


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2022
Volume 2022, Number 1, 2022
- Xavier Bonnetain, Samuel Jaques:
Quantum Period Finding against Symmetric Primitives in Practice. 1-27 - Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma:
Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure. 28-68 - Jan Sebastian Götte, Björn Scheuermann:
Can't Touch This: Inertial HSMs Thwart Advanced Physical Attacks. 69-93 - Xiangren Chen, Bohan Yang
, Shouyi Yin, Shaojun Wei, Leibo Liu:
CFNTT: Scalable Radix-2/4 NTT Multiplication Architecture with an Efficient Conflict-free Memory Mapping Scheme. 94-126 - Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang:
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4. 127-151 - Tung Chou, Jin-Han Liou
:
A Constant-time AVX2 Implementation of a Variant of ROLLO. 152-174 - Ben Marshall, Dan Page, James Webb:
MIRACLE: MIcRo-ArChitectural Leakage Evaluation A study of micro-architectural power leakage across many devices. 175-220 - Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang:
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1. 221-244 - Kyung-Ah Shim, Sangyub Lee
, Namhun Koo
:
Efficient Implementations of Rainbow and UOV using AVX2. 245-269 - Cankun Zhao
, Neng Zhang, Hanning Wang, Bohan Yang, Wenping Zhu, Zhengdong Li, Min Zhu, Shouyi Yin, Shaojun Wei, Leibo Liu:
A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium. 270-295 - Rei Ueno, Keita Xagawa
, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma:
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs. 296-322 - David Knichel, Pascal Sasdrich
, Amir Moradi
:
Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets. 323-344 - Jens Trautmann
, Arthur Beckers, Lennert Wouters, Stefan Wildermann, Ingrid Verbauwhede
, Jürgen Teich:
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces. 345-366 - Hadi Soleimany, Nasour Bagheri, Hosein Hadipour
, Prasanna Ravi, Shivam Bhasin, Sara Mansouri:
Practical Multiple Persistent Faults Analysis. 367-390 - Chao Sun
, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe:
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. 391-413 - Tim Fritzmann, Michiel Van Beirendonck
, Debapriya Basu Roy, Patrick Karl
, Thomas Schamberger, Ingrid Verbauwhede
, Georg Sigl:
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography. 414-460 - Francesco Berti, Shivam Bhasin, Jakub Breier
, Xiaolu Hou
, Romain Poussier, François-Xavier Standaert, Balazs Udvarhelyi:
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB. 461-481 - Hanno Becker, Jose Maria Bermudo Mera
, Angshuman Karmakar
, Joseph Yiu, Ingrid Verbauwhede
:
Polynomial multiplication on embedded vector architectures. 482-505 - Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu:
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking. 506-556 - Jan Richter-Brockmann
, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
:
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware. 557-588 - David Knichel, Amir Moradi
, Nicolai Müller
, Pascal Sasdrich
:
Automated Generation of Masked Hardware. 589-629 - Moritz Schneider, Aritra Dhar, Ivan Puddu
, Kari Kostiainen, Srdjan Capkun:
Composite Enclaves: Towards Disaggregated Trusted Execution. 630-656 - Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran:
VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs. 657-678 - Tim Beyne
, Siemen Dhooghe
, Amir Moradi
, Aein Rezaei Shahmirzadi
:
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency. 679-721 - Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy:
Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs. 722-761
Volume 2022, Number 2, 2022
- Jean-Sébastien Coron, François Gérard, Simon Montoya
, Rina Zeitoun:
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption. 1-40 - Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
Highly Vectorized SIKE for AVX-512. 41-68 - Yaacov Belenky, Vadim Bugaenko, Leonid Azriel, Hennadii Chernyshchyk, Ira Dushar, Oleg Karavaev, Oleh Maksimenko, Yulia Ruda, Valery Teper, Yury Kreimer:
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM). 69-91 - Peter A. Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo:
Towards a Formal Treatment of Logic Locking. 92-114 - Jan-Pieter D'Anvers, Daniel Heinz, Peter Pessl, Michiel Van Beirendonck
, Ingrid Verbauwhede
:
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography. 115-139 - Melissa Azouaoui
, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert:
Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software? 140-165 - Satyam Kumar
, Vishnu Asutosh Dasu
, Anubhab Baksi, Santanu Sarkar
, Dirmanto Jap, Jakub Breier
, Shivam Bhasin:
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery. 166-191 - Antonio de la Piedra, Marloes Venema
, Greg Alpár:
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption. 192-239 - Pierre-Alain Fouque
, Paul Kirchner, Thomas Pornin, Yang Yu:
BAT: Small and Fast KEM over NTRU Lattices. 240-265 - Nicolai Müller
, David Knichel, Pascal Sasdrich
, Amir Moradi
:
Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits. 266-288 - Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao:
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. 289-311
Volume 2022, Number 3, 2022
- Jordi Ribes-González, Oriol Farràs
, Carles Hernández, Vatistas Kostalabros, Miquel Moretó:
A Security Model for Randomization-based Protected Caches. 1-25 - Jonas Ruchti, Michael Gruber, Michael Pehl:
When the Decoder Has to Look Twice: Glitching a PUF Error Correction. 26-70 - Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr
, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. 71-113 - David Knichel, Amir Moradi
:
Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks. 114-140 - Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi:
