Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2022, Issue 2
Volume 2022, Issue 2
Published:
2022-02-15
Articles
High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
1-40
PDF
Highly Vectorized SIKE for AVX-512
Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan
41-68
PDF
Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)
Yaacov Belenky, Vadim Bugaenko, Leonid Azriel, Hennadii Chernyshchyk, Ira Dushar, Oleg Karavaev, Oleh Maksimenko, Yulia Ruda, Valery Teper, Yury Kreimer
69-91
PDF
Towards a Formal Treatment of Logic Locking
Peter Beerel, Marios Georgiou, Ben Hamlin, Alex J. Malozemoff, Pierluigi Nuzzo
92-114
PDF
Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography
Jan-Pieter D’Anvers, Daniel Heinz, Peter Pessl, Michiel Van Beirendonck, Ingrid Verbauwhede
115-139
PDF
Bitslice Masking and Improved Shuffling:
How and When to Mix Them in Software?
Melissa Azouaoui, Olivier Bronchain, Vincent Grosso, Kostas Papagiannopoulos, François-Xavier Standaert
140-165
PDF
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery
Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier, Shivam Bhasin
166-191
PDF
ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption
Antonio de la Piedra, Marloes Venema, Greg Alpár
192-239
PDF
BAT: Small and Fast KEM over NTRU Lattices
Pierre-Alain Fouque, Paul Kirchner, Thomas Pornin, Yang Yu
240-265
PDF
Transitional Leakage in Theory and Practice
Unveiling Security Flaws in Masked Circuits
Nicolai Müller, David Knichel, Pascal Sasdrich, Amir Moradi
266-288
PDF
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers
Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao
289-311
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.