


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2021
Volume 2021, Number 1, 2021
- Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels

:
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4. 1-24 - Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli:

Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis. 25-55 - Jan Van den Herrewegen, David F. Oswald

, Flavio D. Garcia, Qais Temeiza:
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. 56-81 - Max Hoffmann

, Christof Paar:
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging. 82-108 - Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen

, Claire Wolf:
The design of scalar AES Instruction Set Extensions for RISC-V. 109-136 - Joppe W. Bos, Andreas Hülsing

, Joost Renes
, Christine van Vredendaal:
Rapidly Verifiable XMSS Signatures. 137-168 - Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:

DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers. 169-191 - Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski:

Fault Injection as an Oscilloscope: Fault Correlation Analysis. 192-216 - Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang:

Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4. 217-238 - Fatih Balli, Andrea Caforio, Subhadeep Banik

:
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits. 239-278 - Benjamin Hettwer, Sebastien Leger, Daniel Fennes, Stefan Gehrer, Tim Güneysu

:
Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine. 279-304 - Aein Rezaei Shahmirzadi

, Amir Moradi
:
Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness. 305-342 - Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. 343-372 - Sébastien Duval

, Pierrick Méaux
, Charles Momin, François-Xavier Standaert:
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying. 373-401 - Alexandre Adomnicai, Thomas Peyrin

:
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V. 402-425 - Nicolas Costes, Martijn Stam:

Redundant Code-based Masking Revisited. 426-450 - Gustavo Banegas

, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange:
Concrete quantum cryptanalysis of binary elliptic curves. 451-472
Volume 2021, Number 2, 2021
- Emanuele Strieder

, Christoph Frisch, Michael Pehl:
Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the Fuzzy Commitment Scheme. 1-36 - Peter Pessl, Lukas Prokop:

Fault Attacks on CCA-secure Lattice KEMs. 37-60 - Okan Seker, Thomas Eisenbarth

, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. 61-105 - Aysajan Abidin

, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée
, Christian Bachmann
:
Secure, Accurate, and Practical Narrow-Band Ranging System. 106-135 - Gaëtan Cassiers, François-Xavier Standaert:

Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry. 136-158 - Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang:

NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2. 159-188 - Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth:

Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification. 189-228 - Antonio Guimarães

, Edson Borin, Diego F. Aranha
:
Revisiting the functional bootstrap in TFHE. 229-253 - Monika Trimoska, Sorina Ionica, Gilles Dequen:

Time-Memory Analysis of Parallel Collision Search Algorithms. 254-274 - Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam

, Sikhar Patranabis, Debdeep Mukhopadhyay:
RASSLE: Return Address Stack based Side-channel LEakage. 275-303 - Aein Rezaei Shahmirzadi

, Dusan Bozilov, Amir Moradi
:
New First-Order Secure AES Performance Records. 304-327 - Yufei Xing, Shuguo Li:

A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA. 328-356 - Johannes Tobisch, Anita Aghaie, Georg T. Becker:

Combining Optimization Objectives: New Modeling Attacks on Strong PUFs. 357-389
Volume 2021, Number 3, 2021
- Milad Bahadori

, Kimmo Järvinen, Tilen Marc, Miha Stopar:
Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware. 1-27 - Alejandro Cabrera Aldaya

, Billy Bob Brumley
:
Online Template Attacks: Revisited. 28-59 - Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:

Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms -. 60-96 - Ming-Shing Chen, Tung Chou, Markus Krausz

:
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4. 97-124 - Ming-Shing Chen, Tung Chou:

Classic McEliece on the ARM Cortex-M4. 125-148 - Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino:

Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices. 149-175 - Marc Schink, Alexander Wagner

, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. 176-201 - Olivier Bronchain, François-Xavier Standaert:

Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter. 202-234 - Xiangjun Lu, Chi Zhang, Pei Cao

, Dawu Gu, Haining Lu:
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks. 235-274 - Michiel Van Beirendonck

, Jan-Pieter D'Anvers, Ingrid Verbauwhede
:
Analysis and Comparison of Table-based Arithmetic to Boolean Masking. 275-297 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara

:
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. 298-333 - Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck

:
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. 334-359 - Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen

, Mihai Ordean
, Flavio D. Garcia:
Cutting Through the Complexity of Reverse Engineering Embedded Devices. 360-389 - Davide Bellizia

, Clément Hoffmann
, Dina Kamel, Hanlin Liu, Pierrick Méaux
, François-Xavier Standaert, Yu Yu:
Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype. 390-417 - Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu:

Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. 418-440 - Tuan La

, Khoa Dang Pham, Joseph Powell
, Dirk Koch
:
Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense. 441-464 - Wei Cheng

, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. 465-495 - Oleksiy Lisovets

, David Knichel, Thorben Moos
, Amir Moradi
:
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. 496-519 - Anita Aghaie, Amir Moradi

:
Inconsistency of Simulation and Practice in Delay-based Strong PUFs. 520-551 - Thorben Moos

, Felix Wegener, Amir Moradi
:
DL-LA: Deep Learning Leakage Assessment A modern roadmap for SCA evaluations. 552-598 - Dahmun Goudarzi, Thomas Prest

, Matthieu Rivain, Damien Vergnaud
:
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. 599-640 - Olivier Bronchain, Charles Momin, Thomas Peters, François-Xavier Standaert:

Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors. 641-676 - Jorai Rijsdijk

, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. 677-707 - Aein Rezaei Shahmirzadi

, Amir Moradi
:
Second-Order SCA Security with almost no Fresh Randomness. 708-755 - Deepika Natarajan, Wei Dai

:
SEAL-Embedded: A Homomorphic Encryption Library for the Internet of Things. 756-779 - Thorben Moos

, Amir Moradi
:
Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -. 780-805
Volume 2021, Number 4, 2021
- Sunghyun Jin

, Sangyub Lee
, Sung Min Cho, HeeSeok Kim
, Seokhie Hong:
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries. 1-26 - Pei Cao

, Chi Zhang, Xiangjun Lu, Dawu Gu:
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. 27-56 - Claude Carlet, Sylvain Guilley, Sihem Mesnager:

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. 57-87 - Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder

, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. 88-113 - Wonkyung Jung, Sangpyo Kim

, Jung Ho Ahn
, Jung Hee Cheon, Younho Lee
:
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. 114-148 - Lennert Wouters, Benedikt Gierlichs, Bart Preneel:

My other car is your car: compromising the Tesla Model X keyless entry system. 149-172 - Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:

Masking Kyber: First- and Higher-Order Implementations. 173-214 - Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus

, Leonel Sousa:
ROTed: Random Oblivious Transfer for embedded devices. 215-238 - Diego F. Aranha

, Sebastian Berndt, Thomas Eisenbarth
, Okan Seker, Akira Takahashi
, Luca Wilke
, Greg Zaverucha
:
Side-Channel Protections for Picnic Signatures. 239-282 - Si Gao

, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham
, Francesco Regazzoni
:
An Instruction Set Extension to Support Software-Based Masking. 283-325 - Jingdian Ming, Huizhong Li

, Yongbin Zhou, Wei Cheng, Zehua Qiao:
Revealing the Weakness of Addition Chain Based Masked SBox Implementations. 326-350 - Gustavo Banegas

, Daniel J. Bernstein, Fabio Campos
, Tung Chou, Tanja Lange, Michael Meyer
, Benjamin Smith
, Jana Sotáková
:
CTIDH: faster constant-time CSIDH. 351-387 - Sara Zarei, Aein Rezaei Shahmirzadi

, Hadi Soleimany, Raziyeh Salarifard, Amir Moradi
:
Low-Latency Keccak at any Arbitrary Order. 388-411 - Florian Stolz, Nils Albartus

, Julian Speith
, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu
, Russell Tessier
:
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. 412-446 - Jan Richter-Brockmann

, Aein Rezaei Shahmirzadi
, Pascal Sasdrich
, Amir Moradi
, Tim Güneysu
:
FIVER - Robust Verification of Countermeasures against Fault Injections. 447-473 - Jose Maria Bermudo Mera

, Angshuman Karmakar
, Suparna Kundu
, Ingrid Verbauwhede
:
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms. 474-509 - Gregor Leander

, Thorben Moos
, Amir Moradi
, Shahram Rasoolzadeh
:
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. 510-545 - Annapurna Valiveti

, Srinivas Vivek
:
Higher-Order Lookup Table Masking in Essentially Constant Memory. 546-586 - Yuji Koike, Takanori Isobe:

Yoroi: Updatable Whitebox Cryptography. 587-617 - Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan, Peter B. Rønne

:
Batching CSIDH Group Actions using AVX-512. 618-649 - Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang:

Rainbow on Cortex-M4. 650-675 - Kalle Ngo, Elena Dubrova, Qian Guo

, Thomas Johansson
:
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation. 676-707

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














