default search action
Search dblp for Publications
export results for "stream:conf/ches:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/tches/AbdulrahmanBKK24, author = {Amin Abdulrahman and Hanno Becker and Matthias J. Kannwischer and Fabien Klein}, title = {Fast and Clean: Auditable high-performance assembly via constraint solving}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {87--132}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.87-132}, doi = {10.46586/TCHES.V2024.I1.87-132}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AbdulrahmanBKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AdjBBERSVZ24, author = {Gora Adj and Stefano Barbero and Emanuele Bellini and Andre Esser and Luis Rivera{-}Zamarripa and Carlo Sanna and Javier A. Verbel and Floyd Zweydinger}, title = {MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {304--328}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.304-328}, doi = {10.46586/TCHES.V2024.I2.304-328}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AdjBBERSVZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AnandBCIILMRS24, author = {Ravi Anand and Subhadeep Banik and Andrea Caforio and Tatsuya Ishikawa and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Mostafizar Rahman and Kosei Sakamoto}, title = {Gleeok: {A} Family of Low-Latency PRFs and its Applications to Authenticated Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {545--587}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.545-587}, doi = {10.46586/TCHES.V2024.I2.545-587}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AnandBCIILMRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ArnoldBEO24, author = {Paula Arnold and Sebastian Berndt and Thomas Eisenbarth and Maximilian Orlt}, title = {Polynomial sharings on two secrets: Buy one, get one free}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {671--706}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.671-706}, doi = {10.46586/TCHES.V2024.I3.671-706}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ArnoldBEO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AskelandNN24, author = {Amund Askeland and Svetla Nikova and Ventzislav Nikov}, title = {Who Watches the Watchers: Attacking Glitch Detection Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {157--179}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.157-179}, doi = {10.46586/TCHES.V2024.I1.157-179}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AskelandNN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BanikR24, author = {Subhadeep Banik and Francesco Regazzoni}, title = {Compact Circuits for Efficient M{\"{o}}bius Transform}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {481--521}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.481-521}, doi = {10.46586/TCHES.V2024.I2.481-521}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BanikR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeneaCFPW24, author = {Licinius Benea and Mikael Carmona and Viktor Fischer and Florian Pebay{-}Peyroula and Romain Wacquez}, title = {Impact of the Flicker Noise on the Ring Oscillator-based TRNGs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {870--889}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.870-889}, doi = {10.46586/TCHES.V2024.I2.870-889}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeneaCFPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BernardGHBF24, author = {Florent Bernard and Arturo Mollinedo Garay and Patrick Haddad and Nathalie Bochard and Viktor Fischer}, title = {Low Cost and Precise Jitter Measurement Method for {TRNG} Entropy Assessment}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {207--228}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.207-228}, doi = {10.46586/TCHES.V2024.I1.207-228}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BernardGHBF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BettaiebBBPP24, author = {Slim Bettaieb and Lo{\"{\i}}c Bidoux and Alessandro Budroni and Marco Palumbi and Lucas Pandolfo Perin}, title = {Enabling {PERK} and other MPC-in-the-Head Signatures on Resource-Constrained Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {84--109}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.84-109}, doi = {10.46586/TCHES.V2024.I4.84-109}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BettaiebBBPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeullensCCHK24, author = {Ward Beullens and Fabio Campos and Sof{\'{\i}}a Celi and Basil Hess and Matthias J. Kannwischer}, title = {Nibbling {MAYO:} Optimized Implementations for {AVX2} and Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {252--275}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.252-275}, doi = {10.46586/TCHES.V2024.I2.252-275}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeullensCCHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BonPR24, author = {Nicolas Bon and David Pointcheval and Matthieu Rivain}, title = {Optimized Homomorphic Evaluation of Boolean Functions}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {302--341}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.302-341}, doi = {10.46586/TCHES.V2024.I3.302-341}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BonPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BoslandEBI24, author = {Jonah Bosland and Stefan Ene and Peter Baumgartner and Vincent Immler}, title = {High-Performance Design Patterns and File Formats for Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {769--794}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.769-794}, doi = {10.46586/TCHES.V2024.I2.769-794}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BoslandEBI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainAERS24, author = {Olivier Bronchain and Melissa Azouaoui and Mohamed ElGhamrawy and Joost Renes and Tobias Schneider}, title = {Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {359--383}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.359-383}, doi = {10.46586/TCHES.V2024.I2.359-383}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainAERS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BurszteinIKMPZ24, author = {Elie Bursztein and Luca Invernizzi and Karel Kr{\'{a}}l and Daniel Moghimi and Jean{-}Michel Picod and Marina Zhang}, title = {Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {472--499}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.472-499}, doi = {10.46586/TCHES.V2024.I3.472-499}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BurszteinIKMPZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarletDGT24, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and C{\'{e}}dric Tavernier}, title = {Quasi-linear masking against {SCA} and FIA, with cost amortization}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {398--432}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.398-432}, doi = {10.46586/TCHES.V2024.I1.398-432}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CarletDGT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersGMMN24, author = {Ga{\"{e}}tan Cassiers and Barbara Gigerl and Stefan Mangard and Charles Momin and Rishub Nagpal}, title = {Compress: Generate Small and Fast Masked Pipelined Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {500--529}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.500-529}, doi = {10.46586/TCHES.V2024.I3.500-529}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersGMMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersSV24, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert and Corentin Verhamme}, title = {Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {603--633}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.603-633}, doi = {10.46586/TCHES.V2024.I3.603-633}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CastelnoviH24, author = {Laurent Castelnovi and Agathe Houzelot}, title = {On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {452--471}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.452-471}, doi = {10.46586/TCHES.V2024.I3.452-471}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CastelnoviH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CharlesU24, author = {Alex Charl{\`{e}}s and Aleksei Udovenko}, title = {White-box filtering attacks breaking {SEL} masking: from exponential to polynomial time}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {1--24}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.1-24}, doi = {10.46586/TCHES.V2024.I3.1-24}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CharlesU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenC24, author = {Keng{-}Yu Chen and Jiun{-}Peng Chen}, title = {Masking Floating-Point Number Multiplication and Addition of Falcon First- and Higher-order Implementations and Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {276--303}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.276-303}, doi = {10.46586/TCHES.V2024.I2.276-303}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenPDLH24, author = {Yutian Chen and Cong Peng and Yu Dai and Min Luo and Debiao He}, title = {Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {522--544}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.522-544}, doi = {10.46586/TCHES.V2024.I2.522-544}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenPDLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenYZLYYZWL24, author = {Xiangren Chen and Bohan Yang and Jianfeng Zhu and Jun Liu and Shuying Yin and Guang Yang and Min Zhu and Shaojun Wei and Leibo Liu}, title = {UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {677--713}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.677-713}, doi = {10.46586/TCHES.V2024.I2.677-713}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenYZLYYZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengCGMMYZ24, author = {Shing Hing William Cheng and Chitchanok Chuengsatiansup and Daniel Genkin and Dallas McNeil and Toby Murray and Yuval Yarom and Zhiyuan Zhang}, title = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {224--248}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.224-248}, doi = {10.46586/TCHES.V2024.I3.224-248}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengCGMMYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengPW24, author = {Hao Cheng and Daniel Page and Weijia Wang}, title = {eLIMInate: a Leakage-focused {ISE} for Masked Implementation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {329--358}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.329-358}, doi = {10.46586/TCHES.V2024.I2.329-358}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CheonCDGHKLMSY24, author = {Jung Hee Cheon and Hyeongmin Choe and Julien Devevey and Tim G{\"{u}}neysu and Dongyeon Hong and Markus Krausz and Georg Land and Marc M{\"{o}}ller and Damien Stehl{\'{e}} and MinJune Yi}, title = {{HAETAE:} Shorter Lattice-Based Fiat-Shamir Signatures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {25--75}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.25-75}, doi = {10.46586/TCHES.V2024.I3.25-75}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CheonCDGHKLMSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CoronGLTZ24, author = {Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois G{\'{e}}rard and Tancr{\`{e}}de Lepoint and Matthias Trannoy and Rina Zeitoun}, title = {Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {335--354}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.335-354}, doi = {10.46586/TCHES.V2024.I4.335-354}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CoronGLTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DeshpandeHSY24, author = {Sanjay Deshpande and James Howe and Jakub Szefer and Dongze Yue}, title = {SDitH in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {215--251}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.215-251}, doi = {10.46586/TCHES.V2024.I2.215-251}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DeshpandeHSY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DhoogheOT24, author = {Siemen Dhooghe and Artemii Ovchinnikov and Dilara Toprakhisar}, title = {StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {229--263}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.229-263}, doi = {10.46586/TCHES.V2024.I1.229-263}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DhoogheOT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/EnderHFMP24, author = {Maik Ender and Felix Hahn and Marc Fyrbiak and Amir Moradi and Christof Paar}, title = {JustSTART: How to Find an {RSA} Authentication Bypass on Xilinx UltraScale(+) with Fuzzing}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {426--450}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.426-450}, doi = {10.46586/TCHES.V2024.I2.426-450}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/EnderHFMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ErataXPS24, author = {Ferhat Erata and Chuanqi Xu and Ruzica Piskac and Jakub Szefer}, title = {Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {735--768}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.735-768}, doi = {10.46586/TCHES.V2024.I2.735-768}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ErataXPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FadaeiniaMM24, author = {Bijan Fadaeinia and Thorben Moos and Amir Moradi}, title = {Static Leakage in Dual-Rail Precharge Logics}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {509--540}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.509-540}, doi = {10.46586/TCHES.V2024.I4.509-540}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FadaeiniaMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FallnichLZG24, author = {Daniel Fallnich and Christian Lanius and Shutao Zhang and Tobias Gemmeke}, title = {Efficient {ASIC} Architecture for Low Latency Classic McEliece Decoding}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {403--425}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.403-425}, doi = {10.46586/TCHES.V2024.I2.403-425}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FallnichLZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FarashahiFS24, author = {Reza Rezaeian Farashahi and Mojtaba Fadavi and Soheila Sabbaghian}, title = {Faster Complete Addition Laws for Montgomery Curves}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {737--762}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.737-762}, doi = {10.46586/TCHES.V2024.I4.737-762}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FarashahiFS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FeldtkellerRSG24, author = {Jakob Feldtkeller and Jan Richter{-}Brockmann and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Combined Threshold Implementation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {307--334}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.307-334}, doi = {10.46586/TCHES.V2024.I4.307-334}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FeldtkellerRSG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GanonL24, author = {Oren Ganon and Itamar Levi}, title = {CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {377--417}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.377-417}, doi = {10.46586/TCHES.V2024.I3.377-417}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GanonL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GavrilanOWSZ24, author = {Ivan Gavrilan and Felix Oberhansl and Alexander Wagner and Emanuele Strieder and Andreas Zankl}, title = {Impeccable Keccak Towards Fault Resilient {SPHINCS+} Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {154--189}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.154-189}, doi = {10.46586/TCHES.V2024.I2.154-189}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GavrilanOWSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GigerlKMMP24, author = {Barbara Gigerl and Franz Klug and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Smooth Passage with the Guards: Second-Order Hardware Masking of the {AES} with Low Randomness and Low Latency}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {309--335}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.309-335}, doi = {10.46586/TCHES.V2024.I1.309-335}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GigerlKMMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GoyMGL24, author = {Guillaume Goy and Julien Maillard and Philippe Gaborit and Antoine Loiseau}, title = {Single trace {HQC} shared key recovery with {SASCA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {64--87}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.64-87}, doi = {10.46586/TCHES.V2024.I2.64-87}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GoyMGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GrandammeTBDCG24, author = {Paul Grandamme and Pierre{-}Antoine Tissot and Lilian Bossuet and Jean{-}Max Dutertre and Brice Colombier and Vincent Grosso}, title = {Switching Off your Device Does Not Protect Against Fault Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {425--450}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.425-450}, doi = {10.46586/TCHES.V2024.I4.425-450}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GrandammeTBDCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuerreauR24, author = {Morgane Guerreau and M{\'{e}}lissa Rossi}, title = {A Not So Discrete Sampler: Power Analysis Attacks on {HAWK} signature scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {156--178}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.156-178}, doi = {10.46586/TCHES.V2024.I4.156-178}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuerreauR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuinetLBG24, author = {Anna Guinet and Georg Land and Ioan Gabriel Bucur and Tim G{\"{u}}neysu}, title = {A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {27--50}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.27-50}, doi = {10.46586/TCHES.V2024.I1.27-50}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuinetLBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HadzicCPMB24, author = {Vedad Hadzic and Ga{\"{e}}tan Cassiers and Robert Primas and Stefan Mangard and Roderick Bloem}, title = {Quantile: Quantifying Information Leakage}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {433--456}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.433-456}, doi = {10.46586/TCHES.V2024.I1.433-456}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HadzicCPMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HajraCM24, author = {Suvadeep Hajra and Siddhartha Chowdhury and Debdeep Mukhopadhyay}, title = {EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {336--374}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.336-374}, doi = {10.46586/TCHES.V2024.I1.336-374}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HajraCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HaringHB24, author = {Johannes Haring and Vedad Hadzic and Roderick Bloem}, title = {Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {110--132}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.110-132}, doi = {10.46586/TCHES.V2024.I4.110-132}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HaringHB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HeMKBX24, author = {Pengzhou He and Samira Carolina Oliva Madrigal and {\c{C}}etin Kaya Ko{\c{c}} and Tianyou Bao and Jiafeng Xie}, title = {{CASA:} {A} Compact and Scalable Accelerator for Approximate Homomorphic Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {451--480}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.451-480}, doi = {10.46586/TCHES.V2024.I2.451-480}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HeMKBX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HirataMALMNS24, author = {Haruka Hirata and Daiki Miyahara and Victor Arribas and Yang Li and Noriyuki Miura and Svetla Nikova and Kazuo Sakiyama}, title = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection M{\&}M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {133--156}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.133-156}, doi = {10.46586/TCHES.V2024.I1.133-156}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HirataMALMNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuangAZDLCKC24, author = {Junhao Huang and Alexandre Adomnicai and Jipeng Zhang and Wangchen Dai and Yao Liu and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Revisiting Keccak and Dilithium Implementations on ARMv7-M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {1--24}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.1-24}, doi = {10.46586/TCHES.V2024.I2.1-24}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HuangAZDLCKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JahandidehMB24, author = {Vahid Jahandideh and Bart Mennink and Lejla Batina}, title = {An Algebraic Approach for Evaluating Random Probing Security With Application to {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {657--689}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.657-689}, doi = {10.46586/TCHES.V2024.I4.657-689}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JahandidehMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JancarSSSC24, author = {Jan Jancar and Vojtech Suchanek and Petr Svenda and Vladimir Sedlacek and Lukasz Chmielewski}, title = {pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {355--381}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.355-381}, doi = {10.46586/TCHES.V2024.I4.355-381}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JancarSSSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JayasingheUP24, author = {Darshana Jayasinghe and Brian Udugama and Sri Parameswaran}, title = {1LUTSensor: Detecting {FPGA} Voltage Fluctuations using LookUp Tables}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {51--86}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.51-86}, doi = {10.46586/TCHES.V2024.I1.51-86}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JayasingheUP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KarabulutA24, author = {Emre Karabulut and Aydin Aysu}, title = {Masking FALCON's Floating-Point Multiplication in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {483--508}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.483-508}, doi = {10.46586/TCHES.V2024.I4.483-508}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KarabulutA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KiyanRSSHAS24, author = {Tuba Kiyan and Lars Renkes and Xhani Marvin Sa{\ss} and Antonio Saavedra and Norbert Herfurth and Elham Amini and Jean{-}Pierre Seifert}, title = {Through the Looking-Glass: Sensitive Data Extraction by Optical Probing of Scan Chains}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {541--568}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.541-568}, doi = {10.46586/TCHES.V2024.I4.541-568}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KiyanRSSHAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KrahmerPLG24, author = {Elisabeth Krahmer and Peter Pessl and Georg Land and Tim G{\"{u}}neysu}, title = {Correction Fault Attacks on Randomized CRYSTALS-Dilithium}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {174--199}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.174-199}, doi = {10.46586/TCHES.V2024.I3.174-199}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KrahmerPLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KunduCSKMV24, author = {Suparna Kundu and Siddhartha Chowdhury and Sayandeep Saha and Angshuman Karmakar and Debdeep Mukhopadhyay and Ingrid Verbauwhede}, title = {Carry Your Fault: {A} Fault Propagation Attack on Side-Channel Protected LWE-based {KEM}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {844--869}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.844-869}, doi = {10.46586/TCHES.V2024.I2.844-869}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KunduCSKMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LandMRG24, author = {Georg Land and Adrian Marotzke and Jan Richter{-}Brockmann and Tim G{\"{u}}neysu}, title = {Gadget-based Masking of Streamlined {NTRU} Prime Decapsulation in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {1--26}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.1-26}, doi = {10.46586/TCHES.V2024.I1.1-26}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LandMRG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiLLWWCW24, author = {Zhihao Li and Ying Liu and Xianhui Lu and Ruida Wang and Benqiang Wei and Chunling Chen and Kunpeng Wang}, title = {Faster Bootstrapping via Modulus Raising and Composite {NTT}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {563--591}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.563-591}, doi = {10.46586/TCHES.V2024.I1.563-591}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiLLWWCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiLWWLZZWH24, author = {Zhihao Li and Xianhui Lu and Zhiwei Wang and Ruida Wang and Ying Liu and Yinhang Zheng and Lutan Zhao and Kunpeng Wang and Rui Hou}, title = {Faster NTRU-based Bootstrapping in less than 4 ms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {418--451}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.418-451}, doi = {10.46586/TCHES.V2024.I3.418-451}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiLWWLZZWH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiangJWCGLZ24, author = {Ziyuan Liang and Qi'ao Jin and Zhiyong Wang and Zhaohui Chen and Zhen Gu and Yanheng Lu and Fan Zhang}, title = {{SHAPER:} {A} General Architecture for Privacy-Preserving Primitives in Secure Machine Learning}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {819--843}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.819-843}, doi = {10.46586/TCHES.V2024.I2.819-843}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiangJWCGLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiuJWJ24, author = {Guoxiao Liu and Keting Jia and Puwen Wei and Lei Ju}, title = {High-Performance Hardware Implementation of MPCitH and