default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2024
Volume 2024, Number 1, 2024
- Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware. 1-26 - Anna Guinet, Georg Land, Ioan Gabriel Bucur, Tim Güneysu:
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps. 27-50 - Darshana Jayasinghe, Brian Udugama, Sri Parameswaran:
1LUTSensor: Detecting FPGA Voltage Fluctuations using LookUp Tables. 51-86 - Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, Fabien Klein:
Fast and Clean: Auditable high-performance assembly via constraint solving. 87-132 - Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. 133-156 - Amund Askeland, Svetla Nikova, Ventzislav Nikov:
Who Watches the Watchers: Attacking Glitch Detection Circuits. 157-179 - Luca Wilke, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth:
SEV-Step A Single-Stepping Framework for AMD-SEV. 180-206 - Florent Bernard, Arturo Mollinedo Garay, Patrick Haddad, Nathalie Bochard, Viktor Fischer:
Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment. 207-228 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations. 229-263 - Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. 264-308 - Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas:
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. 309-335 - Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay:
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. 336-374 - Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe:
High-assurance zeroization. 375-397 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking against SCA and FIA, with cost amortization. 398-432 - Vedad Hadzic, Gaëtan Cassiers, Robert Primas, Stefan Mangard, Roderick Bloem:
Quantile: Quantifying Information Leakage. 433-456 - Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, Yuval Yarom:
TeeJam: Sub-Cache-Line Leakages Strike Back. 457-500 - Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay:
CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs. 501-526 - Anisha Mukherjee, Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy:
ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials and Limitations. 527-562 - Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang:
Faster Bootstrapping via Modulus Raising and Composite NTT. 563-591 - Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. 592-616
Volume 2024, Number 2, 2024
- Junhao Huang, Alexandre Adomnicai, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Revisiting Keccak and Dilithium Implementations on ARMv7-M. 1-24 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 25-63 - Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau:
Single trace HQC shared key recovery with SASCA. 64-87 - Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein:
Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks. 88-129 - Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang:
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications. 130-153 - Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl:
Impeccable Keccak Towards Fault Resilient SPHINCS+ Implementations. 154-189 - Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju:
High-Performance Hardware Implementation of MPCitH and Picnic3. 190-214 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. 215-251 - Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer:
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4. 252-275 - Keng-Yu Chen, Jiun-Peng Chen:
Masking Floating-Point Number Multiplication and Addition of Falcon First- and Higher-order Implementations and Evaluations. 276-303 - Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier A. Verbel, Floyd Zweydinger:
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head. 304-328 - Hao Cheng, Daniel Page, Weijia Wang:
eLIMInate: a Leakage-focused ISE for Masked Implementation. 329-358 - Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider:
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium. 359-383 - Mathieu Des Noes:
Distribution of Signal to Noise Ratio and Application to Leakage Detection. 384-402 - Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke:
Efficient ASIC Architecture for Low Latency Classic McEliece Decoding. 403-425 - Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar:
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing. 426-450 - Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie:
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption. 451-480 - Subhadeep Banik, Francesco Regazzoni:
Compact Circuits for Efficient Möbius Transform. 481-521 - Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He:
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm. 522-544 - Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. 545-587 - Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 588-629 - Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 630-653 - Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu:
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays. 654-676 - Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu:
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication. 677-713 - Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil:
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips. 714-734 - Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. 735-768 - Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler:
High-Performance Design Patterns and File Formats for Side-Channel Analysis. 769-794 - Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber. 795-818 - Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang:
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning. 819-843 - Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. 844-869 - Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez:
Impact of the Flicker Noise on the Ring Oscillator-based TRNGs. 870-889
Volume 2024, Number 3, 2024
- Alex Charlès, Aleksei Udovenko:
