


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023
Volume 2023, Number 1, 2023
- Florian Stolz, Jan Philipp Thoma

, Pascal Sasdrich
, Tim Güneysu
:
Risky Translations: Securing TLBs against Timing Side Channels. 1-31 - Loïc Masure

, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert:
Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking. 32-59 - Julius Hermelink, Silvan Streit, Emanuele Strieder

, Katharina Thieme:
Adapting Belief Propagation to Counter Shuffling of NTTs. 60-88 - Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo

, Tao Jiang:
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber. 89-112 - Aein Rezaei Shahmirzadi

, Siemen Dhooghe
, Amir Moradi
:
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions. 113-152 - Jean-Sébastien Coron

, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Polynomial Comparison and Masking Lattice-based Encryption. 153-192 - Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page

, Thinh Hung Pham:
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. 193-237 - Sonia Belaïd, Matthieu Rivain:

High Order Side-Channel Security for Elliptic-Curve Implementations. 238-276 - Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert:

MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations. 277-300 - Tahoura Mosavirik

, Patrick Schaumont
, Shahin Tajik
:
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. 301-325 - Yanis Belkheyar, Joan Daemen, Christoph Dobraunig

, Santosh Ghosh, Shahram Rasoolzadeh:
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions. 326-368 - Yufeng Tang

, Zheng Gong, Jinhai Chen, Nanjiang Xie:
Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures. 369-400 - Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte

:
Information Theory-based Evolution of Neural Networks for Side-channel Analysis. 401-437 - Danyang Zhu, Rongrong Zhang, Lun Ou, Jing Tian, Zhongfeng Wang:

Low-Latency Design and Implementation of the Squaring in Class Groups for Verifiable Delay Function Using Redundant Representation. 438-462 - Ahmet Can Mert

, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
:
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data. 463-500 - Kamil Kluczniak, Leonard Schild

:
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption. 501-537 - Anju Alexander, Annapurna Valiveti

, Srinivas Vivek:
A Faster Third-Order Masking of Lookup Tables. 538-556 - Lejla Batina, Lukasz Chmielewski

, Björn Haase
, Niels Samwel, Peter Schwabe:
SoK: SCA-secure ECC in software - mission impossible? 557-589
Volume 2023, Number 2, 2023
- Zitai Chen

, David F. Oswald
:
PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: A Modern Example of Halt and Catch Fire. 1-23 - Trevor Yap

, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. 24-53 - Itamar Levi, Carmit Hazay:

Garbled Circuits from an SCA Perspective Free XOR can be Quite Expensive. . . 54-79 - Aymeric Genêt:

On Protecting SPHINCS+ Against Fault Attacks. 80-114 - Takanori Isobe, Ryoma Ito

, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba
:
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. 115-154 - John Gaspoz

, Siemen Dhooghe
:
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms. 155-179 - Jean-Sébastien Coron

, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. 180-211 - Keerthi K., Chester Rebeiro:

FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software. 212-240 - Rei Ueno, Naofumi Homma:

How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? 241-269 - Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang, Jianwei Liu:

Some New Methods to Generate Short Addition Chains. 270-285 - Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu:

Efficient Private Circuits with Precomputation. 286-309 - Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli:

Conditional Variational AutoEncoder based on Stochastic Attacks. 310-357 - Guiwen Luo, Shihui Fu, Guang Gong:

Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs. 358-380 - Shuqin Su, Bohan Yang, Vladimir Rozic, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu:

A Closer Look at the Chaotic Ring Oscillators based TRNG Design. 381-417 - Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay:

Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond. 418-446 - Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay:

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. 447-481 - Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos

, François-Xavier Standaert:
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks. 482-518 - Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:

Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. 519-542 - David Spielmann

, Ognjen Glamocanin, Mirjana Stojilovic:
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks. 543-567 - Luyao Xu, Zhengyi Dai, Baofeng Wu

, Dongdai Lin:
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. 568-586 - Shubhi Shukla, Manaar Alam

, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay:
"Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks. 587-613
Volume 2023, Number 3, 2023
- Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer

:
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. 1-29 - Christoph Dobraunig