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon. 141-164 - Kathrin Garb, Marvin Xhemrishi, Ludwig Kürzinger, Christoph Frisch:
The Wiretap Channel for Capacitive PUF-Based Security Enclosures. 165-191 - Qianmei Wu
, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu:
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. 192-222 - Qian Guo
, Clemens Hlauschek, Thomas Johansson
, Norman Lahr
, Alexander Nilsson
, Robin Leander Schröder:
Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE. 223-263 - Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluderovic, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso:
SIKE Channels Zero-Value Side-Channel Attacks on SIKE. 264-289 - Weijia Wang
, Chun Guo, Yu Yu, Fanjie Ji, Yang Su:
Side-Channel Masking with Common Shares. 290-329 - Marco Casagrande
, Eleonora Losiouk, Mauro Conti
, Mathias Payer, Daniele Antonioli:
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem. 330-366 - Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany:
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers. 367-390 - Aleksa Deric, Daniel E. Holcomb:
Know Time to Die - Integrity Checking for Zero Trust Chiplet-based Systems Using Between-Die Delay PUFs. 391-412 - Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. 413-437 - Timo Bartkewitz, Sven Bettendorf, Thorben Moos
, Amir Moradi
, Falk Schellenberg
:
Beware of Insufficient Redundancy An Experimental Evaluation of Code-based FI Countermeasures. 438-462
Volume 2022, Number 4, 2022
- Davide Bellizia, Clément Hoffmann
, Dina Kamel, Pierrick Méaux, François-Xavier Standaert:
When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors. 1-24 - Sven Bauer
, Hermann Drexler, Max Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann:
Attacks Against White-Box ECDSA and Discussion of Countermeasures A Report on the WhibOx Contest 2021. 25-55 - Pascal Nasahl, Miguel Osorio, Pirmin Vogel, Michael Schaffner, Timothy Trippel, Dominic Rizzo, Stefan Mangard:
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element. 56-87 - Adriaan Peetermans, Ingrid Verbauwhede
:
An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining. 88-109 - Thales Bandiera Paiva, Routo Terada:
Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM. 110-134 - Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme:
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation. 135-162 - Kavya Sreedhar, Mark Horowitz, Christopher Torng
:
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion. 163-187 - Jakob Feldtkeller
, David Knichel, Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
Randomness Optimization for Gadget Compositions in Higher-Order Masking. 188-227 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks. 228-254 - Jan Richter-Brockmann
, Jakob Feldtkeller
, Pascal Sasdrich
, Tim Güneysu
:
VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering. 255-284 - Yanbin Li, Jiajie Zhu
, Yuxin Huang, Zhe Liu, Ming Tang:
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber. 285-310 - Nicolai Müller
, Amir Moradi
:
PROLEAD A Probing-Based Hardware Leakage Detection Tool. 311-348 - Erdem Alkim, Vincent Hwang, Bo-Yin Yang:
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4. 349-371 - Melissa Azouaoui
, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal:
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. 372-396 - Aron Gohr, Friederike Laus, Werner Schindler:
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis A Report on the CHES Challenge Side-Channel Contest 2020. 397-437 - Anomadarshi Barua, Mohammad Abdullah Al Faruque:
PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors. 438-462 - Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne P. Burleson, Takeshi Sugawara
:
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers. 463-489 - Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma:
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA-CRT with Windowed Exponentiation. 490-526 - Guillaume Barbu
, Ward Beullens, Emmanuelle Dottax, Christophe Giraud
, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea
, Jianrui Xie
:
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge. 527-552 - Olivier Bronchain, Gaëtan Cassiers:
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs. 553-588 - Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
:
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks. 589-613 - Junhao Huang
, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Improved Plantard Arithmetic for Lattice-based Cryptography. 614-636 - Jeroen Delvaux:
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber. 637-660 - Marc Joye:
SoK: Fully Homomorphic Encryption over the [Discretized] Torus. 661-692 - Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard:
Riding the Waves Towards Generic Single-Cycle Masking in Hardware. 693-717 - Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU. 718-750 - Pantea Kiaei, Patrick Schaumont
:
SoC Root Canal! Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs. 751-773 - Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul:
Side-Channel Expectation-Maximization Attacks. 774-799 - Qian Guo
, Andreas Johansson, Thomas Johansson:
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations. 800-827 - Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. 828-861 - Bodo Selmke, Maximilian Pollanka, Andreas Duensing, Emanuele Strieder
, Hayden Wen, Michael Mittermair, Reinhard Kienberger
, Georg Sigl:
On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection. 862-885 - Anca Radulescu, Pantelimon George Popescu, Marios O. Choudary:
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys. 886-905

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.