


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2024
Volume 2024, Number 1, 2024
- Georg Land

, Adrian Marotzke
, Jan Richter-Brockmann
, Tim Güneysu
:
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware. 1-26 - Anna Guinet

, Georg Land
, Ioan Gabriel Bucur, Tim Güneysu
:
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps. 27-50 - Darshana Jayasinghe, Brian Udugama, Sri Parameswaran

:
1LUTSensor: Detecting FPGA Voltage Fluctuations using LookUp Tables. 51-86 - Amin Abdulrahman

, Hanno Becker, Matthias J. Kannwischer, Fabien Klein:
Fast and Clean: Auditable high-performance assembly via constraint solving. 87-132 - Haruka Hirata

, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova
, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. 133-156 - Amund Askeland, Svetla Nikova

, Ventzislav Nikov:
Who Watches the Watchers: Attacking Glitch Detection Circuits. 157-179 - Luca Wilke

, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth
:
SEV-Step A Single-Stepping Framework for AMD-SEV. 180-206 - Florent Bernard, Arturo Mollinedo Garay, Patrick Haddad, Nathalie Bochard, Viktor Fischer:

Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment. 207-228 - Siemen Dhooghe

, Artemii Ovchinnikov
, Dilara Toprakhisar
:
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations. 229-263 - Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. 264-308 - Barbara Gigerl, Franz Klug, Stefan Mangard

, Florian Mendel
, Robert Primas:
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. 309-335 - Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay:

EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. 336-374 - Santiago Arranz-Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet

, Tiago Oliveira
, Peter Schwabe:
High-assurance zeroization. 375-397 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:

Quasi-linear masking against SCA and FIA, with cost amortization. 398-432 - Vedad Hadzic, Gaëtan Cassiers, Robert Primas, Stefan Mangard

, Roderick Bloem:
Quantile: Quantifying Information Leakage. 433-456 - Florian Sieck, Zhiyuan Zhang

, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth
, Yuval Yarom:
TeeJam: Sub-Cache-Line Leakages Strike Back. 457-500 - Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay:

CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs. 501-526 - Anisha Mukherjee

, Aikata, Ahmet Can Mert
, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
:
ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials and Limitations. 527-562 - Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang:

Faster Bootstrapping via Modulus Raising and Composite NTT. 563-591 - Shihe Ma

, Tairong Huang, Anyu Wang
, Qixian Zhou, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. 592-616
Volume 2024, Number 2, 2024
- Junhao Huang

, Alexandre Adomnicai, Jipeng Zhang
, Wangchen Dai
, Yao Liu
, Ray C. C. Cheung
, Çetin Kaya Koç, Donglong Chen:
Revisiting Keccak and Dilithium Implementations on ARMv7-M. 1-24 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian

, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 25-63 - Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau:

Single trace HQC shared key recovery with SASCA. 64-87 - Marc Schink, Alexander Wagner

, Felix Oberhansl
, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein:
Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks. 88-129 - Zewen Ye

, Ruibing Song
, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung
, Kejie Huang:
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications. 130-153 - Ivan Gavrilan, Felix Oberhansl

, Alexander Wagner
, Emanuele Strieder, Andreas Zankl:
Impeccable Keccak Towards Fault Resilient SPHINCS+ Implementations. 154-189 - Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju:

High-Performance Hardware Implementation of MPCitH and Picnic3. 190-214 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:

SDitH in Hardware. 215-251 - Ward Beullens, Fabio Campos

, Sofía Celi
, Basil Hess, Matthias J. Kannwischer:
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4. 252-275 - Keng-Yu Chen

, Jiun-Peng Chen:
Masking Floating-Point Number Multiplication and Addition of Falcon First- and Higher-order Implementations and Evaluations. 276-303 - Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier A. Verbel, Floyd Zweydinger:

MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head. 304-328 - Hao Cheng, Daniel Page

, Weijia Wang:
eLIMInate: a Leakage-focused ISE for Masked Implementation. 329-358 - Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy

, Joost Renes, Tobias Schneider:
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium. 359-383 - Mathieu Des Noes:

Distribution of Signal to Noise Ratio and Application to Leakage Detection. 384-402 - Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke:

Efficient ASIC Architecture for Low Latency Classic McEliece Decoding. 403-425 - Maik Ender, Felix Hahn

, Marc Fyrbiak, Amir Moradi, Christof Paar:
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing. 426-450 - Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao

, Jiafeng Xie
:
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption. 451-480 - Subhadeep Banik, Francesco Regazzoni:

Compact Circuits for Efficient Möbius Transform. 481-521 - Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He:

Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm. 522-544 - Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa

, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. 545-587 - Darius Mercadier, Viet Sang Nguyen

, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 588-629 - Jiangxue Liu, Cankun Zhao

, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 630-653 - Hetian Shi

, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu:
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays. 654-676 - Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu:

UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication. 677-713 - Petr Svenda, Antonín Dufka

, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil:
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips. 714-734 - Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:

Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. 735-768 - Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler

:
High-Performance Design Patterns and File Formats for Side-Channel Analysis. 769-794 - Prasanna Ravi, Thales B. Paiva

, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber. 795-818 - Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang:

SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning. 819-843 - Suparna Kundu

, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. 844-869 - Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez:

Impact of the Flicker Noise on the Ring Oscillator-based TRNGs. 870-889
Volume 2024, Number 3, 2024
- Alex Charlès, Aleksei Udovenko:

White-box filtering attacks breaking SEL masking: from exponential to polynomial time. 1-24 - Jung Hee Cheon, Hyeongmin Choe

, Julien Devevey, Tim Güneysu
, Dongyeon Hong, Markus Krausz
, Georg Land
, Marc Möller, Damien Stehlé, MinJune Yi:
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. 25-75 - Nicolai Müller, Daniel Lammers, Amir Moradi

:
A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL. 76-98 - Tengfei Wang, Chi Zhang, Xiaolin Zhang, Dawu Gu, Pei Cao:

Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA. 99-135 - Nicolai Müller, Amir Moradi

:
Automated Generation of Fault-Resistant Circuits. 136-173 - Elisabeth Krahmer

, Peter Pessl, Georg Land
, Tim Güneysu
:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. 174-199 - Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:

Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. 200-223 - Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang

:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. 224-248 - Dilip Kumar S. V.