White-box filtering attacks breaking SEL masking: from exponential to polynomial time. 1-24 - Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi:
HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures. 25-75 - Nicolai Müller, Daniel Lammers, Amir Moradi:
A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL. 76-98 - Tengfei Wang, Chi Zhang, Xiaolin Zhang, Dawu Gu, Pei Cao:
Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA. 99-135 - Nicolai Müller, Amir Moradi:
Automated Generation of Fault-Resistant Circuits. 136-173 - Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu:
Correction Fault Attacks on Randomized CRYSTALS-Dilithium. 174-199 - Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. 200-223 - Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. 224-248 - Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Time Sharing - A Novel Approach to Low-Latency Masking. 249-272 - Juelin Zhang, Taoyun Wang, Yiteng Sun, Fanjie Ji, Bohan Wang, Lu Li, Yu Yu, Weijia Wang:
Efficient Table-Based Masking with Pre-processing. 273-301 - Nicolas Bon, David Pointcheval, Matthieu Rivain:
Optimized Homomorphic Evaluation of Boolean Functions. 302-341 - Jannik Zeitschner, Amir Moradi:
PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software. 342-376 - Oren Ganon, Itamar Levi:
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors. 377-417 - Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou:
Faster NTRU-based Bootstrapping in less than 4 ms. 418-451 - Laurent Castelnovi, Agathe Houzelot:
On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings. 452-471 - Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang:
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning. 472-499 - Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, Rishub Nagpal:
Compress: Generate Small and Fast Masked Pipelined Circuits. 500-529 - Benqiang Wei, Xianhui Lu, Ruida Wang, Kun Liu, Zhihao Li, Kunpeng Wang:
Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE. 530-573 - Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji:
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits. 574-602 - Gaëtan Cassiers, François-Xavier Standaert, Corentin Verhamme:
Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon. 603-633 - Yufeng Tang, Zheng Gong, Liangju Zhao, Di Li, Zhe Liu:
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications. 634-670 - Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian Orlt:
Polynomial sharings on two secrets: Buy one, get one free. 671-706
Volume 2024, Number 4, 2024
- Huiyu Tan, Pengfei Gao, Fu Song, Taolue Chen, Zhilin Wu:
SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits. 1-39 - Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu:
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning. 40-83 - Slim Bettaieb, Loïc Bidoux, Alessandro Budroni, Marco Palumbi, Lucas Pandolfo Perin:
Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices. 84-109 - Johannes Haring, Vedad Hadzic, Roderick Bloem:
Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches. 110-132 - Felix Uhle, Florian Stolz, Amir Moradi:
Another Evidence to not Employ Customized Masked Hardware Identifying and Fixing Flaws in SCARV. 133-155 - Morgane Guerreau, Mélissa Rossi:
A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme. 156-178 - Simon Tollec, Vedad Hadzic, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard:
Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults. 179-204 - Leonard Schild, Aysajan Abidin, Bart Preneel:
Fast Transciphering Via Batched And Reconfigurable LUT Evaluation. 205-230 - Cankun Zhao, Hang Zhao, Jiangxue Liu, Bohan Yang, Wenping Zhu, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu:
Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3 Advancing from the 4x Area Era to the 3x Area Era. 231-257 - Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou:
Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs. 258-284 - Adriaan Peetermans, Ingrid Verbauwhede:
TRNG Entropy Model in the Presence of Flicker FM Noise. 285-306 - Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu:
Combined Threshold Implementation. 307-334 - Jean-Sébastien Coron, François Gérard, Tancrède Lepoint, Matthias Trannoy, Rina Zeitoun:
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium. 335-354 - Jan Jancar, Vojtech Suchanek, Petr Svenda, Vladimir Sedlacek, Lukasz Chmielewski:
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis. 355-381 - Colin O'Flynn:
Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements. 382-424 - Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso:
Switching Off your Device Does Not Protect Against Fault Attacks. 425-450 - Nicolai Müller, Amir Moradi:
Robust but Relaxed Probing Model. 451-482 - Emre Karabulut, Aydin Aysu:
Masking FALCON's Floating-Point Multiplication in Hardware. 483-508 - Bijan Fadaeinia, Thorben Moos, Amir Moradi:
Static Leakage in Dual-Rail Precharge Logics. 509-540 - Tuba Kiyan, Lars Renkes, Xhani Marvin Saß, Antonio Saavedra, Norbert Herfurth, Elham Amini, Jean-Pierre Seifert:
Through the Looking-Glass: Sensitive Data Extraction by Optical Probing of Scan Chains. 541-568 - Dev M. Mehta, Mohammad Hashemi, David Selasi Koblah, Domenic Forte, Fatemeh Ganji:
Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks. 569-609 - Zhenyuan Liu, Dillibabu Shanmugam, Patrick Schaumont:
FaultDetective Explainable to a Fault, from the Design Layout to the Software. 610-632 - Johannes Mono, Kamil Kluczniak, Tim Güneysu:
Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes. 633-656 - Vahid Jahandideh, Bart Mennink, Lejla Batina:
An Algebraic Approach for Evaluating Random Probing Security With Application to AES. 657-689 - Thorben Moos, Sayandeep Saha, François-Xavier Standaert:
Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks. 690-736 - Reza Rezaeian Farashahi, Mojtaba Fadavi, Soheila Sabbaghian:
Faster Complete Addition Laws for Montgomery Curves. 737-762
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.