David Knichel, Pascal Sasdrich
, Amir Moradi
:
Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits. 266-288 - Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao:

Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. 289-311
Volume 2022, Number 3, 2022
- Jordi Ribes-González, Oriol Farràs

, Carles Hernández, Vatistas Kostalabros, Miquel Moretó:
A Security Model for Randomization-based Protected Caches. 1-25 - Jonas Ruchti, Michael Gruber, Michael Pehl:

When the Decoder Has to Look Twice: Glitching a PUF Error Correction. 26-70 - Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr

, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. 71-113 - David Knichel, Amir Moradi

:
Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks. 114-140 - Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:

The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. 141-164 - Kathrin Garb, Marvin Xhemrishi, Ludwig Kürzinger, Christoph Frisch:

The Wiretap Channel for Capacitive PUF-Based Security Enclosures. 165-191 - Qianmei Wu

, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. 192-222 - Qian Guo

, Clemens Hlauschek, Thomas Johansson
, Norman Lahr
, Alexander Nilsson
, Robin Leander Schröder
:
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE. 223-263 - Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluderovic, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso:

SIKE Channels Zero-Value Side-Channel Attacks on SIKE. 264-289 - Weijia Wang

, Chun Guo, Yu Yu, Fanjie Ji, Yang Su:
Side-Channel Masking with Common Shares. 290-329 - Marco Casagrande

, Eleonora Losiouk
, Mauro Conti
, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. 330-366 - Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:

SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. 367-390 - Aleksa Deric, Daniel E. Holcomb:

Know Time to Die - Integrity Checking for Zero Trust Chiplet-based Systems Using Between-Die Delay PUFs. 391-412 - Lichao Wu, Guilherme Perin, Stjepan Picek:

The Best of Two Worlds: Deep Learning-assisted Template Attack. 413-437 - Timo Bartkewitz, Sven Bettendorf, Thorben Moos

, Amir Moradi
, Falk Schellenberg
:
Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures. 438-462
Volume 2022, Number 4, 2022
- Davide Bellizia, Clément Hoffmann

, Dina Kamel, Pierrick Méaux, François-Xavier Standaert:
When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors. 1-24 - Sven Bauer

, Hermann Drexler, Max Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. 25-55 - Pascal Nasahl, Miguel Osorio, Pirmin Vogel, Michael Schaffner, Timothy Trippel, Dominic Rizzo, Stefan Mangard

:
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element. 56-87 - Adriaan Peetermans, Ingrid Verbauwhede

:
An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining. 88-109 - Thales Bandiera Paiva, Routo Terada:

Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM. 110-134 - Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme:

Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation. 135-162 - Kavya Sreedhar, Mark Horowitz, Christopher Torng

:
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion. 163-187 - Jakob Feldtkeller

, David Knichel, Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
Randomness Optimization for Gadget Compositions in Higher-Order Masking. 188-227 - Akira Ito, Rei Ueno, Naofumi Homma:

Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks. 228-254 - Jan Richter-Brockmann

, Jakob Feldtkeller
, Pascal Sasdrich
, Tim Güneysu
:
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. 255-284 - Yanbin Li, Jiajie Zhu

, Yuxin Huang, Zhe Liu, Ming Tang:
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber. 285-310 - Nicolai Müller

, Amir Moradi
:
PROLEAD A Probing-Based Hardware Leakage Detection Tool. 311-348 - Erdem Alkim, Vincent Hwang, Bo-Yin Yang:

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4. 349-371 - Melissa Azouaoui

, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal:
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. 372-396 - Aron Gohr, Friederike Laus, Werner Schindler

:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis A Report on the CHES Challenge Side-Channel Contest 2020. 397-437 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:

PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors. 438-462 - Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne P. Burleson, Takeshi Sugawara

:
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers. 463-489 - Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma:

One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. 490-526 - Guillaume Barbu

, Ward Beullens, Emmanuelle Dottax, Christophe Giraud
, Agathe Houzelot, Chaoyun Li
, Mohammad Mahzoun, Adrián Ranea
, Jianrui Xie
:
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge. 527-552 - Olivier Bronchain, Gaëtan Cassiers:

Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs. 553-588 - Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran

:
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks. 589-613 - Junhao Huang

, Jipeng Zhang
, Haosong Zhao, Zhe Liu, Ray C. C. Cheung
, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. 614-636 - Jeroen Delvaux:

Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber. 637-660 - Marc Joye:

SoK: Fully Homomorphic Encryption over the [Discretized] Torus. 661-692 - Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard

:
Riding the Waves Towards Generic Single-Cycle Masking in Hardware. 693-717 - Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:

Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU. 718-750 - Pantea Kiaei, Patrick Schaumont

:
SoC Root Canal! Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs. 751-773 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:

Side-Channel Expectation-Maximization Attacks. 774-799 - Qian Guo

, Andreas Johansson, Thomas Johansson
:
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations. 800-827 - Guilherme Perin, Lichao Wu, Stjepan Picek:

Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. 828-861 - Bodo Selmke, Maximilian Pollanka, Andreas Duensing, Emanuele Strieder

, Hayden Wen, Michael Mittermair, Reinhard Kienberger
, Georg Sigl:
On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection. 862-885 - Anca Radulescu, Pantelimon George Popescu, Marios O. Choudary:

GE vs GM: Efficient side-channel security evaluations on full cryptographic keys. 886-905

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














