Nothing Special »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2023, Issue 2
Volume 2023, Issue 2
Published:
2023-03-06
Articles
PMFault: Faulting and Bricking Server CPUs through Management Interfaces
Or: A Modern Example of Halt and Catch Fire
Zitai Chen, David Oswald
1-23
PDF
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
24-53
PDF
Garbled Circuits from an SCA Perspective
Free XOR can be Quite Expensive. . .
Itamar Levi, Carmit Hazay
54-79
PDF
On Protecting SPHINCS+ Against Fault Attacks
Aymeric Genêt
80-114
PDF
Artifacts
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input
Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba
115-154
PDF
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
John Gaspoz, Siemen Dhooghe
155-179
PDF
High-order masking of NTRU
Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
180-211
PDF
FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software
Keerthi K, Chester Rebeiro
212-240
PDF
How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?
Rei Ueno, Naofumi Homma
241-269
PDF
Some New Methods to Generate Short Addition Chains
Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang, Jianwei Liu
270-285
PDF
Efficient Private Circuits with Precomputation
Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu
286-309
PDF
Conditional Variational AutoEncoder based on Stochastic Attacks
Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
310-357
PDF
Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs
Guiwen Luo, Shihui Fu, Guang Gong
358-380
PDF
Artifacts
A Closer Look at the Chaotic Ring Oscillators based TRNG Design
Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
381-417
PDF
Artifacts
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond
Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D’Anvers, Shivam Bhasin, Anupam Chattopadhyay
418-446
PDF
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
447-481
PDF
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, François-Xavier Standaert
482-518
PDF
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts
Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo
519-542
PDF
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
David Spielmann, Ognjen Glamočanin, Mirjana Stojilović
543-567
PDF
Artifacts
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate
Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin
568-586
PDF
“Whispering MLaaS”
Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks
Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay
587-613
PDF
Artifacts
iacr-logo