


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2020
Volume 2020, Number 1, 2020
- Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:

Methodology for Efficient CNN Architectures in Profiling Attacks. 1-36 - Lauren De Meyer:

Recovering the CTR_DRBG state in 256 traces. 37-65 - Yusuke Naito, Takeshi Sugawara

:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. 66-94 - Shivam Bhasin, Jakub Breier

, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
:
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. 95-122 - Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang:

Power Analysis on NTRU Prime. 123-151 - Si Gao, Ben Marshall, Dan Page, Elisabeth Oswald:

Share-slicing: Friend or Foe? 152-174 - Bicky Shakya, Xiaolin Xu, Mark Tehranipoor, Domenic Forte

:
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme. 175-202 - Quan Quan Tan, Thomas Peyrin

:
Improved Heuristics for Short Linear Programs. 203-230 - Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom, Yuanjing Zhao:

Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung. 231-255 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:

TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications. 256-320 - Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, Mingshu Li:

Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX. 321-347 - Loïc Masure

, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. 348-375
Volume 2020, Number 2, 2020
- Olivier Bronchain, François-Xavier Standaert:

Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations. 1-25 - Ziyue Zhang, A. Adam Ding, Yunsi Fei

:
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery. 26-48 - Neng Zhang, Bohan Yang, Chen Chen, Shouyi Yin, Shaojun Wei, Leibo Liu:

Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT. 49-72 - Si Gao, Ben Marshall, Dan Page, Thinh Hung Pham

:
FENL: an ISE to mitigate analogue micro-architectural leakage. 73-98 - Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David F. Oswald

, Benedikt Gierlichs, Bart Preneel:
Dismantling DST80-based Immobiliser Systems. 99-127 - Weijia Wang, Pierrick Méaux

, Gaëtan Cassiers, François-Xavier Standaert:
Efficient and Private Computations with Code-Based Masking. 128-171 - Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:

Persistent Fault Attack in Practice. 172-195 - Alejandro Cabrera Aldaya

, Billy Bob Brumley
:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. 196-221 - Jose Maria Bermudo Mera

, Angshuman Karmakar
, Ingrid Verbauwhede
:
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography. 222-244 - Pedro Maat C. Massolino, Patrick Longa, Joost Renes

, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. 245-271 - Keerthi K., Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia

:
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers. 272-299 - Pascal Sasdrich

, Begül Bilgin
, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. 300-326 - Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels:

On the Security Goals of White-Box Cryptography. 327-357
Volume 2020, Number 3, 2020
- Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi

:
Strengthening Sequential Side-Channel Attacks Through Change Detection. 1-21 - Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner

, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. 22-72 - Jiajia Zhang, Mengce Zheng

, Jiehui Nan, Honggang Hu, Nenghai Yu:
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data. 73-96 - Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:

Splitting the Interpose PUF: A Novel Modeling Attack Strategy. 97-120 - Jonas Krautter, Dennis Gnad, Mehdi Baradaran Tahoori:

CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design. 121-146 - Lennert Wouters, Victor Arribas, Benedikt Gierlichs, Bart Preneel:

Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. 147-168 - Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth

, Berk Sunar:
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. 169-195 - Daniel De Almeida Braga

, Pierre-Alain Fouque, Mohamed Sabt:
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10. 196-218 - Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri

:
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V. 219-242 - Matthias J. Kannwischer, Peter Pessl, Robert Primas:

Single-Trace Attacks on Keccak. 243-268 - Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel

, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. 269-306 - Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin:

Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs. 307-335 - Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk

, François Gérard:
Cortex-M4 optimizations for {R, M} LWE schemes. 336-357 - Giovanni Camurati

, Aurélien Francillon
, François-Xavier Standaert:
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks. 358-401 - Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin

:
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M. 402-427 - Alejandro Cabrera Aldaya

, Cesar Pereida García
, Billy Bob Brumley
:
From A to Z: Projective coordinates leakage in the wild. 428-453 - Louis Goubin, Matthieu Rivain, Junwei Wang:

Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. 454-482 - Florian Bache, Clara Paglialonga, Tobias Oder, Tobias Schneider, Tim Güneysu

:
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs. 483-507 - Joan Daemen, Christoph Dobraunig

, Maria Eichlseder
, Hannes Groß, Florian Mendel
, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. 508-543
Volume 2020, Number 4, 2020
- Zhendong Zhang, Peng Liu:

A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords. 1-23 - Maria Chiara Molteni, Vittorio Zaccaria:

On the spectral features of robust probing security. 24-48 - Anh-Tuan Hoang, Neil Hanley, Máire O'Neill:

Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures. 49-85 - Rei Ueno, Kohei Kazumori, Naofumi Homma:

Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs. 86-128 - Annapurna Valiveti, Srinivas Vivek

:
Second-Order Masked Lookup Table Compression Scheme. 129-153 - Daniel Kales

, Greg Zaverucha
:
Improving the Performance of the Picnic Signature Scheme. 154-188 - Mike Hamburg:

Faster Montgomery and double-add ladders for short Weierstrass curves. 189-208 - Qian Guo

, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain:
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint. 209-238 - Tim Fritzmann, Georg Sigl, Johanna Sepúlveda:

RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography. 239-280 - Jan Jancar

, Vladimir Sedlacek
, Petr Svenda, Marek Sýs
:
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. 281-308 - Nils Albartus

, Max Hoffmann
, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. 309-336 - Guilherme Perin, Lukasz Chmielewski, Stjepan Picek:

Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis. 337-364 - Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:

Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. 365-388 - Lichao Wu, Stjepan Picek:

Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders. 389-415 - Thorben Moos:

Unrolled Cryptography on Silicon A Physical Security Analysis. 416-442 - Sujoy Sinha Roy, Andrea Basso

:
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware. 443-466

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














