default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023
Volume 2023, Number 1, 2023
- Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu:
Risky Translations: Securing TLBs against Timing Side Channels. 1-31 - Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert:
Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking. 32-59 - Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme:
Adapting Belief Propagation to Counter Shuffling of NTTs. 60-88 - Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang:
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber. 89-112 - Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi:
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions. 113-152 - Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun:
High-order Polynomial Comparison and Masking Lattice-based Encryption. 153-192 - Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham:
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography. 193-237 - Sonia Belaïd, Matthieu Rivain:
High Order Side-Channel Security for Elliptic-Curve Implementations. 238-276 - Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert:
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations. 277-300 - Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik:
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection. 301-325 - Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh:
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions. 326-368 - Yufeng Tang, Zheng Gong, Jinhai Chen, Nanjiang Xie:
Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures. 369-400 - Rabin Yu Acharya, Fatemeh Ganji, Domenic Forte:
Information Theory-based Evolution of Neural Networks for Side-channel Analysis. 401-437 - Danyang Zhu, Rongrong Zhang, Lun Ou, Jing Tian, Zhongfeng Wang:
Low-Latency Design and Implementation of the Squaring in Class Groups for Verifiable Delay Function Using Redundant Representation. 438-462 - Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy:
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data. 463-500 - Kamil Kluczniak, Leonard Schild:
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption. 501-537 - Anju Alexander, Annapurna Valiveti, Srinivas Vivek:
A Faster Third-Order Masking of Lookup Tables. 538-556 - Lejla Batina, Lukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe:
SoK: SCA-secure ECC in software - mission impossible? 557-589
Volume 2023, Number 2, 2023
- Zitai Chen, David F. Oswald:
PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: A Modern Example of Halt and Catch Fire. 1-23 - Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin:
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis. 24-53 - Itamar Levi, Carmit Hazay:
Garbled Circuits from an SCA Perspective Free XOR can be Quite Expensive. . . 54-79 - Aymeric Genêt:
On Protecting SPHINCS+ Against Fault Attacks. 80-114 - Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. 115-154 - John Gaspoz, Siemen Dhooghe:
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms. 155-179 - Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
High-order masking of NTRU. 180-211 - Keerthi K., Chester Rebeiro:
FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software. 212-240 - Rei Ueno, Naofumi Homma:
How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? 241-269 - Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang, Jianwei Liu:
Some New Methods to Generate Short Addition Chains. 270-285 - Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu:
Efficient Private Circuits with Precomputation. 286-309 - Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli:
Conditional Variational AutoEncoder based on Stochastic Attacks. 310-357 - Guiwen Luo, Shihui Fu, Guang Gong:
Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs. 358-380 - Shuqin Su, Bohan Yang, Vladimir Rozic, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu:
A Closer Look at the Chaotic Ring Oscillators based TRNG Design. 381-417 - Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay:
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond. 418-446 - Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay:
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. 447-481 - Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, François-Xavier Standaert:
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks. 482-518 - Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. 519-542 - David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic:
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks. 543-567 - Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin:
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. 568-586 - Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay:
"Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks. 587-613
Volume 2023, Number 3, 2023
- Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer:
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. 1-29 - Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch:
Pasta: A Case for Hybrid Homomorphic Encryption. 30-73 - Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal:
Enabling FrodoKEM on Embedded Devices. 74-96 - Alex Biryukov, Baptiste Lambin, Aleksei Udovenko:
Cryptanalysis of ARX-based White-box Implementations. 97-135 - Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson:
Cache-Timing Attack Against HQC. 136-163 - José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub:
Formally verifying Kyber Episode IV: Implementation correctness. 164-193 - Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen:
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs. 194-220 - Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV. 221-245 - Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan:
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling. 246-269 - Gaëtan Cassiers, Henri Devillez, François-Xavier Standaert, Balazs Udvarhelyi:
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations. 270-293 - Kai Schoos, Sergej Meschkov, Mehdi B. Tahoori, Dennis R. E. Gnad:
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution. 294-320 - Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang:
Oil and Vinegar: Modern Parameters and Implementations. 321-365 - Aikata, Andrea Basso, Gaëtan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy:
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography. 366-390 - Jannik Zeitschner, Nicolai Müller, Amir Moradi:
PROLEAD_SW Probing-Based Software Leakage Detection for ARM Binaries. 391-421 - Marvin Staib, Amir Moradi:
Deep Learning Side-Channel Collision Attack. 422-444 - Patrick Longa:
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings. 445-472 - Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma:
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs. 473-503 - Gautam Botrel, Youssef El Housni:
Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs. 504-521 - Loïc Masure, Gaëtan Cassiers, Julien M. Hendrickx, François-Xavier Standaert:
Information Bounds and Convergence Rates for Side-Channel Security Evaluators. 522-569 - Zehong (Zephyr) Qiu, Fan Zhang:
RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers. 570-596
Volume 2023, Number 4, 2023
- Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. 1-31 - Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios D. Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer:
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption. 32-57 - Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal:
Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations. 58-79 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
MMM: Authenticated Encryption with Minimum Secret State for Masking. 80-109 - Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun:
Improved Gadgets for the High-Order Masking of Dilithium. 110-145 - Alexander May, Carl Richard Theodor Schneider:
Dlog is Practically as Hard (or Easy) as DH - Solving Dlogs via DH Oracles on EC Standards. 146-166 - Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai:
On Provable White-Box Security in the Strong Incompressibility Model. 167-187 - Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant:
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach. 188-210 - Viktor Fischer, Florent Bernard, Nathalie Bochard, Quentin Dallison, Maciej Skórski:
Enhancing Quality and Security of the PLL-TRNG. 211-237 - Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat-Safa, Shahin Tajik:
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis. 238-261 - Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal:
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium. 262-286 - Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek:
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. 287-317 - Alex Charlès, Aleksei Udovenko:
LPN-based Attacks in the White-box Setting. 318-343 - Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao:
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD. 344-366 - Vincent Quentin Ulitzsch, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, Jean-Pierre Seifert:
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP. 367-392 - Yu Dai, Fangguo Zhang, Chang-An Zhao:
Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees. 393-419 - Francesco Berti, Sebastian Faust, Maximilian Orlt:
Provable Secure Parallel Gadgets. 420-459 - Nicolas Costes, Martijn Stam:
Pincering SKINNY by Exploiting Slow Diffusion Enhancing Differential Power Analysis with Cluster Graph Inference. 460-492 - Yufeng Tang, Zheng Gong, Bin Li, Liangju Zhao:
Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations. 493-522
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.