Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Publication Ethics
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2023, Issue 1
Volume 2023, Issue 1
Published:
2022-11-29
Articles
Risky Translations: Securing TLBs against Timing Side Channels
Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
1-31
PDF
Don’t Learn What You Already Know
Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking
Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
32-59
PDF
Adapting Belief Propagation to Counter Shuffling of NTTs
Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
60-88
PDF
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
89-112
PDF
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi
113-152
PDF
High-order Polynomial Comparison and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
153-192
PDF
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
193-237
PDF
High Order Side-Channel Security for Elliptic-Curve Implementations
Sonia Belaïd, Matthieu Rivain
238-276
PDF
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
Giovanni Camurati, Matteo Dell’Amico, François-Xavier Standaert
277-300
PDF
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection
Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
301-325
PDF
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
326-368
PDF
Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures
Yufeng Tang, Zheng Gong, Jinhai Chen, Nanjiang Xie
369-400
PDF
Information Theory-based Evolution of Neural Networks for Side-channel Analysis
Rabin Y. Acharya, Fatemeh Ganji, Domenic Forte
401-437
PDF
Low-Latency Design and Implementation of the Squaring in Class Groups for Verifiable Delay Function Using Redundant Representation
Danyang Zhu, Rongrong Zhang, Lun Ou, Jing Tian, Zhongfeng Wang
438-462
PDF
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
463-500
PDF
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Kamil Kluczniak, Leonard Schild
501-537
PDF
A Faster Third-Order Masking of Lookup Tables
Anju Alexander, Annapurna Valiveti, Srinivas Vivek
538-556
PDF
SoK: SCA-secure ECC in software – mission impossible?
Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
557-589
PDF
iacr-logo
Usage Statistics Information
We log anonymous usage statistics. Please read the
privacy information
for details.