, Lorenzo Grassi
, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Pasta: A Case for Hybrid Homomorphic Encryption. 30-73 - Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal:

Enabling FrodoKEM on Embedded Devices. 74-96 - Alex Biryukov

, Baptiste Lambin, Aleksei Udovenko
:
Cryptanalysis of ARX-based White-box Implementations. 97-135 - Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo

, Thomas Johansson
:
Cache-Timing Attack Against HQC. 136-163 - José Bacelar Almeida

, Manuel Barbosa
, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet
, Tiago Oliveira
, Hugo Pacheco
, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub:
Formally verifying Kyber Episode IV: Implementation correctness. 164-193 - Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen:

cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs. 194-220 - Thomas Aulbach, Fabio Campos

, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
:
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV. 221-245 - Kittiphon Phalakarn

, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan:
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling. 246-269 - Gaëtan Cassiers, Henri Devillez, François-Xavier Standaert, Balazs Udvarhelyi:

Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations. 270-293 - Kai Schoos, Sergej Meschkov

, Mehdi B. Tahoori, Dennis R. E. Gnad
:
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution. 294-320 - Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang:

Oil and Vinegar: Modern Parameters and Implementations. 321-365 - Aikata, Andrea Basso, Gaëtan Cassiers, Ahmet Can Mert

, Sujoy Sinha Roy
:
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography. 366-390 - Jannik Zeitschner, Nicolai Müller, Amir Moradi

:
PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries. 391-421 - Marvin Staib, Amir Moradi

:
Deep Learning Side-Channel Collision Attack. 422-444 - Patrick Longa:

Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings. 445-472 - Yutaro Tanaka, Rei Ueno, Keita Xagawa

, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. 473-503 - Gautam Botrel, Youssef El Housni:

Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs. 504-521 - Loïc Masure, Gaëtan Cassiers, Julien M. Hendrickx, François-Xavier Standaert:

Information Bounds and Convergence Rates for Side-Channel Security Evaluators. 522-569 - Zehong (Zephyr) Qiu, Fan Zhang:

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers. 570-596
Volume 2023, Number 4, 2023
- Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:

Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. 1-31 - Robin Geelen

, Michiel Van Beirendonck
, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios D. Dimou, Ingrid Verbauwhede
, Frederik Vercauteren, David W. Archer:
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption. 32-57 - Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal:

Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations. 58-79 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
MMM: Authenticated Encryption with Minimum Secret State for Masking. 80-109 - Jean-Sébastien Coron

, François Gérard, Matthias Trannoy, Rina Zeitoun:
Improved Gadgets for the High-Order Masking of Dilithium. 110-145 - Alexander May, Carl Richard Theodor Schneider

:
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards. 146-166 - Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai

:
On Provable White-Box Security in the Strong Incompressibility Model. 167-187 - Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud

, David Vigilant:
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach. 188-210 - Viktor Fischer, Florent Bernard, Nathalie Bochard, Quentin Dallison, Maciej Skórski

:
Enhancing Quality and Security of the PLL-TRNG. 211-237 - Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik:

Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis. 238-261 - Mohamed ElGhamrawy

, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal:
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium. 262-286 - Julius Hermelink, Erik Mårtensson

, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek:
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. 287-317 - Alex Charlès

, Aleksei Udovenko
:
LPN-based Attacks in the White-box Setting. 318-343 - Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao:

Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD. 344-366 - Vincent Quentin Ulitzsch, Soundes Marzougui, Alexis Bagia

, Mehdi Tibouchi, Jean-Pierre Seifert:
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP. 367-392 - Yu Dai, Fangguo Zhang

, Chang-An Zhao:
Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees. 393-419 - Francesco Berti, Sebastian Faust, Maximilian Orlt:

Provable Secure Parallel Gadgets. 420-459 - Nicolas Costes, Martijn Stam:

Pincering SKINNY by Exploiting Slow Diffusion Enhancing Differential Power Analysis with Cluster Graph Inference. 460-492 - Yufeng Tang

, Zheng Gong, Bin Li, Liangju Zhao:
Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations. 493-522

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