Picnic3}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {190--214}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.190-214}, doi = {10.46586/TCHES.V2024.I2.190-214}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiuJWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiuSS24, author = {Zhenyuan Liu and Dillibabu Shanmugam and Patrick Schaumont}, title = {FaultDetective Explainable to a Fault, from the Design Layout to the Software}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {610--632}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.610-632}, doi = {10.46586/TCHES.V2024.I4.610-632}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiuSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiuZPYZHZWL24, author = {Jiangxue Liu and Cankun Zhao and Shuohang Peng and Bohan Yang and Hang Zhao and Xiangdong Han and Min Zhu and Shaojun Wei and Leibo Liu}, title = {A Low-Latency High-Order Arithmetic to Boolean Masking Conversion}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {630--653}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.630-653}, doi = {10.46586/TCHES.V2024.I2.630-653}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiuZPYZHZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MaHWZW24, author = {Shihe Ma and Tairong Huang and Anyu Wang and Qixian Zhou and Xiaoyun Wang}, title = {Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {592--616}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.592-616}, doi = {10.46586/TCHES.V2024.I1.592-616}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MaHWZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MehtaHFTG24, author = {Dev M. Mehta and Mohammad Hashemi and Domenic Forte and Shahin Tajik and Fatemeh Ganji}, title = {1/0 Shades of {UC:} Photonic Side-Channel Analysis of Universal Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {574--602}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.574-602}, doi = {10.46586/TCHES.V2024.I3.574-602}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MehtaHFTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MehtaHKFG24, author = {Dev M. Mehta and Mohammad Hashemi and David Selasi Koblah and Domenic Forte and Fatemeh Ganji}, title = {Bake It Till You Make It Heat-induced Power Leakage from Masked Neural Networks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {569--609}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.569-609}, doi = {10.46586/TCHES.V2024.I4.569-609}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MehtaHKFG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MercadierNRU24, author = {Darius Mercadier and Viet Sang Nguyen and Matthieu Rivain and Aleksei Udovenko}, title = {{OBSCURE:} Versatile Software Obfuscation from a Lightweight Secure Element}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {588--629}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.588-629}, doi = {10.46586/TCHES.V2024.I2.588-629}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MercadierNRU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MishraPMCRM24, author = {Nimish Mishra and Kuheli Pratihar and Satota Mandal and Anirban Chakraborty and Ulrich R{\"{u}}hrmair and Debdeep Mukhopadhyay}, title = {CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {501--526}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.501-526}, doi = {10.46586/TCHES.V2024.I1.501-526}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MishraPMCRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MonoKG24, author = {Johannes Mono and Kamil Kluczniak and Tim G{\"{u}}neysu}, title = {Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {633--656}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.633-656}, doi = {10.46586/TCHES.V2024.I4.633-656}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MonoKG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoosSS24, author = {Thorben Moos and Sayandeep Saha and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {690--736}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.690-736}, doi = {10.46586/TCHES.V2024.I4.690-736}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MoosSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MukherjeeAMLKDR24, author = {Anisha Mukherjee and Aikata and Ahmet Can Mert and Yongwoo Lee and Sunmin Kwon and Maxim Deryabin and Sujoy Sinha Roy}, title = {ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials and Limitations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {527--562}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.527-562}, doi = {10.46586/TCHES.V2024.I1.527-562}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MukherjeeAMLKDR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MullerLM24, author = {Nicolai M{\"{u}}ller and Daniel Lammers and Amir Moradi}, title = {A Deep Analysis of two Glitch-Free Hardware Masking Schemes {SESYM} and {LMDPL}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {76--98}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.76-98}, doi = {10.46586/TCHES.V2024.I3.76-98}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MullerLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MullerM24, author = {Nicolai M{\"{u}}ller and Amir Moradi}, title = {Automated Generation of Fault-Resistant Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {136--173}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.136-173}, doi = {10.46586/TCHES.V2024.I3.136-173}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MullerM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MullerM24a, author = {Nicolai M{\"{u}}ller and Amir Moradi}, title = {Robust but Relaxed Probing Model}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {451--482}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.451-482}, doi = {10.46586/TCHES.V2024.I4.451-482}, timestamp = {Thu, 03 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MullerM24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Noes24, author = {Mathieu Des Noes}, title = {Distribution of Signal to Noise Ratio and Application to Leakage Detection}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {384--402}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.384-402}, doi = {10.46586/TCHES.V2024.I2.384-402}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Noes24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/OFlynn24, author = {Colin O'Flynn}, title = {Phase Modulation Side Channels: Jittery {JTAG} for On-Chip Voltage Measurements}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {382--424}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.382-424}, doi = {10.46586/TCHES.V2024.I4.382-424}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/OFlynn24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/OlmosBGGLLOS24, author = {Santiago Arranz Olmos and Gilles Barthe and Ruben Gonzalez and Benjamin Gr{\'{e}}goire and Vincent Laporte and Jean{-}Christophe L{\'{e}}chenet and Tiago Oliveira and Peter Schwabe}, title = {High-assurance zeroization}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {375--397}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.375-397}, doi = {10.46586/TCHES.V2024.I1.375-397}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/OlmosBGGLLOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PeetermansV24, author = {Adriaan Peetermans and Ingrid Verbauwhede}, title = {{TRNG} Entropy Model in the Presence of Flicker {FM} Noise}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {285--306}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.285-306}, doi = {10.46586/TCHES.V2024.I4.285-306}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PeetermansV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RaviPJDB24, author = {Prasanna Ravi and Thales Paiva and Dirmanto Jap and Jan{-}Pieter D'Anvers and Shivam Bhasin}, title = {Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption {A} Case Study on Crystals-Kyber}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {795--818}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.795-818}, doi = {10.46586/TCHES.V2024.I2.795-818}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RaviPJDB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SchildAP24, author = {Leonard Schild and Aysajan Abidin and Bart Preneel}, title = {Fast Transciphering Via Batched And Reconfigurable {LUT} Evaluation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {205--230}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.205-230}, doi = {10.46586/TCHES.V2024.I4.205-230}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SchildAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SchinkWOKSFK24, author = {Marc Schink and Alexander Wagner and Felix Oberhansl and Stefan K{\"{o}}ckeis and Emanuele Strieder and Sven Freud and Dominik Klein}, title = {Unlock the Door to my Secrets, but don't Forget to Glitch {A} comprehensive analysis of flash erase suppression attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {88--129}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.88-129}, doi = {10.46586/TCHES.V2024.I2.88-129}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SchinkWOKSFK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShiHWZLL24, author = {Hetian Shi and Yi He and Qing Wang and Jianwei Zhuge and Qi Li and Xin Liu}, title = {Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {654--676}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.654-676}, doi = {10.46586/TCHES.V2024.I2.654-676}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShiHWZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SieckZBCEY24, author = {Florian Sieck and Zhiyuan Zhang and Sebastian Berndt and Chitchanok Chuengsatiansup and Thomas Eisenbarth and Yuval Yarom}, title = {TeeJam: Sub-Cache-Line Leakages Strike Back}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {457--500}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.457-500}, doi = {10.46586/TCHES.V2024.I1.457-500}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SieckZBCEY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SvendaDBLJZP24, author = {Petr Svenda and Antonin Dufka and Milan Broz and Roman Lacko and Tomas Jaros and Daniel Zatovic and Josef Pospisil}, title = {TPMScan: {A} wide-scale study of security-relevant properties of {TPM} 2.0 chips}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {714--734}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.714-734}, doi = {10.46586/TCHES.V2024.I2.714-734}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SvendaDBLJZP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TanGSCW24, author = {Huiyu Tan and Pengfei Gao and Fu Song and Taolue Chen and Zhilin Wu}, title = {SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {1--39}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.1-39}, doi = {10.46586/TCHES.V2024.I4.1-39}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TanGSCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TangGZLL24, author = {Yufeng Tang and Zheng Gong and Liangju Zhao and Di Li and Zhe Liu}, title = {Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {634--670}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.634-670}, doi = {10.46586/TCHES.V2024.I3.634-670}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TangGZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TollecHNABCHJM24, author = {Simon Tollec and Vedad Hadzic and Pascal Nasahl and Mihail Asavoae and Roderick Bloem and Damien Courouss{\'{e}} and Karine Heydemann and Mathieu Jan and Stefan Mangard}, title = {Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {179--204}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.179-204}, doi = {10.46586/TCHES.V2024.I4.179-204}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TollecHNABCHJM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UenoHIM24, author = {Rei Ueno and Naofumi Homma and Akiko Inoue and Kazuhiko Minematsu}, title = {Fallen Sanctuary: {A} Higher-Order and Leakage-Resilient Rekeying Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {264--308}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.264-308}, doi = {10.46586/TCHES.V2024.I1.264-308}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UenoHIM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UhleSM24, author = {Felix Uhle and Florian Stolz and Amir Moradi}, title = {Another Evidence to not Employ Customized Masked Hardware Identifying and Fixing Flaws in {SCARV}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {133--155}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.133-155}, doi = {10.46586/TCHES.V2024.I4.133-155}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UhleSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/VDBGV24, author = {Dilip Kumar S. V. and Siemen Dhooghe and Josep Balasch and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Time Sharing - {A} Novel Approach to Low-Latency Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {249--272}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.249-272}, doi = {10.46586/TCHES.V2024.I3.249-272}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/VDBGV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangDWZWSZ24, author = {Ziyu Wang and Yaoling Ding and An Wang and Yuwei Zhang and Congming Wei and Shaofei Sun and Liehuang Zhu}, title = {{SPA-GPT:} General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {40--83}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.40-83}, doi = {10.46586/TCHES.V2024.I4.40-83}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangDWZWSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangZZGC24, author = {Tengfei Wang and Chi Zhang and Xiaolin Zhang and Dawu Gu and Pei Cao}, title = {Optimized Hardware-Software Co-Design for Kyber and Dilithium on {RISC-V} SoC {FPGA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {99--135}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.99-135}, doi = {10.46586/TCHES.V2024.I3.99-135}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangZZGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WeiLWLLW24, author = {Benqiang Wei and Xianhui Lu and Ruida Wang and Kun Liu and Zhihao Li and Kunpeng Wang}, title = {Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of {TFHE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {530--573}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.530-573}, doi = {10.46586/TCHES.V2024.I3.530-573}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WeiLWLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WilkeWRE24, author = {Luca Wilke and Jan Wichelmann and Anja Rabich and Thomas Eisenbarth}, title = {SEV-Step {A} Single-Stepping Framework for {AMD-SEV}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {180--206}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.180-206}, doi = {10.46586/TCHES.V2024.I1.180-206}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WilkeWRE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/YeSZCCH24, author = {Zewen Ye and Ruibing Song and Hao Zhang and Donglong Chen and Ray Chak{-}Chung Cheung and Kejie Huang}, title = {A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {130--153}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.130-153}, doi = {10.46586/TCHES.V2024.I2.130-153}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/YeSZCCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/YuCYWPW24, author = {Tianrun Yu and Chi Cheng and Zilong Yang and Yingchen Wang and Yanbin Pan and Jian Weng}, title = {Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {200--223}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.200-223}, doi = {10.46586/TCHES.V2024.I3.200-223}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/YuCYWPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZeitschnerM24, author = {Jannik Zeitschner and Amir Moradi}, title = {PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {342--376}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.342-376}, doi = {10.46586/TCHES.V2024.I3.342-376}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZeitschnerM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangWSJWLYW24, author = {Juelin Zhang and Taoyun Wang and Yiteng Sun and Fanjie Ji and Bohan Wang and Lu Li and Yu Yu and Weijia Wang}, title = {Efficient Table-Based Masking with Pre-processing}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {273--301}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.273-301}, doi = {10.46586/TCHES.V2024.I3.273-301}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangWSJWLYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhaoZLYZYZWL24, author = {Cankun Zhao and Hang Zhao and Jiangxue Liu and Bohan Yang and Wenping Zhu and Shuying Yin and Min Zhu and Shaojun Wei and Leibo Liu}, title = {Breaking Ground: {A} New Area Record for Low-Latency First-Order Masked {SHA-3} Advancing from the 4x Area Era to the 3x Area Era}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {231--257}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.231-257}, doi = {10.46586/TCHES.V2024.I4.231-257}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhaoZLYZYZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhouZFWTSBL24, author = {Tian Zhou and Fangyu Zheng and Guang Fan and Lipeng Wan and Wenxu Tang and Yixuan Song and Yi Bian and Jingqiang Lin}, title = {ConvKyber: Unleashing the Power of {AI} Accelerators for Faster Kyber with Novel Iteration-based Approaches}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {25--63}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.25-63}, doi = {10.46586/TCHES.V2024.I2.25-63}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhouZFWTSBL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhuHYDZH24, author = {Xudong Zhu and Haoqi He and Zhengbang Yang and Yi Deng and Lutan Zhao and Rui Hou}, title = {Elastic {MSM:} {A} Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {4}, pages = {258--284}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i4.258-284}, doi = {10.46586/TCHES.V2024.I4.258-284}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhuHYDZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AcharyaGF23, author = {Rabin Yu Acharya and Fatemeh Ganji and Domenic Forte}, title = {Information Theory-based Evolution of Neural Networks for Side-channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {401--437}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.401-437}, doi = {10.46586/TCHES.V2023.I1.401-437}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AcharyaGF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Aikata0CMR23, author = {Aikata and Andrea Basso and Ga{\"{e}}tan Cassiers and Ahmet Can Mert and Sujoy Sinha Roy}, title = {Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {366--390}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.366-390}, doi = {10.46586/TCHES.V2023.I3.366-390}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Aikata0CMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlexanderVV23, author = {Anju Alexander and Annapurna Valiveti and Srinivas Vivek}, title = {A Faster Third-Order Masking of Lookup Tables}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {538--556}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.538-556}, doi = {10.46586/TCHES.V2023.I1.538-556}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlexanderVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlmeidaBBGLL00Q23, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Benjamin Gr{\'{e}}goire and Vincent Laporte and Jean{-}Christophe L{\'{e}}chenet and Tiago Oliveira and Hugo Pacheco and Miguel Quaresma and Peter Schwabe and Antoine S{\'{e}}r{\'{e}} and Pierre{-}Yves Strub}, title = {Formally verifying Kyber Episode {IV:} Implementation correctness}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {164--193}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.164-193}, doi = {10.46586/TCHES.V2023.I3.164-193}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AlmeidaBBGLL00Q23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AulbachCKSS23, author = {Thomas Aulbach and Fabio Campos and Juliane Kr{\"{a}}mer and Simona Samardjiska and Marc St{\"{o}}ttinger}, title = {Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on {UOV}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {221--245}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.221-245}, doi = {10.46586/TCHES.V2023.I3.221-245}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AulbachCKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AzouaouiBCHKRSSSV23, author = {Melissa Azouaoui and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Cl{\'{e}}ment Hoffmann and Yulia Kuzovkova and Joost Renes and Tobias Schneider and Markus Sch{\"{o}}nauer and Fran{\c{c}}ois{-}Xavier Standaert and Christine van Vredendaal}, title = {Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {58--79}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.58-79}, doi = {10.46586/TCHES.V2023.I4.58-79}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AzouaouiBCHKRSSSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BatinaCHSS23, author = {Lejla Batina and Lukasz Chmielewski and Bj{\"{o}}rn Haase and Niels Samwel and Peter Schwabe}, title = {SoK: SCA-secure {ECC} in software - mission impossible?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {557--589}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.557-589}, doi = {10.46586/TCHES.V2023.I1.557-589}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BatinaCHSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelaidR23, author = {Sonia Bela{\"{\i}}d and Matthieu Rivain}, title = {High Order Side-Channel Security for Elliptic-Curve Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {238--276}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.238-276}, doi = {10.46586/TCHES.V2023.I1.238-276}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BelaidR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelenkyDTBKAK23, author = {Yaacov Belenky and Ira Dushar and Valery Teper and Vadim Bugaenko and Oleg Karavaev and Leonid Azriel and Yury Kreimer}, title = {Carry-based Differential Power Analysis {(CDPA)} and its Application to Attacking {HMAC-SHA-2}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {1--29}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.1-29}, doi = {10.46586/TCHES.V2023.I3.1-29}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelenkyDTBKAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelkheyarDDGR23, author = {Yanis Belkheyar and Joan Daemen and Christoph Dobraunig and Santosh Ghosh and Shahram Rasoolzadeh}, title = {BipBip: {A} Low-Latency Tweakable Block Cipher with Small Dimensions}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {326--368}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.326-368}, doi = {10.46586/TCHES.V2023.I1.326-368}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelkheyarDDGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiFO23, author = {Francesco Berti and Sebastian Faust and Maximilian Orlt}, title = {Provable Secure Parallel Gadgets}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {420--459}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.420-459}, doi = {10.46586/TCHES.V2023.I4.420-459}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BertiFO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BerzatiVCMVV23, author = {Alexandre Berzati and Andersson Calle Viera and Maya Chartouny and Steven Madec and Damien Vergnaud and David Vigilant}, title = {Exploiting Intermediate Value Leakage in Dilithium: {A} Template-Based Approach}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {188--210}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.188-210}, doi = {10.46586/TCHES.V2023.I4.188-210}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BerzatiVCMVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeullensCHKPSY23, author = {Ward Beullens and Ming{-}Shing Chen and Shih{-}Hao Hung and Matthias J. Kannwischer and Bo{-}Yuan Peng and Cheng{-}Jhih Shih and Bo{-}Yin Yang}, title = {Oil and Vinegar: Modern Parameters and Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {321--365}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.321-365}, doi = {10.46586/TCHES.V2023.I3.321-365}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeullensCHKPSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BiryukovLU23, author = {Alex Biryukov and Baptiste Lambin and Aleksei Udovenko}, title = {Cryptanalysis of ARX-based White-box Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {97--135}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.97-135}, doi = {10.46586/TCHES.V2023.I3.97-135}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BiryukovLU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BockBL23, author = {Estuardo Alpirez Bock and Chris Brzuska and Russell W. F. Lai}, title = {On Provable White-Box Security in the Strong Incompressibility Model}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {167--187}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.167-187}, doi = {10.46586/TCHES.V2023.I4.167-187}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BockBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BosBCRVV23, author = {Joppe W. Bos and Olivier Bronchain and Frank Custers and Joost Renes and Denise Verbakel and Christine van Vredendaal}, title = {Enabling FrodoKEM on Embedded Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {74--96}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.74-96}, doi = {10.46586/TCHES.V2023.I3.74-96}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BosBCRVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BotrelH23, author = {Gautam Botrel and Youssef El Housni}, title = {Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {504--521}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.504-521}, doi = {10.46586/TCHES.V2023.I3.504-521}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BotrelH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CamuratiDS23, author = {Giovanni Camurati and Matteo Dell'Amico and Fran{\c{c}}ois{-}Xavier Standaert}, title = {MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {277--300}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.277-300}, doi = {10.46586/TCHES.V2023.I1.277-300}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CamuratiDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersDSU23, author = {Ga{\"{e}}tan Cassiers and Henri Devillez and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi}, title = {Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations Towards Analytical Attacks against 32-bit Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {270--293}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.270-293}, doi = {10.46586/TCHES.V2023.I3.270-293}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersDSU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersMMMS23, author = {Ga{\"{e}}tan Cassiers and Lo{\"{\i}}c Masure and Charles Momin and Thorben Moos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Prime-Field Masking in Hardware and its Soundness against Low-Noise {SCA} Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {482--518}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.482-518}, doi = {10.46586/TCHES.V2023.I2.482-518}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersMMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CharlesU23, author = {Alex Charl{\`{e}}s and Aleksei Udovenko}, title = {LPN-based Attacks in the White-box Setting}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {318--343}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.318-343}, doi = {10.46586/TCHES.V2023.I4.318-343}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CharlesU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenO23, author = {Zitai Chen and David F. Oswald}, title = {PMFault: Faulting and Bricking Server CPUs through Management Interfaces Or: {A} Modern Example of Halt and Catch Fire}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {1--23}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.1-23}, doi = {10.46586/TCHES.V2023.I2.1-23}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengGMPP23, author = {Hao Cheng and Johann Gro{\ss}sch{\"{a}}dl and Ben Marshall and Dan Page and Thinh Hung Pham}, title = {{RISC-V} Instruction Set Extensions for Lightweight Symmetric Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {193--237}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.193-237}, doi = {10.46586/TCHES.V2023.I1.193-237}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ChengGMPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CoronGMZ23, author = {Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois G{\'{e}}rard and Simon Montoya and Rina Zeitoun}, title = {High-order Polynomial Comparison and Masking Lattice-based Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {153--192}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.153-192}, doi = {10.46586/TCHES.V2023.I1.153-192}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CoronGMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CoronGTZ23, author = {Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois G{\'{e}}rard and Matthias Trannoy and Rina Zeitoun}, title = {High-order masking of {NTRU}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {180--211}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.180-211}, doi = {10.46586/TCHES.V2023.I2.180-211}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CoronGTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CoronGTZ23a, author = {Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois G{\'{e}}rard and Matthias Trannoy and Rina Zeitoun}, title = {Improved Gadgets for the High-Order Masking of Dilithium}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {110--145}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.110-145}, doi = {10.46586/TCHES.V2023.I4.110-145}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CoronGTZ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CostesS23, author = {Nicolas Costes and Martijn Stam}, title = {Pincering {SKINNY} by Exploiting Slow Diffusion Enhancing Differential Power Analysis with Cluster Graph Inference}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {460--492}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.460-492}, doi = {10.46586/TCHES.V2023.I4.460-492}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CostesS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DaiZZ23, author = {Yu Dai and Fangguo Zhang and Chang{-}An Zhao}, title = {Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {393--419}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.393-419}, doi = {10.46586/TCHES.V2023.I4.393-419}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DaiZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DingGGSZL23, author = {Yuanchao Ding and Hua Guo and Yewei Guan and Hutao Song and Xiyong Zhang and Jianwei Liu}, title = {Some New Methods to Generate Short Addition Chains}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {270--285}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.270-285}, doi = {10.46586/TCHES.V2023.I2.270-285}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DingGGSZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Dobraunig0HRSW23, author = {Christoph Dobraunig and Lorenzo Grassi and Lukas Helminger and Christian Rechberger and Markus Schofnegger and Roman Walch}, title = {Pasta: {A} Case for Hybrid Homomorphic Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {30--73}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.30-73}, doi = {10.46586/TCHES.V2023.I3.30-73}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Dobraunig0HRSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ElGhamrawyABRSSSV23, author = {Mohamed ElGhamrawy and Melissa Azouaoui and Olivier Bronchain and Joost Renes and Tobias Schneider and Markus Sch{\"{o}}nauer and Okan Seker and Christine van Vredendaal}, title = {From {MLWE} to {RLWE:} {A} Differential Fault Attack on Randomized {\&} Deterministic Dilithium}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {262--286}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.262-286}, doi = {10.46586/TCHES.V2023.I4.262-286}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ElGhamrawyABRSSSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FischerBBDS23, author = {Viktor Fischer and Florent Bernard and Nathalie Bochard and Quentin Dallison and Maciej Sk{\'{o}}rski}, title = {Enhancing Quality and Security of the {PLL-TRNG}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {211--237}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.211-237}, doi = {10.46586/TCHES.V2023.I4.211-237}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FischerBBDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GaspozD23, author = {John Gaspoz and Siemen Dhooghe}, title = {Threshold Implementations in Software: Micro-architectural Leakages in Algorithms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {155--179}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.155-179}, doi = {10.46586/TCHES.V2023.I2.155-179}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GaspozD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GeelenBPHMSWDVVA23, author = {Robin Geelen and Michiel Van Beirendonck and Hilder V. L. Pereira and Brian Huffman and Tynan McAuley and Ben Selfridge and Daniel Wagner and Georgios D. Dimou and Ingrid Verbauwhede and Frederik Vercauteren and David W. Archer}, title = {{BASALISC:} Programmable Hardware Accelerator for {BGV} Fully Homomorphic Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {32--57}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.32-57}, doi = {10.46586/TCHES.V2023.I4.32-57}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GeelenBPHMSWDVVA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Genet23, author = {Aymeric Gen{\^{e}}t}, title = {On Protecting {SPHINCS+} Against Fault Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {80--114}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.80-114}, doi = {10.46586/TCHES.V2023.I2.80-114}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Genet23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HermelinkMSPR23, author = {Julius Hermelink and Erik M{\aa}rtensson and Simona Samardjiska and Peter Pessl and Gabi Dreo Rodosek}, title = {Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {287--317}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.287-317}, doi = {10.46586/TCHES.V2023.I4.287-317}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HermelinkMSPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HermelinkSST23, author = {Julius Hermelink and Silvan Streit and Emanuele Strieder and Katharina Thieme}, title = {Adapting Belief Propagation to Counter Shuffling of NTTs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {60--88}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.60-88}, doi = {10.46586/TCHES.V2023.I1.60-88}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HermelinkSST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuangSC0023, author = {Senyang Huang and Rui Qi Sim and Chitchanok Chuengsatiansup and Qian Guo and Thomas Johansson}, title = {Cache-Timing Attack Against {HQC}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {136--163}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.136-163}, doi = {10.46586/TCHES.V2023.I3.136-163}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HuangSC0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/IsobeILMNSS23, author = {Takanori Isobe and Ryoma Ito and Fukang Liu and Kazuhiko Minematsu and Motoki Nakahashi and Kosei Sakamoto and Rentaro Shiba}, title = {Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {115--154}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.115-154}, doi = {10.46586/TCHES.V2023.I2.115-154}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/IsobeILMNSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KR23, author = {Keerthi K. and Chester Rebeiro}, title = {FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {212--240}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.212-240}, doi = {10.46586/TCHES.V2023.I2.212-240}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KluczniakS23, author = {Kamil Kluczniak and Leonard Schild}, title = {{FDFB:} Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {501--537}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.501-537}, doi = {10.46586/TCHES.V2023.I1.501-537}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KluczniakS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LeviH23, author = {Itamar Levi and Carmit Hazay}, title = {Garbled Circuits from an {SCA} Perspective Free {XOR} can be Quite Expensive. .}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {54--79}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.54-79}, doi = {10.46586/TCHES.V2023.I2.54-79}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LeviH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Longa23, author = {Patrick Longa}, title = {Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {445--472}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.445-472}, doi = {10.46586/TCHES.V2023.I3.445-472}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Longa23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LuWYCFWWC23, author = {Tao Lu and Chengkun Wei and Ruijing Yu and Chaochao Chen and Wenjing Fang and Lei Wang and Zeke Wang and Wenzhi Chen}, title = {cuZK: Accelerating Zero-Knowledge Proof with {A} Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {194--220}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.194-220}, doi = {10.46586/TCHES.V2023.I3.194-220}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LuWYCFWWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LuoFG23, author = {Guiwen Luo and Shihui Fu and Guang Gong}, title = {Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {358--380}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.358-380}, doi = {10.46586/TCHES.V2023.I2.358-380}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LuoFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureCHS23, author = {Lo{\"{\i}}c Masure and Ga{\"{e}}tan Cassiers and Julien M. Hendrickx and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Information Bounds and Convergence Rates for Side-Channel Security Evaluators}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {522--569}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.522-569}, doi = {10.46586/TCHES.V2023.I3.522-569}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MasureCHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureCLS23, author = {Lo{\"{\i}}c Masure and Valence Cristiani and Maxime Lecomte and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Don't Learn What You Already Know Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {32--59}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.32-59}, doi = {10.46586/TCHES.V2023.I1.32-59}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MasureCLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MayS23, author = {Alexander May and Carl Richard Theodor Schneider}, title = {Dlog is Practically as Hard (or Easy) as {DH} - Solving Dlogs via {DH} Oracles on {EC} Standards}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {146--166}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.146-166}, doi = {10.46586/TCHES.V2023.I4.146-166}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MayS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MertAKSYLR23, author = {Ahmet Can Mert and Aikata and Sunmin Kwon and Youngsam Shin and Donghoon Yoo and Yongwoo Lee and Sujoy Sinha Roy}, title = {Medha: Microcoded Hardware Accelerator for computing on Encrypted Data}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {463--500}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.463-500}, doi = {10.46586/TCHES.V2023.I1.463-500}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MertAKSYLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MosavirikMST23, author = {Tahoura Mosavirik and Saleh Khalaj Monfared and Maryam Saadat{-}Safa and Shahin Tajik}, title = {Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {238--261}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.238-261}, doi = {10.46586/TCHES.V2023.I4.238-261}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MosavirikMST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MosavirikST23, author = {Tahoura Mosavirik and Patrick Schaumont and Shahin Tajik}, title = {ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {301--325}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.301-325}, doi = {10.46586/TCHES.V2023.I1.301-325}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MosavirikST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NaitoSS23, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, title = {{MMM:} Authenticated Encryption with Minimum Secret State for Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {80--109}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.80-109}, doi = {10.46586/TCHES.V2023.I4.80-109}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NaitoSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PhalakarnSRH23, author = {Kittiphon Phalakarn and Vorapong Suppakitpaisarn and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and M. Anwar Hasan}, title = {Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {246--269}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.246-269}, doi = {10.46586/TCHES.V2023.I3.246-269}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PhalakarnSRH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Qiu023, author = {Zehong (Zephyr) Qiu and Fan Zhang}, title = {{RAFA:} Redundancies-assisted Algebraic Fault Analysis and its implementation on {SPN} block ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {570--596}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.570-596}, doi = {10.46586/TCHES.V2023.I3.570-596}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Qiu023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RajendranRDBC23, author = {Gokulnath Rajendran and Prasanna Ravi and Jan{-}Pieter D'Anvers and Shivam Bhasin and Anupam Chattopadhyay}, title = {Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel {PC} Oracle Attacks on Kyber {KEM} and Beyond}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {418--446}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.418-446}, doi = {10.46586/TCHES.V2023.I2.418-446}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RajendranRDBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RaviYBZC23, author = {Prasanna Ravi and Bolin Yang and Shivam Bhasin and Fan Zhang and Anupam Chattopadhyay}, title = {Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {447--481}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.447-481}, doi = {10.46586/TCHES.V2023.I2.447-481}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RaviYBZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SchoosMTG23, author = {Kai Schoos and Sergej Meschkov and Mehdi B. Tahoori and Dennis R. E. Gnad}, title = {JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {294--320}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.294-320}, doi = {10.46586/TCHES.V2023.I3.294-320}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SchoosMTG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShahmirzadiDM23, author = {Aein Rezaei Shahmirzadi and Siemen Dhooghe and Amir Moradi}, title = {Low-Latency and Low-Randomness Second-Order Masked Cubic Functions}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {113--152}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.113-152}, doi = {10.46586/TCHES.V2023.I1.113-152}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShahmirzadiDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShenCZGJ23, author = {Muyan Shen and Chi Cheng and Xiaohan Zhang and Qian Guo and Tao Jiang}, title = {Find the Bad Apples: An efficient method for perfect key recovery under imperfect {SCA} oracles - {A} case study of Kyber}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {89--112}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.89-112}, doi = {10.46586/TCHES.V2023.I1.89-112}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShenCZGJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShuklaABMM23, author = {Shubhi Shukla and Manaar Alam and Sarani Bhattacharya and Pabitra Mitra and Debdeep Mukhopadhyay}, title = {"Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {587--613}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.587-613}, doi = {10.46586/TCHES.V2023.I2.587-613}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShuklaABMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SpielmannGS23, author = {David Spielmann and Ognjen Glamocanin and Mirjana Stojilovic}, title = {{RDS:} {FPGA} Routing Delay Sensors for Effective Remote Power Analysis Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {543--567}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.543-567}, doi = {10.46586/TCHES.V2023.I2.543-567}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SpielmannGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Staib023, author = {Marvin Staib and Amir Moradi}, title = {Deep Learning Side-Channel Collision Attack}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {422--444}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.422-444}, doi = {10.46586/TCHES.V2023.I3.422-444}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Staib023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/StolzTSG23, author = {Florian Stolz and Jan Philipp Thoma and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {Risky Translations: Securing TLBs against Timing Side Channels}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {1--31}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.1-31}, doi = {10.46586/TCHES.V2023.I1.1-31}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/StolzTSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SuYRYZWL23, author = {Shuqin Su and Bohan Yang and Vladimir Rozic and Mingyuan Yang and Min Zhu and Shaojun Wei and Leibo Liu}, title = {A Closer Look at the Chaotic Ring Oscillators based {TRNG} Design}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {381--417}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.381-417}, doi = {10.46586/TCHES.V2023.I2.381-417}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SuYRYZWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TanakaUXITH23, author = {Yutaro Tanaka and Rei Ueno and Keita Xagawa and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {473--503}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.473-503}, doi = {10.46586/TCHES.V2023.I3.473-503}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TanakaUXITH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TangGCX23, author = {Yufeng Tang and Zheng Gong and Jinhai Chen and Nanjiang Xie}, title = {Higher-Order {DCA} Attacks on White-Box Implementations with Masking and Shuffling Countermeasures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {369--400}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.369-400}, doi = {10.46586/TCHES.V2023.I1.369-400}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/TangGCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TangGLZ23, author = {Yufeng Tang and Zheng Gong and Bin Li and Liangju Zhao}, title = {Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {493--522}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.493-522}, doi = {10.46586/TCHES.V2023.I4.493-522}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TangGLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UenoH23, author = {Rei Ueno and Naofumi Homma}, title = {How Secure is Exponent-blinded {RSA-CRT} with Sliding Window Exponentiation?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {241--269}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.241-269}, doi = {10.46586/TCHES.V2023.I2.241-269}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UenoH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UlitzschMBTS23, author = {Vincent Quentin Ulitzsch and Soundes Marzougui and Alexis Bagia and Mehdi Tibouchi and Jean{-}Pierre Seifert}, title = {Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with {ILP}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {367--392}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.367-392}, doi = {10.46586/TCHES.V2023.I4.367-392}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UlitzschMBTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangJZY23, author = {Weijia Wang and Fanjie Ji and Juelin Zhang and Yu Yu}, title = {Efficient Private Circuits with Precomputation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {286--309}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.286-309}, doi = {10.46586/TCHES.V2023.I2.286-309}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangJZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/XuDWL23, author = {Luyao Xu and Zhengyi Dai and Baofeng Wu and Dongdai Lin}, title = {Improved Attacks on {(EC)DSA} with Nonce Leakage by Lattice Sieving with Predicate}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {568--586}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.568-586}, doi = {10.46586/TCHES.V2023.I2.568-586}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/XuDWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/YapBBP23, author = {Trevor Yap and Adrien Benamira and Shivam Bhasin and Thomas Peyrin}, title = {Peek into the Black-Box: Interpretable Neural Network using {SAT} Equations in Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {24--53}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.24-53}, doi = {10.46586/TCHES.V2023.I2.24-53}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/YapBBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/YouKSH23, author = {Shih{-}Chun You and Markus G. Kuhn and Sumanta Sarkar and Feng Hao}, title = {Low Trace-Count Template Attacks on 32-bit Implementations of {ASCON} {AEAD}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {344--366}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.344-366}, doi = {10.46586/TCHES.V2023.I4.344-366}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/YouKSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/YuDQKJWZ23, author = {Qingyuan Yu and Xiaoyang Dong and Lingyue Qin and Yongze Kang and Keting Jia and Xiaoyun Wang and Guoyan Zhang}, title = {Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {4}, pages = {1--31}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i4.1-31}, doi = {10.46586/TCHES.V2023.I4.1-31}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/YuDQKJWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZaidBCHV23, author = {Gabriel Zaid and Lilian Bossuet and Mathieu Carbone and Amaury Habrard and Alexandre Venelli}, title = {Conditional Variational AutoEncoder based on Stochastic Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {310--357}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.310-357}, doi = {10.46586/TCHES.V2023.I2.310-357}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZaidBCHV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZeitschnerM023, author = {Jannik Zeitschner and Nicolai M{\"{u}}ller and Amir Moradi}, title = {PROLEAD{\_}SW Probing-Based Software Leakage Detection for {ARM} Binaries}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {391--421}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.391-421}, doi = {10.46586/TCHES.V2023.I3.391-421}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZeitschnerM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangHFGTRZG23, author = {Fan Zhang and Run Huang and Tianxiang Feng and Xue Gong and Yulong Tao and Kui Ren and Xinjie Zhao and Shize Guo}, title = {Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {519--542}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.519-542}, doi = {10.46586/TCHES.V2023.I2.519-542}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangHFGTRZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhuZOTW23, author = {Danyang Zhu and Rongrong Zhang and Lun Ou and Jing Tian and Zhongfeng Wang}, title = {Low-Latency Design and Implementation of the Squaring in Class Groups for Verifiable Delay Function Using Redundant Representation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {438--462}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.438-462}, doi = {10.46586/TCHES.V2023.I1.438-462}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhuZOTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AbdulrahmanCCHK22, author = {Amin Abdulrahman and Jiun{-}Peng Chen and Yu{-}Jia Chen and Vincent Hwang and Matthias J. Kannwischer and Bo{-}Yin Yang}, title = {Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {127--151}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.127-151}, doi = {10.46586/TCHES.V2022.I1.127-151}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AbdulrahmanCCHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlkimHY22, author = {Erdem Alkim and Vincent Hwang and Bo{-}Yin Yang}, title = {Multi-Parameter Support with NTTs for {NTRU} and {NTRU} Prime on Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {349--371}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.349-371}, doi = {10.46586/TCHES.V2022.I4.349-371}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AlkimHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AzouaouiBGP22, author = {Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {140--165}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.140-165}, doi = {10.46586/TCHES.V2022.I2.140-165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AzouaouiBGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AzouaouiKSV22, author = {Melissa Azouaoui and Yulia Kuzovkova and Tobias Schneider and Christine van Vredendaal}, title = {Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {372--396}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.372-396}, doi = {10.46586/TCHES.V2022.I4.372-396}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AzouaouiKSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BagheriSRBS22, author = {Nasour Bagheri and Sadegh Sadeghi and Prasanna Ravi and Shivam Bhasin and Hadi Soleimany}, title = {{SIPFA:} Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {367--390}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.367-390}, doi = {10.46586/TCHES.V2022.I3.367-390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BagheriSRBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BarbuBDGHLMRX22, author = {Guillaume Barbu and Ward Beullens and Emmanuelle Dottax and Christophe Giraud and Agathe Houzelot and Chaoyun Li and Mohammad Mahzoun and Adri{\'{a}}n Ranea and Jianrui Xie}, title = {{ECDSA} White-Box Implementations: Attacks and Designs from {CHES} 2021 Challenge}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {527--552}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.527-552}, doi = {10.46586/TCHES.V2022.I4.527-552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BarbuBDGHLMRX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BartkewitzBMMS22, author = {Timo Bartkewitz and Sven Bettendorf and Thorben Moos and Amir Moradi and Falk Schellenberg}, title = {Beware of Insufficient Redundancy An Experimental Evaluation of Code-based {FI} Countermeasures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {438--462}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.438-462}, doi = {10.46586/TCHES.V2022.I3.438-462}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BartkewitzBMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BaruaF22, author = {Anomadarshi Barua and Mohammad Abdullah Al Faruque}, title = {PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {438--462}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.438-462}, doi = {10.46586/TCHES.V2022.I4.438-462}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BaruaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BauerDGKLM22, author = {Sven Bauer and Hermann Drexler and Max Gebhardt and Dominik Klein and Friederike Laus and Johannes Mittmann}, title = {Attacks Against White-Box {ECDSA} and Discussion of Countermeasures {A} Report on the WhibOx Contest 2021}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {25--55}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.25-55}, doi = {10.46586/TCHES.V2022.I4.25-55}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BauerDGKLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeckerHKYY22, author = {Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Bo{-}Yin Yang and Shang{-}Yi Yang}, title = {Neon {NTT:} Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple {M1}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {221--244}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.221-244}, doi = {10.46586/TCHES.V2022.I1.221-244}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeckerHKYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeckerMKYV22, author = {Hanno Becker and Jose Maria Bermudo Mera and Angshuman Karmakar and Joseph Yiu and Ingrid Verbauwhede}, title = {Polynomial multiplication on embedded vector architectures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {482--505}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.482-505}, doi = {10.46586/TCHES.V2022.I1.482-505}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeckerMKYV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeerelGHMN22, author = {Peter A. Beerel and Marios Georgiou and Ben Hamlin and Alex J. Malozemoff and Pierluigi Nuzzo}, title = {Towards a Formal Treatment of Logic Locking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {92--114}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.92-114}, doi = {10.46586/TCHES.V2022.I2.92-114}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeerelGHMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeguinotCGR22, author = {Julien B{\'{e}}guinot and Wei Cheng and Sylvain Guilley and Olivier Rioul}, title = {Side-Channel Expectation-Maximization Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {774--799}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.774-799}, doi = {10.46586/TCHES.V2022.I4.774-799}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeguinotCGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelenkyBACDKMRT22, author = {Yaacov Belenky and Vadim Bugaenko and Leonid Azriel and Hennadii Chernyshchyk and Ira Dushar and Oleg Karavaev and Oleh Maksimenko and Yulia Ruda and Valery Teper and Yury Kreimer}, title = {Redundancy {AES} Masking Basis for Attack Mitigation {(RAMBAM)}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {69--91}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.69-91}, doi = {10.46586/TCHES.V2022.I2.69-91}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelenkyBACDKMRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelliziaHKMS22, author = {Davide Bellizia and Cl{\'{e}}ment Hoffmann and Dina Kamel and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert}, title = {When Bad News Become Good News Towards Usable Instances of Learning with Physical Errors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {1--24}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.1-24}, doi = {10.46586/TCHES.V2022.I4.1-24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelliziaHKMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiBBHPSU22, author = {Francesco Berti and Shivam Bhasin and Jakub Breier and Xiaolu Hou and Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Balazs Udvarhelyi}, title = {A Finer-Grain Analysis of the Leakage (Non) Resilience of {OCB}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {461--481}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.461-481}, doi = {10.46586/TCHES.V2022.I1.461-481}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BertiBBHPSU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeyneDMS22, author = {Tim Beyne and Siemen Dhooghe and Amir Moradi and Aein Rezaei Shahmirzadi}, title = {Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {679--721}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.679-721}, doi = {10.46586/TCHES.V2022.I1.679-721}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeyneDMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BonnetainJ22, author = {Xavier Bonnetain and Samuel Jaques}, title = {Quantum Period Finding against Symmetric Primitives in Practice}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {1--27}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.1-27}, doi = {10.46586/TCHES.V2022.I1.1-27}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BonnetainJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainC22, author = {Olivier Bronchain and Ga{\"{e}}tan Cassiers}, title = {Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {553--588}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.553-588}, doi = {10.46586/TCHES.V2022.I4.553-588}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CasagrandeLCPA22, author = {Marco Casagrande and Eleonora Losiouk and Mauro Conti and Mathias Payer and Daniele Antonioli}, title = {BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {330--366}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.330-366}, doi = {10.46586/TCHES.V2022.I3.330-366}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CasagrandeLCPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenCDLNSW22, author = {Po{-}Jen Chen and Tung Chou and Sanjay Deshpande and Norman Lahr and Ruben Niederhagen and Jakub Szefer and Wen Wang}, title = {Complete and Improved {FPGA} Implementation of Classic McEliece}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {71--113}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.71-113}, doi = {10.46586/TCHES.V2022.I3.71-113}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenCDLNSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenYYWL22, author = {Xiangren Chen and Bohan Yang and Shouyi Yin and Shaojun Wei and Leibo Liu}, title = {{CFNTT:} Scalable Radix-2/4 {NTT} Multiplication Architecture with an Efficient Conflict-free Memory Mapping Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {94--126}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.94-126}, doi = {10.46586/TCHES.V2022.I1.94-126}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenYYWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengFGR22, author = {Hao Cheng and Georgios Fotiadis and Johann Gro{\ss}sch{\"{a}}dl and Peter Y. A. Ryan}, title = {Highly Vectorized {SIKE} for {AVX-512}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {41--68}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.41-68}, doi = {10.46586/TCHES.V2022.I2.41-68}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengFGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChouL22, author = {Tung Chou and Jin{-}Han Liou}, title = {A Constant-time {AVX2} Implementation of a Variant of {ROLLO}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {152--174}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.152-174}, doi = {10.46586/TCHES.V2022.I1.152-174}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChouL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CoronGMZ22, author = {Jean{-}S{\'{e}}bastien Coron and Fran{\c{c}}ois G{\'{e}}rard and Simon Montoya and Rina Zeitoun}, title = {High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {1--40}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.1-40}, doi = {10.46586/TCHES.V2022.I2.1-40}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CoronGMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DAnversHPBV22, author = {Jan{-}Pieter D'Anvers and Daniel Heinz and Peter Pessl and Michiel Van Beirendonck and Ingrid Verbauwhede}, title = {Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {115--139}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.115-139}, doi = {10.46586/TCHES.V2022.I2.115-139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DAnversHPBV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Delvaux22, author = {Jeroen Delvaux}, title = {Roulette: {A} Diverse Family of Feasible Fault Attacks on Masked Kyber}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {637--660}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.637-660}, doi = {10.46586/TCHES.V2022.I4.637-660}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Delvaux22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DericH22, author = {Aleksa Deric and Daniel E. Holcomb}, title = {Know Time to Die - Integrity Checking for Zero Trust Chiplet-based Systems Using Between-Die Delay PUFs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {391--412}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.391-412}, doi = {10.46586/TCHES.V2022.I3.391-412}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DericH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DubeyAPCA22, author = {Anuj Dubey and Afzal Ahmad and Muhammad Adeel Pasha and Rosario Cammarota and Aydin Aysu}, title = {ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {506--556}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.506-556}, doi = {10.46586/TCHES.V2022.I1.506-556}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DubeyAPCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FeldtkellerKSMG22, author = {Jakob Feldtkeller and David Knichel and Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {Randomness Optimization for Gadget Compositions in Higher-Order Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {188--227}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.188-227}, doi = {10.46586/TCHES.V2022.I4.188-227}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FeldtkellerKSMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FeoMGKGPT22, author = {Luca De Feo and Nadia El Mrabet and Aymeric Gen{\^{e}}t and Novak Kaluderovic and Natacha Linard de Guertechin and Simon Ponti{\'{e}} and {\'{E}}lise Tasso}, title = {{SIKE} Channels Zero-Value Side-Channel Attacks on {SIKE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {264--289}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.264-289}, doi = {10.46586/TCHES.V2022.I3.264-289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FeoMGKGPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FouqueKPY22, author = {Pierre{-}Alain Fouque and Paul Kirchner and Thomas Pornin and Yang Yu}, title = {{BAT:} Small and Fast {KEM} over {NTRU} Lattices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {240--265}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.240-265}, doi = {10.46586/TCHES.V2022.I2.240-265}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FouqueKPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FritzmannBRKSVS22, author = {Tim Fritzmann and Michiel Van Beirendonck and Debapriya Basu Roy and Patrick Karl and Thomas Schamberger and Ingrid Verbauwhede and Georg Sigl}, title = {Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {414--460}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.414-460}, doi = {10.46586/TCHES.V2022.I1.414-460}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FritzmannBRKSVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GarbXKF22, author = {Kathrin Garb and Marvin Xhemrishi and Ludwig K{\"{u}}rzinger and Christoph Frisch}, title = {The Wiretap Channel for Capacitive PUF-Based Security Enclosures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {165--191}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.165-191}, doi = {10.46586/TCHES.V2022.I3.165-191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GarbXKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GohrLS22, author = {Aron Gohr and Friederike Laus and Werner Schindler}, title = {Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis {A} Report on the {CHES} Challenge Side-Channel Contest 2020}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {397--437}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.397-437}, doi = {10.46586/TCHES.V2022.I4.397-437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GohrLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GotteS22, author = {Jan Sebastian G{\"{o}}tte and Bj{\"{o}}rn Scheuermann}, title = {Can't Touch This: Inertial HSMs Thwart Advanced Physical Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {69--93}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.69-93}, doi = {10.46586/TCHES.V2022.I1.69-93}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GotteS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuerreauMRR22, author = {Morgane Guerreau and Ange Martinelli and Thomas Ricosset and M{\'{e}}lissa Rossi}, title = {The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {141--164}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.141-164}, doi = {10.46586/TCHES.V2022.I3.141-164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuerreauMRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuoHJLNS22, author = {Qian Guo and Clemens Hlauschek and Thomas Johansson and Norman Lahr and Alexander Nilsson and Robin Leander Schr{\"{o}}der}, title = {Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in {HQC} and {BIKE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {223--263}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.223-263}, doi = {10.46586/TCHES.V2022.I3.223-263}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GuoHJLNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuoJJ22, author = {Qian Guo and Andreas Johansson and Thomas Johansson}, title = {A Key-Recovery Side-Channel Attack on Classic McEliece Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {800--827}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.800-827}, doi = {10.46586/TCHES.V2022.I4.800-827}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuoJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuangZZLCKC22, author = {Junhao Huang and Jipeng Zhang and Haosong Zhao and Zhe Liu and Ray C. C. Cheung and {\c{C}}etin Kaya Ko{\c{c}} and Donglong Chen}, title = {Improved Plantard Arithmetic for Lattice-based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {614--636}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.614-636}, doi = {10.46586/TCHES.V2022.I4.614-636}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HuangZZLCKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HwangLSSTWY22, author = {Vincent Hwang and Jiaxiang Liu and Gregor Seiler and Xiaomu Shi and Ming{-}Hsien Tsai and Bow{-}Yaw Wang and Bo{-}Yin Yang}, title = {Verified {NTT} Multiplications for {NISTPQC} {KEM} Lattice Finalists: Kyber, SABER, and {NTRU}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {718--750}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.718-750}, doi = {10.46586/TCHES.V2022.I4.718-750}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HwangLSSTWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ItoUH22, author = {Akira Ito and Rei Ueno and Naofumi Homma}, title = {Perceived Information Revisited New Metrics to Evaluate Success Rate of Side-Channel Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {228--254}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.228-254}, doi = {10.46586/TCHES.V2022.I4.228-254}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ItoUH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Joye22, author = {Marc Joye}, title = {SoK: Fully Homomorphic Encryption over the [Discretized] Torus}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {661--692}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.661-692}, doi = {10.46586/TCHES.V2022.I4.661-692}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Joye22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KiaeiS22, author = {Pantea Kiaei and Patrick Schaumont}, title = {SoC Root Canal! Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {751--773}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.751-773}, doi = {10.46586/TCHES.V2022.I4.751-773}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KiaeiS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KnichelM22, author = {David Knichel and Amir Moradi}, title = {Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {114--140}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.114-140}, doi = {10.46586/TCHES.V2022.I3.114-140}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KnichelM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KnichelMMS22, author = {David Knichel and Amir Moradi and Nicolai M{\"{u}}ller and Pascal Sasdrich}, title = {Automated Generation of Masked Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {589--629}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.589-629}, doi = {10.46586/TCHES.V2022.I1.589-629}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KnichelMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KnichelSM22, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Generic Hardware Private Circuits Towards Automated Generation of Composable Secure Gadgets}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {323--344}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.323-344}, doi = {10.46586/TCHES.V2022.I1.323-344}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KnichelSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KumarDBSJBB22, author = {Satyam Kumar and Vishnu Asutosh Dasu and Anubhab Baksi and Santanu Sarkar and Dirmanto Jap and Jakub Breier and Shivam Bhasin}, title = {Side Channel Attack On Stream Ciphers: {A} Three-Step Approach To State/Key Recovery}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {166--191}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.166-191}, doi = {10.46586/TCHES.V2022.I2.166-191}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/KumarDBSJBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LiZHLT22, author = {Yanbin Li and Jiajie Zhu and Yuxin Huang and Zhe Liu and Ming Tang}, title = {Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {285--310}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.285-310}, doi = {10.46586/TCHES.V2022.I4.285-310}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LiZHLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MarshallPW22, author = {Ben Marshall and Dan Page and James Webb}, title = {{MIRACLE:} MIcRo-ArChitectural Leakage Evaluation {A} study of micro-architectural power leakage across many devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {175--220}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.175-220}, doi = {10.46586/TCHES.V2022.I1.175-220}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MarshallPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MullerKSM22, author = {Nicolai M{\"{u}}ller and David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Transitional Leakage in Theory and Practice Unveiling Security Flaws in Masked Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {266--288}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.266-288}, doi = {10.46586/TCHES.V2022.I2.266-288}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MullerKSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MullerM22, author = {Nicolai M{\"{u}}ller and Amir Moradi}, title = {{PROLEAD} {A} Probing-Based Hardware Leakage Detection Tool}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {311--348}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.311-348}, doi = {10.46586/TCHES.V2022.I4.311-348}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MullerM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NagpalGPM22, author = {Rishub Nagpal and Barbara Gigerl and Robert Primas and Stefan Mangard}, title = {Riding the Waves Towards Generic Single-Cycle Masking in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {693--717}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.693-717}, doi = {10.46586/TCHES.V2022.I4.693-717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NagpalGPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NasahlOVSTRM22, author = {Pascal Nasahl and Miguel Osorio and Pirmin Vogel and Michael Schaffner and Timothy Trippel and Dominic Rizzo and Stefan Mangard}, title = {{SYNFI:} Pre-Silicon Fault Analysis of an Open-Source Secure Element}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {56--87}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.56-87}, doi = {10.46586/TCHES.V2022.I4.56-87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NasahlOVSTRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NashimotoSUH22, author = {Shoei Nashimoto and Daisuke Suzuki and Rei Ueno and Naofumi Homma}, title = {Bypassing Isolated Execution on {RISC-V} using Side-Channel-Assisted Fault-Injection and Its Countermeasure}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {28--68}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.28-68}, doi = {10.46586/TCHES.V2022.I1.28-68}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NashimotoSUH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PaivaT22, author = {Thales Bandiera Paiva and Routo Terada}, title = {Faster Constant-Time Decoder for {MDPC} Codes and Applications to {BIKE} {KEM}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {110--134}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.110-134}, doi = {10.46586/TCHES.V2022.I4.110-134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PaivaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PeetermansV22, author = {Adriaan Peetermans and Ingrid Verbauwhede}, title = {An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {88--109}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.88-109}, doi = {10.46586/TCHES.V2022.I4.88-109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PeetermansV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PerinWP22, author = {Guilherme Perin and Lichao Wu and Stjepan Picek}, title = {Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {828--861}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.828-861}, doi = {10.46586/TCHES.V2022.I4.828-861}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PerinWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PiedraVA22, author = {Antonio de la Piedra and Marloes Venema and Greg Alp{\'{a}}r}, title = {{ABE} Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {192--239}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i2.192-239}, doi = {10.46586/TCHES.V2022.I2.192-239}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PiedraVA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RadulescuPC22, author = {Anca Radulescu and Pantelimon George Popescu and Marios O. Choudary}, title = {{GE} vs {GM:} Efficient side-channel security evaluations on full cryptographic keys}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {886--905}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.886-905}, doi = {10.46586/TCHES.V2022.I4.886-905}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RadulescuPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RaviEBCR22, author = {Prasanna Ravi and Martianus Frederic Ezerman and Shivam Bhasin and Anupam Chattopadhyay and Sujoy Sinha Roy}, title = {Will You Cross the Threshold for Me? Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {722--761}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.722-761}, doi = {10.46586/TCHES.V2022.I1.722-761}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RaviEBCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Ribes-GonzalezF22, author = {Jordi Ribes{-}Gonz{\'{a}}lez and Oriol Farr{\`{a}}s and Carles Hern{\'{a}}ndez and Vatistas Kostalabros and Miquel Moret{\'{o}}}, title = {A Security Model for Randomization-based Protected Caches}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {1--25}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.1-25}, doi = {10.46586/TCHES.V2022.I3.1-25}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Ribes-GonzalezF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Richter-Brockmann22, author = {Jan Richter{-}Brockmann and Ming{-}Shing Chen and Santosh Ghosh and Tim G{\"{u}}neysu}, title = {Racing {BIKE:} Improved Polynomial Multiplication and Inversion in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {557--588}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.557-588}, doi = {10.46586/TCHES.V2022.I1.557-588}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Richter-Brockmann22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Richter-Brockmann22a, author = {Jan Richter{-}Brockmann and Jakob Feldtkeller and Pascal Sasdrich and Tim G{\"{u}}neysu}, title = {{VERICA} - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {255--284}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.255-284}, doi = {10.46586/TCHES.V2022.I4.255-284}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Richter-Brockmann22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RuchtiGP22, author = {Jonas Ruchti and Michael Gruber and Michael Pehl}, title = {When the Decoder Has to Look Twice: Glitching a {PUF} Error Correction}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {26--70}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.26-70}, doi = {10.46586/TCHES.V2022.I3.26-70}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RuchtiGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SaitoIUH22, author = {Kotaro Saito and Akira Ito and Rei Ueno and Naofumi Homma}, title = {One Truth Prevails: {A} Deep-learning Based Single-Trace Power Analysis on {RSA-CRT} with Windowed Exponentiation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {490--526}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.490-526}, doi = {10.46586/TCHES.V2022.I4.490-526}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SaitoIUH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SchneiderDPKC22, author = {Moritz Schneider and Aritra Dhar and Ivan Puddu and Kari Kostiainen and Srdjan Capkun}, title = {Composite Enclaves: Towards Disaggregated Trusted Execution}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {630--656}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.630-656}, doi = {10.46586/TCHES.V2022.I1.630-656}, timestamp = {Fri, 13 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SchneiderDPKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SelmkePDSWMKS22, author = {Bodo Selmke and Maximilian Pollanka and Andreas Duensing and Emanuele Strieder and Hayden Wen and Michael Mittermair and Reinhard Kienberger and Georg Sigl}, title = {On the application of Two-Photon Absorption for Laser Fault Injection attacks Pushing the physical boundaries for Laser-based Fault Injection}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {862--885}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.862-885}, doi = {10.46586/TCHES.V2022.I4.862-885}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SelmkePDSWMKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShenPSCV22, author = {Yaobin Shen and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}tan Cassiers and Corentin Verhamme}, title = {Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {135--162}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.135-162}, doi = {10.46586/TCHES.V2022.I4.135-162}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShenPSCV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShimLK22, author = {Kyung{-}Ah Shim and Sangyub Lee and Namhun Koo}, title = {Efficient Implementations of Rainbow and {UOV} using {AVX2}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {245--269}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.245-269}, doi = {10.46586/TCHES.V2022.I1.245-269}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShimLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SoleimanyBHRBM22, author = {Hadi Soleimany and Nasour Bagheri and Hosein Hadipour and Prasanna Ravi and Shivam Bhasin and Sara Mansouri}, title = {Practical Multiple Persistent Faults Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {367--390}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.367-390}, doi = {10.46586/TCHES.V2022.I1.367-390}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SoleimanyBHRBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SreedharHT22, author = {Kavya Sreedhar and Mark Horowitz and Christopher Torng}, title = {A Fast Large-Integer Extended {GCD} Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {163--187}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.163-187}, doi = {10.46586/TCHES.V2022.I4.163-187}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SreedharHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SunETA22, author = {Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe}, title = {Guessing Bits: Improved Lattice Attacks on {(EC)DSA} with Nonce Leakage}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {391--413}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.391-413}, doi = {10.46586/TCHES.V2022.I1.391-413}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SunETA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TrautmannBWWVT22, author = {Jens Trautmann and Arthur Beckers and Lennert Wouters and Stefan Wildermann and Ingrid Verbauwhede and J{\"{u}}rgen Teich}, title = {Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {345--366}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.345-366}, doi = {10.46586/TCHES.V2022.I1.345-366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TrautmannBWWVT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UdugamaJSIP22, author = {Brian Udugama and Darshana Jayasinghe and Hassaan Saadat and Aleksandar Ignjatovic and Sri Parameswaran}, title = {{VITI:} {A} Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {657--678}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.657-678}, doi = {10.46586/TCHES.V2022.I1.657-678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UdugamaJSIP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UdugamaJSIP22a, author = {Brian Udugama and Darshana Jayasinghe and Hassaan Saadat and Aleksandar Ignjatovic and Sri Parameswaran}, title = {A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {589--613}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.589-613}, doi = {10.46586/TCHES.V2022.I4.589-613}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UdugamaJSIP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UenoXTITH22, author = {Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {296--322}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.296-322}, doi = {10.46586/TCHES.V2022.I1.296-322}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UenoXTITH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangGYJS22, author = {Weijia Wang and Chun Guo and Yu Yu and Fanjie Ji and Yang Su}, title = {Side-Channel Masking with Common Shares}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {290--329}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.290-329}, doi = {10.46586/TCHES.V2022.I3.290-329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangGYJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WuCGZF22, author = {Qianmei Wu and Wei Cheng and Sylvain Guilley and Fan Zhang and Wei Fu}, title = {On Efficient and Secure Code-based Masking: {A} Pragmatic Evaluation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {192--222}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.192-222}, doi = {10.46586/TCHES.V2022.I3.192-222}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WuCGZF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WuPP22, author = {Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {The Best of Two Worlds: Deep Learning-assisted Template Attack}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {3}, pages = {413--437}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i3.413-437}, doi = {10.46586/TCHES.V2022.I3.413-437}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WuPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/YamashitaCFBS22, author = {Kohei Yamashita and Benjamin Cyr and Kevin Fu and Wayne P. Burleson and Takeshi Sugawara}, title = {Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {4}, pages = {463--489}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i4.463-489}, doi = {10.46586/TCHES.V2022.I4.463-489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/YamashitaCFBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangFLRZ22, author = {Fan Zhang and Tianxiang Feng and Zhiqi Li and Kui Ren and Xinjie Zhao}, title = {Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {2}, pages = {289--311}, year = {2022}, url = {https://tches.iacr.org/index.php/TCHES/article/view/9489}, timestamp = {Thu, 02 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ZhangFLRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhaoZWYZLZYWL22, author = {Cankun Zhao and Neng Zhang and Hanning Wang and Bohan Yang and Wenping Zhu and Zhengdong Li and Min Zhu and Shouyi Yin and Shaojun Wei and Leibo Liu}, title = {A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {270--295}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.270-295}, doi = {10.46586/TCHES.V2022.I1.270-295}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhaoZWYZLZYWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AbidinSRBSB21, author = {Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singel{\'{e}}e and Christian Bachmann}, title = {Secure, Accurate, and Practical Narrow-Band Ranging System}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {106--135}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.106-135}, doi = {10.46586/TCHES.V2021.I2.106-135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AbidinSRBSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AdomnicaiP21, author = {Alexandre Adomnicai and Thomas Peyrin}, title = {Fixslicing AES-like Ciphers New bitsliced {AES} speed records on ARM-Cortex {M} and {RISC-V}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {402--425}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.402-425}, doi = {10.46586/TCHES.V2021.I1.402-425}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AdomnicaiP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AghaieM21, author = {Anita Aghaie and Amir Moradi}, title = {Inconsistency of Simulation and Practice in Delay-based Strong PUFs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {520--551}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.520-551}, doi = {10.46586/TCHES.V2021.I3.520-551}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AghaieM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AldayaB21, author = {Alejandro Cabrera Aldaya and Billy Bob Brumley}, title = {Online Template Attacks: Revisited}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {28--59}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.28-59}, doi = {10.46586/TCHES.V2021.I3.28-59}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AldayaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlkimCCEHHLNSWY21, author = {Erdem Alkim and Dean Yun{-}Li Cheng and Chi{-}Ming Marvin Chung and H{\"{u}}lya Evkan and Leo Wei{-}Lun Huang and Vincent Hwang and Ching{-}Lin Trista Li and Ruben Niederhagen and Cheng{-}Jhih Shih and Julian W{\"{a}}lde and Bo{-}Yin Yang}, title = {Polynomial Multiplication in {NTRU} Prime Comparison of Optimization Strategies on Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {217--238}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.217-238}, doi = {10.46586/TCHES.V2021.I1.217-238}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AlkimCCEHHLNSWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AranhaBESTWZ21, author = {Diego F. Aranha and Sebastian Berndt and Thomas Eisenbarth and Okan Seker and Akira Takahashi and Luca Wilke and Greg Zaverucha}, title = {Side-Channel Protections for Picnic Signatures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {239--282}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.239-282}, doi = {10.46586/TCHES.V2021.I4.239-282}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AranhaBESTWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BahadoriJMS21, author = {Milad Bahadori and Kimmo J{\"{a}}rvinen and Tilen Marc and Miha Stopar}, title = {Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {1--27}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.1-27}, doi = {10.46586/TCHES.V2021.I3.1-27}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BahadoriJMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BalliCB21, author = {Fatih Balli and Andrea Caforio and Subhadeep Banik}, title = {The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {239--278}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.239-278}, doi = {10.46586/TCHES.V2021.I1.239-278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BalliCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BanegasBCCLMSS21, author = {Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sot{\'{a}}kov{\'{a}}}, title = {{CTIDH:} faster constant-time {CSIDH}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {351--387}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.351-387}, doi = {10.46586/TCHES.V2021.I4.351-387}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BanegasBCCLMSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BanegasBHL21, author = {Gustavo Banegas and Daniel J. Bernstein and Iggy van Hoof and Tanja Lange}, title = {Concrete quantum cryptanalysis of binary elliptic curves}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {451--472}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.451-472}, doi = {10.46586/TCHES.V2021.I1.451-472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BanegasBHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BartheGGOPP21, author = {Gilles Barthe and Marc Gourjon and Benjamin Gr{\'{e}}goire and Maximilian Orlt and Clara Paglialonga and Lars Porth}, title = {Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {189--228}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.189-228}, doi = {10.46586/TCHES.V2021.I2.189-228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BartheGGOPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BeirendonckDV21, author = {Michiel Van Beirendonck and Jan{-}Pieter D'Anvers and Ingrid Verbauwhede}, title = {Analysis and Comparison of Table-based Arithmetic to Boolean Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {275--297}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.275-297}, doi = {10.46586/TCHES.V2021.I3.275-297}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BeirendonckDV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelliziaHKLMSY21, author = {Davide Bellizia and Cl{\'{e}}ment Hoffmann and Dina Kamel and Hanlin Liu and Pierrick M{\'{e}}aux and Fran{\c{c}}ois{-}Xavier Standaert and Yu Yu}, title = {Learning Parity with Physical Noise: Imperfections, Reductions and {FPGA} Prototype}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {390--417}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.390-417}, doi = {10.46586/TCHES.V2021.I3.390-417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelliziaHKLMSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BhasinDHPB21, author = {Shivam Bhasin and Jan{-}Pieter D'Anvers and Daniel Heinz and Thomas P{\"{o}}ppelmann and Michiel Van Beirendonck}, title = {Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {334--359}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.334-359}, doi = {10.46586/TCHES.V2021.I3.334-359}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BhasinDHPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BosGRSV21, author = {Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal}, title = {Masking Kyber: First- and Higher-Order Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {173--214}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.173-214}, doi = {10.46586/TCHES.V2021.I4.173-214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BosGRSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BosHRV21, author = {Joppe W. Bos and Andreas H{\"{u}}lsing and Joost Renes and Christine van Vredendaal}, title = {Rapidly Verifiable {XMSS} Signatures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {137--168}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.137-168}, doi = {10.46586/TCHES.V2021.I1.137-168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BosHRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BrancoFGMMS21, author = {Pedro Branco and Lu{\'{\i}}s Fiolhais and Manuel Goul{\~{a}}o and Paulo Martins and Paulo Mateus and Leonel Sousa}, title = {ROTed: Random Oblivious Transfer for embedded devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {215--238}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.215-238}, doi = {10.46586/TCHES.V2021.I4.215-238}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BrancoFGMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainMPS21, author = {Olivier Bronchain and Charles Momin and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Improved Leakage-Resistant Authenticated Encryption based on Hardware {AES} Coprocessors}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {641--676}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.641-676}, doi = {10.46586/TCHES.V2021.I3.641-676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainMPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainS21, author = {Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {202--234}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.202-234}, doi = {10.46586/TCHES.V2021.I3.202-234}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CaoZLG21, author = {Pei Cao and Chi Zhang and Xiangjun Lu and Dawu Gu}, title = {Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {27--56}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.27-56}, doi = {10.46586/TCHES.V2021.I4.27-56}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CaoZLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarletGM21, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {57--87}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.57-87}, doi = {10.46586/TCHES.V2021.I4.57-87}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CarletGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersS21, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {136--158}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.136-158}, doi = {10.46586/TCHES.V2021.I2.136-158}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChakrabortyBAPM21, author = {Anirban Chakraborty and Sarani Bhattacharya and Manaar Alam and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {{RASSLE:} Return Address Stack based Side-channel LEakage}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {275--303}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.275-303}, doi = {10.46586/TCHES.V2021.I2.275-303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChakrabortyBAPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenC21, author = {Ming{-}Shing Chen and Tung Chou}, title = {Classic McEliece on the {ARM} Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {125--148}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.125-148}, doi = {10.46586/TCHES.V2021.I3.125-148}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChenCK21, author = {Ming{-}Shing Chen and Tung Chou and Markus Krausz}, title = {Optimizing {BIKE} for the Intel Haswell and {ARM} Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {97--124}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.97-124}, doi = {10.46586/TCHES.V2021.I3.97-124}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChenCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengFGRR21, author = {Hao Cheng and Georgios Fotiadis and Johann Gro{\ss}sch{\"{a}}dl and Peter Y. A. Ryan and Peter B. R{\o}nne}, title = {Batching {CSIDH} Group Actions using {AVX-512}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {618--649}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.618-649}, doi = {10.46586/TCHES.V2021.I4.618-649}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengFGRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChengGCDM21, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean{-}Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: {A} Unified Quantification Approach}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {465--495}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.465-495}, doi = {10.46586/TCHES.V2021.I3.465-495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChouKY21, author = {Tung Chou and Matthias J. Kannwischer and Bo{-}Yin Yang}, title = {Rainbow on Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {650--675}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.650-675}, doi = {10.46586/TCHES.V2021.I4.650-675}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChouKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChungHKSSY21, author = {Chi{-}Ming Marvin Chung and Vincent Hwang and Matthias J. Kannwischer and Gregor Seiler and Cheng{-}Jhih Shih and Bo{-}Yin Yang}, title = {{NTT} Multiplication for NTT-unfriendly Rings New Speed Records for Saber and {NTRU} on Cortex-M4 and {AVX2}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {159--188}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.159-188}, doi = {10.46586/TCHES.V2021.I2.159-188}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChungHKSSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CostesS21, author = {Nicolas Costes and Martijn Stam}, title = {Redundant Code-based Masking Revisited}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {426--450}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.426-450}, doi = {10.46586/TCHES.V2021.I1.426-450}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CostesS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DuvalMMS21, author = {S{\'{e}}bastien Duval and Pierrick M{\'{e}}aux and Charles Momin and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {373--401}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.373-401}, doi = {10.46586/TCHES.V2021.I1.373-401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DuvalMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GaoGMPPR21, author = {Si Gao and Johann Gro{\ss}sch{\"{a}}dl and Ben Marshall and Dan Page and Thinh Hung Pham and Francesco Regazzoni}, title = {An Instruction Set Extension to Support Software-Based Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {283--325}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.283-325}, doi = {10.46586/TCHES.V2021.I4.283-325}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GaoGMPPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GoudarziPRV21, author = {Dahmun Goudarzi and Thomas Prest and Matthieu Rivain and Damien Vergnaud}, title = {Probing Security through Input-Output Separation and Revisited Quasilinear Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {599--640}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.599-640}, doi = {10.46586/TCHES.V2021.I3.599-640}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GoudarziPRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GreconiciKS21, author = {Denisa O. C. Greconici and Matthias J. Kannwischer and Amber Sprenkels}, title = {Compact Dilithium Implementations on Cortex-M3 and Cortex-M4}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {1--24}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.1-24}, doi = {10.46586/TCHES.V2021.I1.1-24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GreconiciKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuimaraesBA21, author = {Antonio Guimar{\~{a}}es and Edson Borin and Diego F. Aranha}, title = {Revisiting the functional bootstrap in {TFHE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {229--253}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.229-253}, doi = {10.46586/TCHES.V2021.I2.229-253}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuimaraesBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HamburgHPSSSSV21, author = {Mike Hamburg and Julius Hermelink and Robert Primas and Simona Samardjiska and Thomas Schamberger and Silvan Streit and Emanuele Strieder and Christine van Vredendaal}, title = {Chosen Ciphertext k-Trace Attacks on Masked {CCA2} Secure Kyber}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {88--113}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.88-113}, doi = {10.46586/TCHES.V2021.I4.88-113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HamburgHPSSSSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HerrewegenOGT21, author = {Jan Van den Herrewegen and David F. Oswald and Flavio D. Garcia and Qais Temeiza}, title = {Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {56--81}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.56-81}, doi = {10.46586/TCHES.V2021.I1.56-81}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HerrewegenOGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HettwerLFGG21, author = {Benjamin Hettwer and Sebastien Leger and Daniel Fennes and Stefan Gehrer and Tim G{\"{u}}neysu}, title = {Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {279--304}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.279-304}, doi = {10.46586/TCHES.V2021.I1.279-304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HettwerLFGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HoffmannP21, author = {Max Hoffmann and Christof Paar}, title = {Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {82--108}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.82-108}, doi = {10.46586/TCHES.V2021.I1.82-108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HoffmannP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JinLCKH21, author = {Sunghyun Jin and Sangyub Lee and Sung Min Cho and HeeSeok Kim and Seokhie Hong}, title = {Novel Key Recovery Attack on Secure {ECDSA} Implementation by Exploiting Collisions between Unknown Entries}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {1--26}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.1-26}, doi = {10.46586/TCHES.V2021.I4.1-26}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JinLCKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JungKACL21, author = {Wonkyung Jung and Sangpyo Kim and Jung Ho Ahn and Jung Hee Cheon and Younho Lee}, title = {Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {114--148}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.114-148}, doi = {10.46586/TCHES.V2021.I4.114-148}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/JungKACL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KoikeI21, author = {Yuji Koike and Takanori Isobe}, title = {Yoroi: Updatable Whitebox Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {587--617}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.587-617}, doi = {10.46586/TCHES.V2021.I4.587-617}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KoikeI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LaPPK21, author = {Tuan La and Khoa Dang Pham and Joseph Powell and Dirk Koch}, title = {Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {441--464}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.441-464}, doi = {10.46586/TCHES.V2021.I3.441-464}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LaPPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LeanderMMR21, author = {Gregor Leander and Thorben Moos and Amir Moradi and Shahram Rasoolzadeh}, title = {The {SPEEDY} Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {510--545}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.510-545}, doi = {10.46586/TCHES.V2021.I4.510-545}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LeanderMMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LisovetsKMM21, author = {Oleksiy Lisovets and David Knichel and Thorben Moos and Amir Moradi}, title = {Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through {SCA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {496--519}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.496-519}, doi = {10.46586/TCHES.V2021.I3.496-519}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LisovetsKMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LuZCGL21, author = {Xiangjun Lu and Chi Zhang and Pei Cao and Dawu Gu and Haining Lu}, title = {Pay Attention to Raw Traces: {A} Deep Learning Architecture for End-to-End Profiling Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {235--274}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.235-274}, doi = {10.46586/TCHES.V2021.I3.235-274}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/LuZCGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MarshallNPSW21, author = {Ben Marshall and G. Richard Newell and Dan Page and Markku{-}Juhani O. Saarinen and Claire Wolf}, title = {The design of scalar {AES} Instruction Set Extensions for {RISC-V}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {109--136}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.109-136}, doi = {10.46586/TCHES.V2021.I1.109-136}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MarshallNPSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeraKKV21, author = {Jose Maria Bermudo Mera and Angshuman Karmakar and Suparna Kundu and Ingrid Verbauwhede}, title = {Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {474--509}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.474-509}, doi = {10.46586/TCHES.V2021.I4.474-509}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeraKKV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MingLZCQ21, author = {Jingdian Ming and Huizhong Li and Yongbin Zhou and Wei Cheng and Zehua Qiao}, title = {Revealing the Weakness of Addition Chain Based Masked SBox Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {326--350}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.326-350}, doi = {10.46586/TCHES.V2021.I4.326-350}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MingLZCQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoosM21, author = {Thorben Moos and Amir Moradi}, title = {Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm {CMOS} -}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {780--805}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.780-805}, doi = {10.46586/TCHES.V2021.I3.780-805}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MoosM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoosWM21, author = {Thorben Moos and Felix Wegener and Amir Moradi}, title = {{DL-LA:} Deep Learning Leakage Assessment {A} modern roadmap for {SCA} evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {552--598}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.552-598}, doi = {10.46586/TCHES.V2021.I3.552-598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MoosWM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NaitoSS21, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, title = {{AES-LBBB:} {AES} Mode for Lightweight and BBB-Secure Authenticated Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {298--333}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.298-333}, doi = {10.46586/TCHES.V2021.I3.298-333}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NaitoSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NakaiSF21, author = {Tsunato Nakai and Daisuke Suzuki and Takeshi Fujino}, title = {Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {149--175}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.149-175}, doi = {10.46586/TCHES.V2021.I3.149-175}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NakaiSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NatarajanD21, author = {Deepika Natarajan and Wei Dai}, title = {SEAL-Embedded: {A} Homomorphic Encryption Library for the Internet of Things}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {756--779}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.756-779}, doi = {10.46586/TCHES.V2021.I3.756-779}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NatarajanD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NgoDGJ21, author = {Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson}, title = {A Side-Channel Attack on a Masked {IND-CCA} Secure Saber {KEM} Implementation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {676--707}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.676-707}, doi = {10.46586/TCHES.V2021.I4.676-707}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/NgoDGJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PerinCBP21, author = {Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek}, title = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {343--372}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.343-372}, doi = {10.46586/TCHES.V2021.I1.343-372}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PerinCBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PesslP21, author = {Peter Pessl and Lukas Prokop}, title = {Fault Attacks on CCA-secure Lattice KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {37--60}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.37-60}, doi = {10.46586/TCHES.V2021.I2.37-60}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PesslP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Richter-Brockmann21, author = {Jan Richter{-}Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim G{\"{u}}neysu}, title = {{FIVER} - Robust Verification of Countermeasures against Fault Injections}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {447--473}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.447-473}, doi = {10.46586/TCHES.V2021.I4.447-473}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Richter-Brockmann21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RijsdijkWPP21, author = {Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {677--707}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.677-707}, doi = {10.46586/TCHES.V2021.I3.677-707}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RijsdijkWPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SchinkWUH21, author = {Marc Schink and Alexander Wagner and Florian Unterstein and Johann Heyszl}, title = {Security and Trust in Open Source Security Tokens}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {176--201}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.176-201}, doi = {10.46586/TCHES.V2021.I3.176-201}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SchinkWUH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SekerEL21, author = {Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz}, title = {A White-Box Masking Scheme Resisting Computational and Algebraic Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {61--105}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.61-105}, doi = {10.46586/TCHES.V2021.I2.61-105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SekerEL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SenguptaLS21, author = {Abhrajit Sengupta and Nimisha Limaye and Ozgur Sinanoglu}, title = {Breaking CAS-Lock and Its Variants by Exploiting Structural Traces}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {418--440}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.418-440}, doi = {10.46586/TCHES.V2021.I3.418-440}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SenguptaLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShahmirzadiBM21, author = {Aein Rezaei Shahmirzadi and Dusan Bozilov and Amir Moradi}, title = {New First-Order Secure {AES} Performance Records}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {304--327}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.304-327}, doi = {10.46586/TCHES.V2021.I2.304-327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShahmirzadiBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShahmirzadiM21, author = {Aein Rezaei Shahmirzadi and Amir Moradi}, title = {Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {305--342}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.305-342}, doi = {10.46586/TCHES.V2021.I1.305-342}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShahmirzadiM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShahmirzadiM21a, author = {Aein Rezaei Shahmirzadi and Amir Moradi}, title = {Second-Order {SCA} Security with almost no Fresh Randomness}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {708--755}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.708-755}, doi = {10.46586/TCHES.V2021.I3.708-755}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ShahmirzadiM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SimJB21, author = {Siang Meng Sim and Dirmanto Jap and Shivam Bhasin}, title = {{DAPA:} Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {169--191}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.169-191}, doi = {10.46586/TCHES.V2021.I1.169-191}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SimJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SpruytMC21, author = {Albert Spruyt and Alyssa Milburn and Lukasz Chmielewski}, title = {Fault Injection as an Oscilloscope: Fault Correlation Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {192--216}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.192-216}, doi = {10.46586/TCHES.V2021.I1.192-216}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SpruytMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/StolzASKNGFPGT21, author = {Florian Stolz and Nils Albartus and Julian Speith and Simon Klix and Clemens Nasenberg and Aiden Gula and Marc Fyrbiak and Christof Paar and Tim G{\"{u}}neysu and Russell Tessier}, title = {LifeLine for {FPGA} Protection: Obfuscated Cryptography for Real-World Security}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {412--446}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.412-446}, doi = {10.46586/TCHES.V2021.I4.412-446}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/StolzASKNGFPGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/StriederFP21, author = {Emanuele Strieder and Christoph Frisch and Michael Pehl}, title = {Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the Fuzzy Commitment Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {1--36}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.1-36}, doi = {10.46586/TCHES.V2021.I2.1-36}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/StriederFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ThomasHVCOG21, author = {Sam L. Thomas and Jan Van den Herrewegen and Georgios Vasilakis and Zitai Chen and Mihai Ordean and Flavio D. Garcia}, title = {Cutting Through the Complexity of Reverse Engineering Embedded Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {360--389}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.360-389}, doi = {10.46586/TCHES.V2021.I3.360-389}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ThomasHVCOG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TobischAB21, author = {Johannes Tobisch and Anita Aghaie and Georg T. Becker}, title = {Combining Optimization Objectives: New Modeling Attacks on Strong PUFs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {357--389}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.357-389}, doi = {10.46586/TCHES.V2021.I2.357-389}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TobischAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TrimoskaID21, author = {Monika Trimoska and Sorina Ionica and Gilles Dequen}, title = {Time-Memory Analysis of Parallel Collision Search Algorithms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {254--274}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.254-274}, doi = {10.46586/TCHES.V2021.I2.254-274}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TrimoskaID21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ValivetiV21, author = {Annapurna Valiveti and Srinivas Vivek}, title = {Higher-Order Lookup Table Masking in Essentially Constant Memory}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {546--586}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.546-586}, doi = {10.46586/TCHES.V2021.I4.546-586}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ValivetiV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersGP21, author = {Lennert Wouters and Benedikt Gierlichs and Bart Preneel}, title = {My other car is your car: compromising the Tesla Model {X} keyless entry system}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {149--172}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.149-172}, doi = {10.46586/TCHES.V2021.I4.149-172}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersGP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/XingL21, author = {Yufei Xing and Shuguo Li}, title = {A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism {CRYSTALS-KYBER} on {FPGA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {2}, pages = {328--356}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i2.328-356}, doi = {10.46586/TCHES.V2021.I2.328-356}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/XingL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZaidBDHV21, author = {Gabriel Zaid and Lilian Bossuet and Fran{\c{c}}ois Dassance and Amaury Habrard and Alexandre Venelli}, title = {Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {1}, pages = {25--55}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i1.25-55}, doi = {10.46586/TCHES.V2021.I1.25-55}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZaidBDHV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZaidBHV21, author = {Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli}, title = {Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - {A} Case Study on Public-Key Algorithms -}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {3}, pages = {60--96}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i3.60-96}, doi = {10.46586/TCHES.V2021.I3.60-96}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZaidBHV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZareiSSSM21, author = {Sara Zarei and Aein Rezaei Shahmirzadi and Hadi Soleimany and Raziyeh Salarifard and Amir Moradi}, title = {Low-Latency Keccak at any Arbitrary Order}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2021}, number = {4}, pages = {388--411}, year = {2021}, url = {https://doi.org/10.46586/tches.v2021.i4.388-411}, doi = {10.46586/TCHES.V2021.I4.388-411}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZareiSSSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AdomnicaiNP20, author = {Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin}, title = {Fixslicing: {A} New {GIFT} Representation Fast Constant-Time Implementations of {GIFT} and {GIFT-COFB} on {ARM} Cortex-M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {402--427}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.402-427}, doi = {10.13154/TCHES.V2020.I3.402-427}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AdomnicaiNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlbartusHTAP20, author = {Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar}, title = {{DANA} Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {309--336}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.309-336}, doi = {10.13154/TCHES.V2020.I4.309-336}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlbartusHTAP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AldayaB20, author = {Alejandro Cabrera Aldaya and Billy Bob Brumley}, title = {When one vulnerable primitive turns viral: Novel single-trace attacks on {ECDSA} and {RSA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {196--221}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.196-221}, doi = {10.13154/TCHES.V2020.I2.196-221}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AldayaB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AldayaGB20, author = {Alejandro Cabrera Aldaya and Cesar Pereida Garc{\'{\i}}a and Billy Bob Brumley}, title = {From {A} to {Z:} Projective coordinates leakage in the wild}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {428--453}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.428-453}, doi = {10.13154/TCHES.V2020.I3.428-453}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AldayaGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlkimBCG20, author = {Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and Fran{\c{c}}ois G{\'{e}}rard}, title = {Cortex-M4 optimizations for \{R, M\} {LWE} schemes}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {336--357}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.336-357}, doi = {10.13154/TCHES.V2020.I3.336-357}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlkimBCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlkimELNP20, author = {Erdem Alkim and H{\"{u}}lya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri}, title = {{ISA} Extensions for Finite Field Arithmetic Accelerating Kyber and NewHope on {RISC-V}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {219--242}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.219-242}, doi = {10.13154/TCHES.V2020.I3.219-242}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AlkimELNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BachePOSG20, author = {Florian Bache and Clara Paglialonga and Tobias Oder and Tobias Schneider and Tim G{\"{u}}neysu}, title = {High-Speed Masking for Polynomial Comparison in Lattice-based KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {483--507}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.483-507}, doi = {10.13154/TCHES.V2020.I3.483-507}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BachePOSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BertiGPPS20, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, title = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {256--320}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.256-320}, doi = {10.13154/TCHES.V2020.I1.256-320}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BhasinBHJPS20, author = {Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim}, title = {{SITM:} See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on {SPN} Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {95--122}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.95-122}, doi = {10.13154/TCHES.V2020.I1.95-122}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BhasinBHJPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BockABM20, author = {Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels}, title = {On the Security Goals of White-Box Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {327--357}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.327-357}, doi = {10.13154/TCHES.V2020.I2.327-357}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BockABM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BragaFS20, author = {Daniel De Almeida Braga and Pierre{-}Alain Fouque and Mohamed Sabt}, title = {The Long and Winding Path to Secure Implementation of GlobalPlatform {SCP10}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {196--218}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.196-218}, doi = {10.13154/TCHES.V2020.I3.196-218}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BragaFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainS20, author = {Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {1--25}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.1-25}, doi = {10.13154/TCHES.V2020.I2.1-25}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BronchainS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CamuratiFS20, author = {Giovanni Camurati and Aur{\'{e}}lien Francillon and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {358--401}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.358-401}, doi = {10.13154/TCHES.V2020.I3.358-401}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CamuratiFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DaemenDEGMP20, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {508--543}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.508-543}, doi = {10.13154/TCHES.V2020.I3.508-543}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FrittoliBMCRFSB20, author = {Luca Frittoli and Matteo Bocchi and Silvia Mella and Diego Carrera and Beatrice Rossi and Pasqualina Fragneto and Ruggero Susella and Giacomo Boracchi}, title = {Strengthening Sequential Side-Channel Attacks Through Change Detection}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {1--21}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.1-21}, doi = {10.13154/TCHES.V2020.I3.1-21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FrittoliBMCRFSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FritzmannSS20, author = {Tim Fritzmann and Georg Sigl and Johanna Sep{\'{u}}lveda}, title = {{RISQ-V:} Tightly Coupled {RISC-V} Accelerators for Post-Quantum Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {239--280}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.239-280}, doi = {10.13154/TCHES.V2020.I4.239-280}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/FritzmannSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GaoMPO20, author = {Si Gao and Ben Marshall and Dan Page and Elisabeth Oswald}, title = {Share-slicing: Friend or Foe?