, Siemen Dhooghe
, Josep Balasch
, Benedikt Gierlichs, Ingrid Verbauwhede
:
Time Sharing - A Novel Approach to Low-Latency Masking. 249-272 - Juelin Zhang, Taoyun Wang, Yiteng Sun, Fanjie Ji, Bohan Wang

, Lu Li, Yu Yu, Weijia Wang:
Efficient Table-Based Masking with Pre-processing. 273-301 - Nicolas Bon, David Pointcheval, Matthieu Rivain:

Optimized Homomorphic Evaluation of Boolean Functions. 302-341 - Jannik Zeitschner, Amir Moradi

:
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software. 342-376 - Oren Ganon, Itamar Levi:

CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors. 377-417 - Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou:

Faster NTRU-based Bootstrapping in less than 4 ms. 418-451 - Laurent Castelnovi, Agathe Houzelot:

On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings. 452-471 - Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang:

Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning. 472-499 - Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard

, Charles Momin, Rishub Nagpal:
Compress: Generate Small and Fast Masked Pipelined Circuits. 500-529 - Benqiang Wei, Xianhui Lu, Ruida Wang, Kun Liu, Zhihao Li, Kunpeng Wang:

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE. 530-573 - Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:

1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. 574-602 - Gaëtan Cassiers, François-Xavier Standaert, Corentin Verhamme:

Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon. 603-633 - Yufeng Tang

, Zheng Gong, Liangju Zhao, Di Li, Zhe Liu:
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications. 634-670 - Paula Arnold, Sebastian Berndt, Thomas Eisenbarth

, Maximilian Orlt:
Polynomial sharings on two secrets: Buy one, get one free. 671-706
Volume 2024, Number 4, 2024
- Huiyu Tan, Pengfei Gao, Fu Song, Taolue Chen, Zhilin Wu:

SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits. 1-39 - Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu:

SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning. 40-83 - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:

Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices. 84-109 - Johannes Haring, Vedad Hadzic, Roderick Bloem:

Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches. 110-132 - Felix Uhle

, Florian Stolz
, Amir Moradi
:
Another Evidence to not Employ Customized Masked Hardware Identifying and Fixing Flaws in SCARV. 133-155 - Morgane Guerreau, Mélissa Rossi:

A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme. 156-178 - Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard

:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. 179-204 - Leonard Schild

, Aysajan Abidin, Bart Preneel:
Fast Transciphering Via Batched And Reconfigurable LUT Evaluation. 205-230 - Cankun Zhao

, Hang Zhao, Jiangxue Liu, Bohan Yang, Wenping Zhu, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu:
Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3 Advancing from the 4x Area Era to the 3x Area Era. 231-257 - Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:

Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. 258-284 - Adriaan Peetermans, Ingrid Verbauwhede

:
TRNG Entropy Model in the Presence of Flicker FM Noise. 285-306 - Jakob Feldtkeller

, Jan Richter-Brockmann
, Pascal Sasdrich
, Tim Güneysu
:
Combined Threshold Implementation. 307-334 - Jean-Sébastien Coron

, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. 335-354 - Jan Jancar

, Vojtech Suchanek, Petr Svenda, Vladimir Sedlacek
, Lukasz Chmielewski:
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis. 355-381 - Colin O'Flynn:

Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements. 382-424 - Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:

Switching Off your Device Does Not Protect Against Fault Attacks. 425-450 - Nicolai Müller

, Amir Moradi
:
Robust but Relaxed Probing Model. 451-482 - Emre Karabulut, Aydin Aysu:

Masking FALCON's Floating-Point Multiplication in Hardware. 483-508 - Bijan Fadaeinia

, Thorben Moos
, Amir Moradi
:
Static Leakage in Dual-Rail Precharge Logics. 509-540 - Tuba Kiyan, Lars Renkes

, Xhani Marvin Saß, Antonio Saavedra
, Norbert Herfurth, Elham Amini, Jean-Pierre Seifert:
Through the Looking-Glass: Sensitive Data Extraction by Optical Probing of Scan Chains. 541-568 - Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:

Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks. 569-609 - Zhenyuan Liu, Dillibabu Shanmugam, Patrick Schaumont

:
FaultDetective Explainable to a Fault, from the Design Layout to the Software. 610-632 - Johannes Mono, Kamil Kluczniak, Tim Güneysu

:
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes. 633-656 - Vahid Jahandideh, Bart Mennink, Lejla Batina:

An Algebraic Approach for Evaluating Random Probing Security With Application to AES. 657-689 - Thorben Moos, Sayandeep Saha, François-Xavier Standaert:

Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. 690-736 - Reza Rezaeian Farashahi, Mojtaba Fadavi, Soheila Sabbaghian:

Faster Complete Addition Laws for Montgomery Curves. 737-762

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














