Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2021, Issue 2
Volume 2021, Issue 2
Published:
2021-02-23
Articles
Machine Learning of Physical Unclonable Functions using Helper Data
Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder, Christoph Frisch, Michael Pehl
1-36
PDF
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl, Lukas Prokop
37-60
PDF
Artifacts
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
61-105
PDF
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
106-135
PDF
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry
Gaëtan Cassiers, François-Xavier Standaert
136-158
PDF
NTT Multiplication for NTT-unfriendly Rings
New Speed Records for Saber and NTRU on Cortex-M4 and AVX2
Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
159-188
PDF
Artifacts
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
189-228
PDF
Artifacts
Revisiting the functional bootstrap in TFHE
Antonio Guimarães, Edson Borin, Diego F. Aranha
229-253
PDF
Time-Memory Analysis of Parallel Collision Search Algorithms
Monika Trimoska, Sorina Ionica, Gilles Dequen
254-274
PDF
Artifacts
RASSLE: Return Address Stack based Side-channel LEakage
Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay
275-303
PDF
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
304-327
PDF
A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA
Yufei Xing, Shuguo Li
328-356
PDF
Combining Optimization Objectives: New Modeling Attacks on Strong PUFs
Johannes Tobisch, Anita Aghaie, Georg T. Becker
357-389
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.