default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2020
Volume 2020, Number 1, 2020
- Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Methodology for Efficient CNN Architectures in Profiling Attacks. 1-36 - Lauren De Meyer:
Recovering the CTR_DRBG state in 256 traces. 37-65 - Yusuke Naito, Takeshi Sugawara:
Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers. 66-94 - Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim:
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers. 95-122 - Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang:
Power Analysis on NTRU Prime. 123-151 - Si Gao, Ben Marshall, Dan Page, Elisabeth Oswald:
Share-slicing: Friend or Foe? 152-174 - Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme. 175-202 - Quan Quan Tan, Thomas Peyrin:
Improved Heuristics for Short Linear Programs. 203-230 - Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom, Yuanjing Zhao:
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung. 231-255 - Francesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
TEDT, a Leakage-Resist AEAD Mode for High Physical Security Applications. 256-320 - Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, Mingshu Li:
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX. 321-347 - Loïc Masure, Cécile Dumas, Emmanuel Prouff:
A Comprehensive Study of Deep Learning for Side-Channel Analysis. 348-375
Volume 2020, Number 2, 2020
- Olivier Bronchain, François-Xavier Standaert:
Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations. 1-25 - Ziyue Zhang, A. Adam Ding, Yunsi Fei:
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery. 26-48 - Neng Zhang, Bohan Yang, Chen Chen, Shouyi Yin, Shaojun Wei, Leibo Liu:
Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT. 49-72 - Si Gao, Ben Marshall, Dan Page, Thinh Hung Pham:
FENL: an ISE to mitigate analogue micro-architectural leakage. 73-98 - Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David F. Oswald, Benedikt Gierlichs, Bart Preneel:
Dismantling DST80-based Immobiliser Systems. 99-127 - Weijia Wang, Pierrick Méaux, Gaëtan Cassiers, François-Xavier Standaert:
Efficient and Private Computations with Code-Based Masking. 128-171 - Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. 172-195 - Alejandro Cabrera Aldaya, Billy Bob Brumley:
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA. 196-221 - Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede:
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography. 222-244 - Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. 245-271 - Keerthi K., Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia:
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers. 272-299 - Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson:
Low-Latency Hardware Masking with Application to AES. 300-326 - Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels:
On the Security Goals of White-Box Cryptography. 327-357
Volume 2020, Number 3, 2020
- Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi:
Strengthening Sequential Side-Channel Attacks Through Change Detection. 1-21 - Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst A. Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler:
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule. 22-72 - Jiajia Zhang, Mengce Zheng, Jiehui Nan, Honggang Hu, Nenghai Yu:
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data. 73-96 - Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair:
Splitting the Interpose PUF: A Novel Modeling Attack Strategy. 97-120 - Jonas Krautter, Dennis Gnad, Mehdi Baradaran Tahoori:
CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design. 121-146 - Lennert Wouters, Victor Arribas, Benedikt Gierlichs, Bart Preneel:
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks. 147-168 - Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar:
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms. 169-195 - Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10. 196-218 - Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri:
ISA Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on RISC-V. 219-242 - Matthias J. Kannwischer, Peter Pessl, Robert Primas:
Single-Trace Attacks on Keccak. 243-268 - Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. 269-306 - Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin:
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs. 307-335 - Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard:
Cortex-M4 optimizations for {R, M} LWE schemes. 336-357 - Giovanni Camurati, Aurélien Francillon, François-Xavier Standaert:
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks. 358-401 - Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin:
Fixslicing: A New GIFT Representation Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M. 402-427 - Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley:
From A to Z: Projective coordinates leakage in the wild. 428-453 - Louis Goubin, Matthieu Rivain, Junwei Wang:
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks. 454-482 - Florian Bache, Clara Paglialonga, Tobias Oder, Tobias Schneider, Tim Güneysu:
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs. 483-507 - Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Groß, Florian Mendel, Robert Primas:
Protecting against Statistical Ineffective Fault Attacks. 508-543
Volume 2020, Number 4, 2020
- Zhendong Zhang, Peng Liu:
A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords. 1-23 - Maria Chiara Molteni, Vittorio Zaccaria:
On the spectral features of robust probing security. 24-48 - Anh-Tuan Hoang, Neil Hanley, Máire O'Neill:
Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures. 49-85 - Rei Ueno, Kohei Kazumori, Naofumi Homma:
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs. 86-128 - Annapurna Valiveti, Srinivas Vivek:
Second-Order Masked Lookup Table Compression Scheme. 129-153 - Daniel Kales, Greg Zaverucha:
Improving the Performance of the Picnic Signature Scheme. 154-188 - Mike Hamburg:
Faster Montgomery and double-add ladders for short Weierstrass curves. 189-208 - Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain:
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint. 209-238 - Tim Fritzmann, Georg Sigl, Johanna Sepúlveda:
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography. 239-280 - Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sýs:
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces. 281-308 - Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar:
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering. 309-336 - Guilherme Perin, Lukasz Chmielewski, Stjepan Picek:
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis. 337-364 - Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl:
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers. 365-388 - Lichao Wu, Stjepan Picek:
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders. 389-415 - Thorben Moos:
Unrolled Cryptography on Silicon A Physical Security Analysis. 416-442 - Sujoy Sinha Roy, Andrea Basso:
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware. 443-466
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.