Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2020, Issue 4
Volume 2020, Issue 4
Published:
2020-08-26
Articles
A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords
Zhendong Zhang, Peng Liu
1-23
PDF
On the spectral features of robust probing security
Maria Chiara Molteni, Vittorio Zaccaria
24-48
PDF
Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis?
Breaking multiple layers of side-channel countermeasures
Anh-Tuan Hoang, Neil Hanley, Maire O’Neill
49-85
PDF
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs
Rei Ueno, Kohei Kazumori, Naofumi Homma
86-128
PDF
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti, Srinivas Vivek
129-153
PDF
Improving the Performance of the Picnic Signature Scheme
Daniel Kales, Greg Zaverucha
154-188
PDF
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
189-208
PDF
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
209-238
PDF
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
239-280
PDF
Minerva: The curse of ECDSA nonces
Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
281-308
PDF
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
309-336
PDF
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis
Guilherme Perin, Łukasz Chmielewski, Stjepan Picek
337-364
PDF
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
365-388
PDF
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu, Stjepan Picek
389-415
PDF
Unrolled Cryptography on Silicon
A Physical Security Analysis
Thorben Moos
416-442
PDF
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy, Andrea Basso
443-466
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.