Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2022, Issue 4
Volume 2022, Issue 4
Published:
2022-08-31
Articles
When Bad News Become Good News
Towards Usable Instances of Learning with Physical Errors
Davide Bellizia, Clément Hoffmann, Dina Kamel, Pierrick Méaux, François-Xavier Standaert
1-24
PDF
Attacks Against White-Box ECDSA and Discussion of Countermeasures
A Report on the WhibOx Contest 2021
Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
25-55
PDF
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Pascal Nasahl, Miguel Osorio, Pirmin Vogel, Michael Schaffner, Timothy Trippel, Dominic Rizzo, Stefan Mangard
56-87
PDF
An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining
Adriaan Peetermans, Ingrid Verbauwhede
88-109
PDF
Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM
Thales B. Paiva, Routo Terada
110-134
PDF
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme
135-162
PDF
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion
Kavya Sreedhar, Mark Horowitz, Christopher Torng
163-187
PDF
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
188-227
PDF
Perceived Information Revisited
New Metrics to Evaluate Success Rate of Side-Channel Attacks
Akira Ito, Rei Ueno, Naofumi Homma
228-254
PDF
VERICA - Verification of Combined Attacks
Automated formal verification of security against simultaneous information leakage and tampering
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
255-284
PDF
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber
Yanbin Li, Jiajie Zhu, Yuxin Huang, Zhe Liu, Ming Tang
285-310
PDF
PROLEAD
A Probing-Based Hardware Leakage Detection Tool
Nicolai Müller, Amir Moradi
311-348
PDF
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
349-371
PDF
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
372-396
PDF
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis
A Report on the CHES Challenge Side-Channel Contest 2020
Aron Gohr, Friederike Laus, Werner Schindler
397-437
PDF
PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors
Anomadarshi Barua, Mohammad Abdullah Al Faruque
438-462
PDF
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers
Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne Burleson, Takeshi Sugawara
463-489
PDF
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation
Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma
490-526
PDF
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge
Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
527-552
PDF
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit
with Application to Lattice-Based KEMs
Olivier Bronchain, Gaëtan Cassiers
553-588
PDF
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
589-613
PDF
Improved Plantard Arithmetic for Lattice-based Cryptography
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
614-636
PDF
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Jeroen Delvaux
637-660
PDF
SoK: Fully Homomorphic Encryption over the [Discretized] Torus
Marc Joye
661-692
PDF
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
693-717
PDF
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU
Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
718-750
PDF
SoC Root Canal!
Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs
Pantea Kiaei, Patrick Schaumont
751-773
PDF
Side-Channel Expectation-Maximization Attacks
Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul
774-799
PDF
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
Qian Guo, Andreas Johansson, Thomas Johansson
800-827
PDF
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
Guilherme Perin, Lichao Wu, Stjepan Picek
828-861
PDF
On the application of Two-Photon Absorption for Laser Fault Injection attacks
Pushing the physical boundaries for Laser-based Fault Injection
Bodo Selmke, Maximilian Pollanka, Andreas Duensing, Emanuele Strieder, Hayden Wen, Michael Mittermair, Reinhard Kienberger, Georg Sigl
862-885
PDF
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
Anca Rădulescu, Pantelimon G. Popescu, Marios O. Choudary
886-905
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.