Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2020, Issue 2
Volume 2020, Issue 2
Published:
2020-03-02
Articles
Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain, François-Xavier Standaert
1-25
PDF
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery
Ziyue Zhang, A. Adam Ding, Yunsi Fei
26-48
PDF
Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT
Neng Zhang, Bohan Yang, Chen Chen, Shouyi Yin, Shaojun Wei, Leibo Liu
49-72
PDF
FENL: an ISE to mitigate analogue micro-architectural leakage
Si Gao, Ben Marshall, Dan Page, Thinh Pham
73-98
PDF
Dismantling DST80-based Immobiliser Systems
Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
99-127
PDF
Efficient and Private Computations with Code-Based Masking
Weijia Wang, Pierrick Méaux, Gaëtan Cassiers, François-Xavier Standaert
128-171
PDF
Persistent Fault Attack in Practice
Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu , Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren
172-195
PDF
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya, Billy Bob Brumley
196-221
PDF
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
222-244
PDF
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
245-271
PDF
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers
Keerthi K, Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia
272-299
PDF
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson
300-326
PDF
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
327-357
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.