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {152--174}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.152-174}, doi = {10.13154/TCHES.V2020.I1.152-174}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GaoMPO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GaoMPP20, author = {Si Gao and Ben Marshall and Dan Page and Thinh Hung Pham}, title = {{FENL:} an {ISE} to mitigate analogue micro-architectural leakage}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {73--98}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.73-98}, doi = {10.13154/TCHES.V2020.I2.73-98}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GaoMPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GenkinPSYZ20, author = {Daniel Genkin and Romain Poussier and Rui Qi Sim and Yuval Yarom and Yuanjing Zhao}, title = {Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {231--255}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.231-255}, doi = {10.13154/TCHES.V2020.I1.231-255}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GenkinPSYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GoubinRW20, author = {Louis Goubin and Matthieu Rivain and Junwei Wang}, title = {Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {454--482}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.454-482}, doi = {10.13154/TCHES.V2020.I3.454-482}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GoubinRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GuoGSB20, author = {Qian Guo and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Olivier Bronchain}, title = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {209--238}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.209-238}, doi = {10.13154/TCHES.V2020.I4.209-238}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/GuoGSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Hamburg20, author = {Mike Hamburg}, title = {Faster Montgomery and double-add ladders for short Weierstrass curves}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {189--208}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.189-208}, doi = {10.13154/TCHES.V2020.I4.189-208}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Hamburg20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HeyszlMUSWGFDKK20, author = {Johann Heyszl and Katja Miller and Florian Unterstein and Marc Schink and Alexander Wagner and Horst A. Gieser and Sven Freud and Tobias Damm and Dominik Klein and Dennis K{\"{u}}gler}, title = {Investigating Profiled Side-Channel Attacks Against the {DES} Key Schedule}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {22--72}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.22-72}, doi = {10.13154/TCHES.V2020.I3.22-72}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HeyszlMUSWGFDKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HoangHO20, author = {Anh{-}Tuan Hoang and Neil Hanley and M{\'{a}}ire O'Neill}, title = {Plaintext: {A} Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis? Breaking multiple layers of side-channel countermeasures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {49--85}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.49-85}, doi = {10.13154/TCHES.V2020.I4.49-85}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HoangHO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuangCY20, author = {Wei{-}Lun Huang and Jiun{-}Peng Chen and Bo{-}Yin Yang}, title = {Power Analysis on {NTRU} Prime}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {123--151}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.123-151}, doi = {10.13154/TCHES.V2020.I1.123-151}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HuangCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HuoMWHZZL20, author = {Tianlin Huo and Xiaoni Meng and Wenhao Wang and Chunliang Hao and Pei Zhao and Jian Zhai and Mingshu Li}, title = {Bluethunder: {A} 2-level Directional Predictor Based Side-Channel Attack against {SGX}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {321--347}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.321-347}, doi = {10.13154/TCHES.V2020.I1.321-347}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HuoMWHZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JancarSSS20, author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek S{\'{y}}s}, title = {Minerva: The curse of {ECDSA} nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of {ECDSA} nonces}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {281--308}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.281-308}, doi = {10.13154/TCHES.V2020.I4.281-308}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JancarSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KRRHB20, author = {Keerthi K. and Indrani Roy and Chester Rebeiro and Aritra Hazra and Swarup Bhunia}, title = {{FEDS:} Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {272--299}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.272-299}, doi = {10.13154/TCHES.V2020.I2.272-299}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KRRHB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KalesZ20, author = {Daniel Kales and Greg Zaverucha}, title = {Improving the Performance of the Picnic Signature Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {154--188}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.154-188}, doi = {10.13154/TCHES.V2020.I4.154-188}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KalesZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KannwischerPP20, author = {Matthias J. Kannwischer and Peter Pessl and Robert Primas}, title = {Single-Trace Attacks on Keccak}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {243--268}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.243-268}, doi = {10.13154/TCHES.V2020.I3.243-268}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KannwischerPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KrautterGT20, author = {Jonas Krautter and Dennis Gnad and Mehdi Baradaran Tahoori}, title = {CPAmap: On the Complexity of Secure {FPGA} Virtualization, Multi-Tenancy, and Physical Design}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {121--146}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.121-146}, doi = {10.13154/TCHES.V2020.I3.121-146}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KrautterGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MassolinoLRB20, author = {Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina}, title = {A Compact and Scalable Hardware/Software Co-design of {SIKE}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {245--271}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.245-271}, doi = {10.13154/TCHES.V2020.I2.245-271}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MassolinoLRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MasureDP20, author = {Lo{\"{\i}}c Masure and C{\'{e}}cile Dumas and Emmanuel Prouff}, title = {A Comprehensive Study of Deep Learning for Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {348--375}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.348-375}, doi = {10.13154/TCHES.V2020.I1.348-375}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MasureDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeraKV20, author = {Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede}, title = {Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {222--244}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.222-244}, doi = {10.13154/TCHES.V2020.I2.222-244}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeraKV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Meyer20, author = {Lauren De Meyer}, title = {Recovering the CTR{\_}DRBG state in 256 traces}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {37--65}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.37-65}, doi = {10.13154/TCHES.V2020.I1.37-65}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Meyer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MolteniZ20, author = {Maria Chiara Molteni and Vittorio Zaccaria}, title = {On the spectral features of robust probing security}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {24--48}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.24-48}, doi = {10.13154/TCHES.V2020.I4.24-48}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MolteniZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Moos20, author = {Thorben Moos}, title = {Unrolled Cryptography on Silicon {A} Physical Security Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {416--442}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.416-442}, doi = {10.13154/TCHES.V2020.I4.416-442}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Moos20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NaitoS20, author = {Yusuke Naito and Takeshi Sugawara}, title = {Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {66--94}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.66-94}, doi = {10.13154/TCHES.V2020.I1.66-94}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NaitoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PerinCP20, author = {Guilherme Perin and Lukasz Chmielewski and Stjepan Picek}, title = {Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {337--364}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.337-364}, doi = {10.13154/TCHES.V2020.I4.337-364}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PerinCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RaviRCB20, author = {Prasanna Ravi and Sujoy Sinha Roy and Anupam Chattopadhyay and Shivam Bhasin}, title = {Generic Side-channel attacks on CCA-secure lattice-based {PKE} and KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {307--335}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.307-335}, doi = {10.13154/TCHES.V2020.I3.307-335}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RaviRCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RoyB20, author = {Sujoy Sinha Roy and Andrea Basso}, title = {High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {443--466}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.443-466}, doi = {10.13154/TCHES.V2020.I4.443-466}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/RoyB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SasdrichBHM20, author = {Pascal Sasdrich and Beg{\"{u}}l Bilgin and Michael Hutter and Mark E. Marson}, title = {Low-Latency Hardware Masking with Application to {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {300--326}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.300-326}, doi = {10.13154/TCHES.V2020.I2.300-326}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/SasdrichBHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShakyaXTF20, author = {Bicky Shakya and Xiaolin Xu and Mark M. Tehranipoor and Domenic Forte}, title = {CAS-Lock: {A} Security-Corruptibility Trade-off Resilient Logic Locking Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {175--202}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.175-202}, doi = {10.13154/TCHES.V2020.I1.175-202}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ShakyaXTF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TanP20, author = {Quan Quan Tan and Thomas Peyrin}, title = {Improved Heuristics for Short Linear Programs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {203--230}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.203-230}, doi = {10.13154/TCHES.V2020.I1.203-230}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/TanP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UenoKH20, author = {Rei Ueno and Kohei Kazumori and Naofumi Homma}, title = {Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {86--128}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.86-128}, doi = {10.13154/TCHES.V2020.I4.86-128}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UenoKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UntersteinSSTIH20, author = {Florian Unterstein and Marc Schink and Thomas Schamberger and Lars Tebelmann and Manuel Ilg and Johann Heyszl}, title = {Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {365--388}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.365-388}, doi = {10.13154/TCHES.V2020.I4.365-388}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UntersteinSSTIH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ValivetiV20, author = {Annapurna Valiveti and Srinivas Vivek}, title = {Second-Order Masked Lookup Table Compression Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {129--153}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.129-153}, doi = {10.13154/TCHES.V2020.I4.129-153}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ValivetiV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangMCS20, author = {Weijia Wang and Pierrick M{\'{e}}aux and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient and Private Computations with Code-Based Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {128--171}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.128-171}, doi = {10.13154/TCHES.V2020.I2.128-171}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangMCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WangTJBLS20, author = {Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer}, title = {Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the {HW/SW} Co-Design of qTESLA}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {269--306}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.269-306}, doi = {10.13154/TCHES.V2020.I3.269-306}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WangTJBLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WeissmanTMCES20, author = {Zane Weissman and Thore Tiemann and Daniel Moghimi and Evan Custodio and Thomas Eisenbarth and Berk Sunar}, title = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {169--195}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.169-195}, doi = {10.13154/TCHES.V2020.I3.169-195}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WeissmanTMCES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WisiolMPNMSDR20, author = {Nils Wisiol and Christopher M{\"{u}}hl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean{-}Pierre Seifert and Marten van Dijk and Ulrich R{\"{u}}hrmair}, title = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {97--120}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.97-120}, doi = {10.13154/TCHES.V2020.I3.97-120}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WisiolMPNMSDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersAGP20, author = {Lennert Wouters and Victor Arribas and Benedikt Gierlichs and Bart Preneel}, title = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {147--168}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.147-168}, doi = {10.13154/TCHES.V2020.I3.147-168}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersHGOGP20, author = {Lennert Wouters and Jan Van den Herrewegen and Flavio D. Garcia and David F. Oswald and Benedikt Gierlichs and Bart Preneel}, title = {Dismantling DST80-based Immobiliser Systems}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {99--127}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.99-127}, doi = {10.13154/TCHES.V2020.I2.99-127}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WuP20, author = {Lichao Wu and Stjepan Picek}, title = {Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {389--415}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.389-415}, doi = {10.13154/TCHES.V2020.I4.389-415}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/WuP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZaidBHV20, author = {Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli}, title = {Methodology for Efficient {CNN} Architectures in Profiling Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {1--36}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.1-36}, doi = {10.13154/TCHES.V2020.I1.1-36}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ZaidBHV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangDF20, author = {Ziyue Zhang and A. Adam Ding and Yunsi Fei}, title = {A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {26--48}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.26-48}, doi = {10.13154/TCHES.V2020.I2.26-48}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangL20, author = {Zhendong Zhang and Peng Liu}, title = {A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {4}, pages = {1--23}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i4.1-23}, doi = {10.13154/TCHES.V2020.I4.1-23}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangYCYWL20, author = {Neng Zhang and Bohan Yang and Chen Chen and Shouyi Yin and Shaojun Wei and Leibo Liu}, title = {Highly Efficient Architecture of NewHope-NIST on {FPGA} using Low-Complexity {NTT/INTT}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {49--72}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.49-72}, doi = {10.13154/TCHES.V2020.I2.49-72}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangYCYWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangZJZBZLGR20, author = {Fan Zhang and Yiran Zhang and Huilong Jiang and Xiang Zhu and Shivam Bhasin and Xinjie Zhao and Zhe Liu and Dawu Gu and Kui Ren}, title = {Persistent Fault Attack in Practice}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {2}, pages = {172--195}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i2.172-195}, doi = {10.13154/TCHES.V2020.I2.172-195}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangZJZBZLGR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ZhangZNHY20, author = {Jiajia Zhang and Mengce Zheng and Jiehui Nan and Honggang Hu and Nenghai Yu}, title = {A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {73--96}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.73-96}, doi = {10.13154/TCHES.V2020.I3.73-96}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ZhangZNHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AkaviaFS19, author = {Adi Akavia and Dan Feldman and Hayim Shaul}, title = {Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {80--106}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.80-106}, doi = {10.13154/TCHES.V2019.I2.80-106}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AkaviaFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlbrechtHHPVW19, author = {Martin R. Albrecht and Christian Hanser and Andrea H{\"{o}}ller and Thomas P{\"{o}}ppelmann and Fernando Virdia and Andreas Wallner}, title = {Implementing RLWE-based Schemes Using an {RSA} Co-Processor}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {169--208}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.169-208}, doi = {10.13154/TCHES.V2019.I1.169-208}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlbrechtHHPVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AldayaGTB19, author = {Alejandro Cabrera Aldaya and Cesar Pereida Garc{\'{\i}}a and Luis Manuel Alvarez Tapia and Billy Bob Brumley}, title = {Cache-Timing Attacks on {RSA} Key Generation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {213--242}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.213-242}, doi = {10.13154/TCHES.V2019.I4.213-242}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AldayaGTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AzarKHS19, author = {Kimia Zamiri Azar and Hadi Mardani Kamali and Houman Homayoun and Avesta Sasan}, title = {{SMT} Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the {SAT} Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {97--122}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.97-122}, doi = {10.13154/TCHES.V2019.I1.97-122}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AzarKHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BanerjeeUC19, author = {Utsav Banerjee and Tenzin S. Ukyab and Anantha P. Chandrakasan}, title = {Sapphire: {A} Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {17--61}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.17-61}, doi = {10.13154/TCHES.V2019.I4.17-61}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BanerjeeUC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BernsteinY19, author = {Daniel J. Bernstein and Bo{-}Yin Yang}, title = {Fast constant-time gcd computation and modular inversion}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {340--398}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.340-398}, doi = {10.13154/TCHES.V2019.I3.340-398}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BernsteinY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BozzatoFP19, author = {Claudio Bozzato and Riccardo Focardi and Francesco Palmarini}, title = {Shaping the Glitch: Optimizing Voltage Fault Injection Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {199--224}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.199-224}, doi = {10.13154/TCHES.V2019.I2.199-224}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BozzatoFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BronchainSS19, author = {Olivier Bronchain and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Multi-Tuple Leakage Detection and the Dependent Signal Issue}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {318--345}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.318-345}, doi = {10.13154/TCHES.V2019.I2.318-345}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BronchainSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CarboneCCDDDPV19, author = {Mathieu Carbone and Vincent Conin and Marie{-}Angela Cornelie and Fran{\c{c}}ois Dassance and Guillaume Dufresne and C{\'{e}}cile Dumas and Emmanuel Prouff and Alexandre Venelli}, title = {Deep Learning to Evaluate Secure {RSA} Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {132--161}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.132-161}, doi = {10.13154/TCHES.V2019.I2.132-161}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CarboneCCDDDPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CassiersS19, author = {Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {162--198}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.162-198}, doi = {10.13154/TCHES.V2019.I2.162-198}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CassiersS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CheriseyGRP19, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida}, title = {Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {49--79}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.49-79}, doi = {10.13154/TCHES.V2019.I2.49-79}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CheriseyGRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FaugerePR19, author = {Jean{-}Charles Faug{\`{e}}re and Ludovic Perret and Jocelyn Ryckeghem}, title = {Software Toolkit for HFE-based Multivariate Schemes}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {257--304}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.257-304}, doi = {10.13154/TCHES.V2019.I3.257-304}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/FaugerePR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GnadKT19, author = {Dennis R. E. Gnad and Jonas Krautter and Mehdi Baradaran Tahoori}, title = {Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {305--339}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.305-339}, doi = {10.13154/TCHES.V2019.I3.305-339}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GnadKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HaaseL19, author = {Bj{\"{o}}rn Haase and Beno{\^{\i}}t Labrique}, title = {AuCPace: Efficient verifier-based {PAKE} protocol tailored for the IIoT}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {1--48}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.1-48}, doi = {10.13154/TCHES.V2019.I2.1-48}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HaaseL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HouBZL19, author = {Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu}, title = {Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {1--29}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.1-29}, doi = {10.13154/TCHES.V2019.I3.1-29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HouBZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ImmlerONKLLOWS19, author = {Vincent Immler and Johannes Obermaier and Kuan Kuan Ng and Fei Xiang Ke and JinYu Lee and Yak Peng Lim and Wei Koon Oh and Keng Hoong Wee and Georg Sigl}, title = {Secure Physical Enclosures from Covers with Tamper-Resistance}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {51--96}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.51-96}, doi = {10.13154/TCHES.V2019.I1.51-96}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ImmlerONKLLOWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ImmlerU19, author = {Vincent Immler and Karthik Uppund}, title = {New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {30--65}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.30-65}, doi = {10.13154/TCHES.V2019.I3.30-65}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ImmlerU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KarimiMM19, author = {Naghmeh Karimi and Thorben Moos and Amir Moradi}, title = {Exploring the Effect of Device Aging on Static Power Analysis Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {233--256}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.233-256}, doi = {10.13154/TCHES.V2019.I3.233-256}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/KarimiMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KimPHBH19, author = {Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic}, title = {Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {148--179}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.148-179}, doi = {10.13154/TCHES.V2019.I3.148-179}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KimPHBH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KinugawaFH19, author = {Masahiro Kinugawa and Daisuke Fujimoto and Yu{-}ichi Hayashi}, title = {Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {62--90}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.62-90}, doi = {10.13154/TCHES.V2019.I4.62-90}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/KinugawaFH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LeviBS19, author = {Itamar Levi and Davide Bellizia and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {293--317}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.293-317}, doi = {10.13154/TCHES.V2019.I2.293-317}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/LeviBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LyubashevskyS19, author = {Vadim Lyubashevsky and Gregor Seiler}, title = {{NTTRU:} Truly Fast {NTRU} Using {NTT}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {180--201}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.180-201}, doi = {10.13154/TCHES.V2019.I3.180-201}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/LyubashevskyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MaximovE19, author = {Alexander Maximov and Patrik Ekdahl}, title = {New Circuit Minimization Techniques for Smaller and Faster {AES} SBoxes}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {91--125}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.91-125}, doi = {10.13154/TCHES.V2019.I4.91-125}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MaximovE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MentensGVVSDM19, author = {Nele Mentens and Jan Genoe and Thomas Vandenabeele and Lynn Verschueren and Dirk Smets and Wim Dehaene and Kris Myny}, title = {Security on Plastics: Fake or Real?