


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2018
Volume 2018, Number 1, 2018
- Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:

Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. 1-17 - Dorian Amiet

, Andreas Curiger
, Paul Zbinden:
FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256. 18-39 - Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:

High Order Masking of Look-up Tables with Common Shares. 40-72 - Daniel Dinu, Ilya Kizhvatov:

EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread. 73-97 - Kai-Hsin Chuang

, Robin Degraeve, Andrea Fantini, Guido Groeseneken
, Dimitri Linten, Ingrid Verbauwhede
:
A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF. 98-117 - Hervé Chabanne

, Houssem Maghrebi, Emmanuel Prouff:
Linear Repairing Codes and Side-Channel Attacks. 118-141 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu

:
Practical CCA2-Secure and Masked Ring-LWE Implementation. 142-174 - Axel Mathieu-Mahias, Michaël Quisquater:

Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods. 175-208 - Amir Moradi

, Bastian Richter, Tobias Schneider, François-Xavier Standaert
:
Leakage Detection with the x2-Test. 209-237 - Léo Ducas, Eike Kiltz

, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé
:
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. 238-268 - Victor Arribas, Begül Bilgin

, George Petrides
, Svetla Nikova
, Vincent Rijmen
:
Rhythmic Keccak: SCA Security and Low Latency in HW. 269-290
Volume 2018, Number 2, 2018
- Hannes Groß, Rinat Iusupov, Roderick Bloem

:
Generic Low-Latency Masking in Hardware. 1-21 - Luk Bettale

, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. 22-45 - Christopher Hicks, Flavio D. Garcia

, David F. Oswald
:
Dismantling the AUT64 Automotive Cipher. 46-69 - Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung:

High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA. 70-95 - Jakub Breier

, Xiaolu Hou
, Yang Liu
:
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code. 96-122 - Thomas De Cnudde, Maik Ender

, Amir Moradi
:
Hardware Masking, Revisited. 123-148 - Gildas Avoine, Loïc Ferreira:

Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack. 149-170 - Fergus Dall, Gabrielle De Micheli

, Thomas Eisenbarth
, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. 171-191 - Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara

, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. 192-217 - Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda:

Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. 218-241 - Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:

ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. 242-276 - Max Hoffmann

, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. 277-297 - Arash Reyhani-Masoleh, Mostafa M. I. Taha, Doaa Ashmawy:

Smashing the Implementation Records of AES S-box. 298-336
Volume 2018, Number 3, 2018
- Daniel Page, Matthieu Rivain:

Preface to TCHES 2018. I-IV
- Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu:

SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange. 1-20 - Leon Groot Bruinderink, Peter Pessl:

Differential Fault Attacks on Deterministic Lattice Signatures. 21-43 - Jonas Krautter, Dennis R. E. Gnad

, Mehdi Baradaran Tahoori:
FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES. 44-68 - Joël Cathébras, Alexandre Carbon, Peter A. Milder

, Renaud Sirdey
, Nicolas Ventroux:
Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication for SHE Acceleration. 69-88 - Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo

, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. 89-120 - Patrick Derbez

, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 121-149 - Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren:

Persistent Fault Analysis on Block Ciphers. 150-172 - Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. 173-213 - Elie Noumon Allini, Maciej Skórski

, Oto Petura, Florent Bernard, Marek Laban, Viktor Fischer:
Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness. 214-242 - Angshuman Karmakar

, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede:
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM. 243-266 - Bohan Yang, Vladimir Rozic, Milos Grujic, Nele Mentens, Ingrid Verbauwhede:

ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling. 267-292 - Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus

, Sinan Böcker, Russell Tessier, Christof Paar:
On the Difficulty of FSM-based Hardware Obfuscation. 293-330 - Akira Takahashi, Mehdi Tibouchi, Masayuki Abe:

New Bleichenbacher Records: Fault Attacks on qDSA Signatures. 331-371 - James Howe

, Tobias Oder, Markus Krausz
, Tim Güneysu
:
Standard Lattice-Based Key Encapsulation on Embedded Devices. 372-393 - Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth

, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. 394-430 - Lauren De Meyer, Oscar Reparaz, Begül Bilgin

:
Multiplicative Masking for AES in Hardware. 431-468 - Jin Hyung Park, Dong Hoon Lee:

FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data. 469-499 - Aesun Park, Kyung-Ah Shim, Namhun Koo

, Dong-Guk Han:
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -. 500-523 - Kostas Papagiannopoulos:

Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information. 524-546 - Christoph Dobraunig

, Maria Eichlseder
, Thomas Korak, Stefan Mangard
, Florian Mendel
, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. 547-572 - Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:

Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs. 573-595 - Lauren De Meyer, Amir Moradi

, Felix Wegener:
Spin Me Right Round Rotational Symmetry for FPGA-Specific AES. 596-626 - Bernhard Jungk, Richard Petri

, Marc Stöttinger
:
Efficient Side-Channel Protections of ARX Ciphers. 627-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