}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {1--16}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.1-16}, doi = {10.13154/TCHES.V2019.I4.1-16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MentensGVVSDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeyerANNR19, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M{\&}M: Masks and Macs against Physical Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {25--50}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.25-50}, doi = {10.13154/TCHES.V2019.I1.25-50}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeyerBR19, author = {Lauren De Meyer and Beg{\"{u}}l Bilgin and Oscar Reparaz}, title = {Consolidating Security Notions in Hardware Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {119--147}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.119-147}, doi = {10.13154/TCHES.V2019.I3.119-147}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeyerBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Moos19, author = {Thorben Moos}, title = {Static Power {SCA} of Sub-100 nm {CMOS} ASICs and the Insecurity of Masking Schemes in Low-Noise Environments}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {202--232}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.202-232}, doi = {10.13154/TCHES.V2019.I3.202-232}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Moos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoosMSS19, author = {Thorben Moos and Amir Moradi and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {256--292}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.256-292}, doi = {10.13154/TCHES.V2019.I2.256-292}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MoosMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NguyenSJMRD19, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich R{\"{u}}hrmair and Marten van Dijk}, title = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art Machine Learning Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {243--290}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.243-290}, doi = {10.13154/TCHES.V2019.I4.243-290}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/NguyenSJMRD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NilssonJS19, author = {Alexander Nilsson and Thomas Johansson and Paul Stankovski}, title = {Error Amplification in Code-based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {238--258}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.238-258}, doi = {10.13154/TCHES.V2019.I1.238-258}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/NilssonJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/OFlynnD19, author = {Colin O'Flynn and Alex Dewar}, title = {On-Device Power Analysis Across Hardware Security Domains. Stop Hitting Yourself}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {126--153}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.126-153}, doi = {10.13154/TCHES.V2019.I4.126-153}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/OFlynnD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Papachristodoulou19, author = {Louiza Papachristodoulou and Apostolos P. Fournaris and Kostas Papagiannopoulos and Lejla Batina}, title = {Practical Evaluation of Protected Residue Number System Scalar Multiplication}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {259--282}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.259-282}, doi = {10.13154/TCHES.V2019.I1.259-282}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Papachristodoulou19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PicekHJBR19, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni}, title = {The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {209--237}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.209-237}, doi = {10.13154/TCHES.V2019.I1.209-237}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/PicekHJBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RivainW19, author = {Matthieu Rivain and Junwei Wang}, title = {Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {225--255}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.225-255}, doi = {10.13154/TCHES.V2019.I2.225-255}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/RivainW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/RobynsQL19, author = {Pieter Robyns and Peter Quax and Wim Lamotte}, title = {Improving {CEMA} using Correlation Optimization}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {1--24}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.1-24}, doi = {10.13154/TCHES.V2019.I1.1-24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/RobynsQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Ryan19, author = {Keegan Ryan}, title = {Return of the Hidden Number Problem. {A} Widespread and Novel Key Extraction Attack on {ECDSA} and {DSA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {146--168}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.146-168}, doi = {10.13154/TCHES.V2019.I1.146-168}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Ryan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ShakyaSTF19, author = {Bicky Shakya and Hao{-}Ting Shen and Mark M. Tehranipoor and Domenic Forte}, title = {Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {86--118}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.86-118}, doi = {10.13154/TCHES.V2019.I3.86-118}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ShakyaSTF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SimKCCPH19, author = {Bo{-}Yeon Sim and Jihoon Kwon and Kyu Young Choi and Jihoon Cho and Aesun Park and Dong{-}Guk Han}, title = {Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {180--212}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.180-212}, doi = {10.13154/TCHES.V2019.I4.180-212}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/SimKCCPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Sugawara19, author = {Takeshi Sugawara}, title = {3-Share Threshold Implementation of {AES} S-box without Fresh Randomness}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {123--145}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.123-145}, doi = {10.13154/TCHES.V2019.I1.123-145}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/Sugawara19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Timon19, author = {Benjamin Timon}, title = {Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {2}, pages = {107--131}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i2.107-131}, doi = {10.13154/TCHES.V2019.I2.107-131}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Timon19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WahbyB19, author = {Riad S. Wahby and Dan Boneh}, title = {Fast and simple constant-time hashing to the {BLS12-381} elliptic curve}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {4}, pages = {154--179}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i4.154-179}, doi = {10.13154/TCHES.V2019.I4.154-179}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/WahbyB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/WoutersMAGP19, author = {Lennert Wouters and Eduard Marin and Tomer Ashur and Benedikt Gierlichs and Bart Preneel}, title = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {3}, pages = {66--85}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i3.66-85}, doi = {10.13154/TCHES.V2019.I3.66-85}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/0001RGMV18, author = {Bohan Yang and Vladimir Rozic and Milos Grujic and Nele Mentens and Ingrid Verbauwhede}, title = {{ES-TRNG:} {A} High-throughput, Low-area True Random Number Generator based on Edge Sampling}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {267--292}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.267-292}, doi = {10.13154/TCHES.V2018.I3.267-292}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/0001RGMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/0010L0BHDQR18, author = {Fan Zhang and Xiaoxuan Lou and Xinjie Zhao and Shivam Bhasin and Wei He and Ruyi Ding and Samiya Qureshi and Kui Ren}, title = {Persistent Fault Analysis on Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {150--172}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.150-172}, doi = {10.13154/TCHES.V2018.I3.150-172}, timestamp = {Tue, 13 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/0010L0BHDQR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlbrechtDP18, author = {Martin R. Albrecht and Amit Deo and Kenneth G. Paterson}, title = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {173--213}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.173-213}, doi = {10.13154/TCHES.V2018.I3.173-213}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AlbrechtDP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AlliniSPBLF18, author = {Elie Noumon Allini and Maciej Sk{\'{o}}rski and Oto Petura and Florent Bernard and Marek Laban and Viktor Fischer}, title = {Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {214--242}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.214-242}, doi = {10.13154/TCHES.V2018.I3.214-242}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AlliniSPBLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AmietCZ18, author = {Dorian Amiet and Andreas Curiger and Paul Zbinden}, title = {FPGA-based Accelerator for Post-Quantum Signature Scheme {SPHINCS-256}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {18--39}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.18-39}, doi = {10.13154/TCHES.V2018.I1.18-39}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AmietCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ArribasBPNR18, author = {Victor Arribas and Beg{\"{u}}l Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {269--290}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.269-290}, doi = {10.13154/TCHES.V2018.I1.269-290}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AvoineF18, author = {Gildas Avoine and Lo{\"{\i}}c Ferreira}, title = {Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {149--170}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.149-170}, doi = {10.13154/TCHES.V2018.I2.149-170}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AvoineF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BadawiVMA18, author = {Ahmad Al Badawi and Bharadwaj Veeravalli and Chan Fook Mun and Khin Mi Mi Aung}, title = {High-Performance {FV} Somewhat Homomorphic Encryption on GPUs: An Implementation using {CUDA}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {70--95}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.70-95}, doi = {10.13154/TCHES.V2018.I2.70-95}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BadawiVMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BettaleCZ18, author = {Luk Bettale and Jean{-}S{\'{e}}bastien Coron and Rina Zeitoun}, title = {Improved High-Order Conversion From Boolean to Arithmetic Masking}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {22--45}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.22-45}, doi = {10.13154/TCHES.V2018.I2.22-45}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BettaleCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BreierHL18, author = {Jakub Breier and Xiaolu Hou and Yang Liu}, title = {Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {96--122}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.96-122}, doi = {10.13154/TCHES.V2018.I2.96-122}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BreierHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BruinderinkP18, author = {Leon Groot Bruinderink and Peter Pessl}, title = {Differential Fault Attacks on Deterministic Lattice Signatures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {21--43}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.21-43}, doi = {10.13154/TCHES.V2018.I3.21-43}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/BruinderinkP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CathebrasCMSV18, author = {Jo{\"{e}}l Cath{\'{e}}bras and Alexandre Carbon and Peter A. Milder and Renaud Sirdey and Nicolas Ventroux}, title = {Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication for {SHE} Acceleration}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {69--88}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.69-88}, doi = {10.13154/TCHES.V2018.I3.69-88}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/CathebrasCMSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChabanneMP18, author = {Herv{\'{e}} Chabanne and Houssem Maghrebi and Emmanuel Prouff}, title = {Linear Repairing Codes and Side-Channel Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {118--141}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.118-141}, doi = {10.13154/TCHES.V2018.I1.118-141}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChabanneMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChakrabortiDNY18, author = {Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda}, title = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {218--241}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.218-241}, doi = {10.13154/TCHES.V2018.I2.218-241}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ChakrabortiDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChuangDFGLV18, author = {Kai{-}Hsin Chuang and Robin Degraeve and Andrea Fantini and Guido Groeseneken and Dimitri Linten and Ingrid Verbauwhede}, title = {A Cautionary Note When Looking for a Truly Reconfigurable Resistive {RAM} {PUF}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {98--117}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.98-117}, doi = {10.13154/TCHES.V2018.I1.98-117}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChuangDFGLV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CnuddeEM18, author = {Thomas De Cnudde and Maik Ender and Amir Moradi}, title = {Hardware Masking, Revisited}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {123--148}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.123-148}, doi = {10.13154/TCHES.V2018.I2.123-148}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CnuddeEM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/CoronRZ18, author = {Jean{-}S{\'{e}}bastien Coron and Franck Rondepierre and Rina Zeitoun}, title = {High Order Masking of Look-up Tables with Common Shares}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {40--72}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.40-72}, doi = {10.13154/TCHES.V2018.I1.40-72}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/CoronRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DallMEGHMY18, author = {Fergus Dall and Gabrielle De Micheli and Thomas Eisenbarth and Daniel Genkin and Nadia Heninger and Ahmad Moghimi and Yuval Yarom}, title = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID} via Cache Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {171--191}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.171-191}, doi = {10.13154/TCHES.V2018.I2.171-191}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DerbezFLM18, author = {Patrick Derbez and Pierre{-}Alain Fouque and Baptiste Lambin and Brice Minaud}, title = {On Recovering Affine Encodings in White-Box Implementations}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {121--149}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.121-149}, doi = {10.13154/TCHES.V2018.I3.121-149}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/DerbezFLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DinuK18, author = {Daniel Dinu and Ilya Kizhvatov}, title = {{EM} Analysis in the IoT Context: Lessons Learned from an Attack on Thread}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {73--97}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.73-97}, doi = {10.13154/TCHES.V2018.I1.73-97}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DinuK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DobraunigEKMMP18, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {547--572}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.547-572}, doi = {10.13154/TCHES.V2018.I3.547-572}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DucasKLLSSS18, author = {L{\'{e}}o Ducas and Eike Kiltz and Tancr{\`{e}}de Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehl{\'{e}}}, title = {CRYSTALS-Dilithium: {A} Lattice-Based Digital Signature Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {238--268}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.238-268}, doi = {10.13154/TCHES.V2018.I1.238-268}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DucasKLLSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FaustGPPS18, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults {\&} the Robust Probing Model}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {89--120}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.89-120}, doi = {10.13154/TCHES.V2018.I3.89-120}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/FyrbiakWDABTP18, author = {Marc Fyrbiak and Sebastian Wallat and Jonathan D{\'{e}}chelotte and Nils Albartus and Sinan B{\"{o}}cker and Russell Tessier and Christof Paar}, title = {On the Difficulty of FSM-based Hardware Obfuscation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {293--330}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.293-330}, doi = {10.13154/TCHES.V2018.I3.293-330}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/FyrbiakWDABTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GrossIB18, author = {Hannes Gro{\ss} and Rinat Iusupov and Roderick Bloem}, title = {Generic Low-Latency Masking in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {1--21}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.1-21}, doi = {10.13154/TCHES.V2018.I2.1-21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GrossIB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HicksGO18, author = {Christopher Hicks and Flavio D. Garcia and David F. Oswald}, title = {Dismantling the {AUT64} Automotive Cipher}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {46--69}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.46-69}, doi = {10.13154/TCHES.V2018.I2.46-69}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HicksGO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HoffmannP18, author = {Max Hoffmann and Christof Paar}, title = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {277--297}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.277-297}, doi = {10.13154/TCHES.V2018.I2.277-297}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HoffmannP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/HoweOKG18, author = {James Howe and Tobias Oder and Markus Krausz and Tim G{\"{u}}neysu}, title = {Standard Lattice-Based Key Encapsulation on Embedded Devices}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {372--393}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.372-393}, doi = {10.13154/TCHES.V2018.I3.372-393}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/HoweOKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/JungkPS18, author = {Bernhard Jungk and Richard Petri and Marc St{\"{o}}ttinger}, title = {Efficient Side-Channel Protections of {ARX} Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {627--653}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.627-653}, doi = {10.13154/TCHES.V2018.I3.627-653}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/JungkPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KarmakarMRV18, author = {Angshuman Karmakar and Jose Maria Bermudo Mera and Sujoy Sinha Roy and Ingrid Verbauwhede}, title = {Saber on {ARM} CCA-secure module lattice-based key encapsulation on {ARM}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {243--266}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.243-266}, doi = {10.13154/TCHES.V2018.I3.243-266}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/KarmakarMRV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KoppermannSHS18, author = {Philipp Koppermann and Fabrizio De Santis and Johann Heyszl and Georg Sigl}, title = {Fast {FPGA} Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.1-17}, doi = {10.13154/TCHES.V2018.I1.1-17}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/KoppermannSHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/KrautterGT18, author = {Jonas Krautter and Dennis R. E. Gnad and Mehdi Baradaran Tahoori}, title = {FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for {DFA} on {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {44--68}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.44-68}, doi = {10.13154/TCHES.V2018.I3.44-68}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/KrautterGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/LohrkeTKBS18, author = {Heiko Lohrke and Shahin Tajik and Thilo Krachenfels and Christian Boit and Jean{-}Pierre Seifert}, title = {Key Extraction Using Thermal Laser Stimulation {A} Case Study on Xilinx Ultrascale FPGAs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {573--595}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.573-595}, doi = {10.13154/TCHES.V2018.I3.573-595}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/LohrkeTKBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Mathieu-MahiasQ18, author = {Axel Mathieu{-}Mahias and Micha{\"{e}}l Quisquater}, title = {Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {175--208}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.175-208}, doi = {10.13154/TCHES.V2018.I1.175-208}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Mathieu-MahiasQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Meyer0W18, author = {Lauren De Meyer and Amir Moradi and Felix Wegener}, title = {Spin Me Right Round Rotational Symmetry for FPGA-Specific {AES}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {596--626}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.596-626}, doi = {10.13154/TCHES.V2018.I3.596-626}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Meyer0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeyerRB18, author = {Lauren De Meyer and Oscar Reparaz and Beg{\"{u}}l Bilgin}, title = {Multiplicative Masking for {AES} in Hardware}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {431--468}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.431-468}, doi = {10.13154/TCHES.V2018.I3.431-468}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeyerRB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MoradiRSS18, author = {Amir Moradi and Bastian Richter and Tobias Schneider and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Leakage Detection with the x2-Test}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {209--237}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.209-237}, doi = {10.13154/TCHES.V2018.I1.209-237}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/MoradiRSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/NaitoMSS18, author = {Yusuke Naito and Mitsuru Matsui and Takeshi Sugawara and Daisuke Suzuki}, title = {{SAEB:} {A} Lightweight Blockcipher-Based {AEAD} Mode of Operation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {192--217}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.192-217}, doi = {10.13154/TCHES.V2018.I2.192-217}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/NaitoMSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/OderSPG18, author = {Tobias Oder and Tobias Schneider and Thomas P{\"{o}}ppelmann and Tim G{\"{u}}neysu}, title = {Practical CCA2-Secure and Masked Ring-LWE Implementation}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {142--174}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.142-174}, doi = {10.13154/TCHES.V2018.I1.142-174}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/OderSPG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/PageR18, author = {Daniel Page and Matthieu Rivain}, title = {Preface to {TCHES} 2018}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {I--IV}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.I-IV}, doi = {10.13154/TCHES.V2018.I1.I-IV}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/PageR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Papagiannopoulos18, author = {Kostas Papagiannopoulos}, title = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {524--546}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.524-546}, doi = {10.13154/TCHES.V2018.I3.524-546}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Papagiannopoulos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Park018, author = {Jin Hyung Park and Dong Hoon Lee}, title = {{FACE:} Fast {AES} {CTR} mode Encryption Techniques based on the Reuse of Repetitive Data}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {469--499}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.469-499}, doi = {10.13154/TCHES.V2018.I3.469-499}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Park018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ParkSKH18, author = {Aesun Park and Kyung{-}Ah Shim and Namhun Koo and Dong{-}Guk Han}, title = {Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and {UOV} -}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {500--523}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.500-523}, doi = {10.13154/TCHES.V2018.I3.500-523}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ParkSKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Reyhani-Masoleh18, author = {Arash Reyhani{-}Masoleh and Mostafa M. I. Taha and Doaa Ashmawy}, title = {Smashing the Implementation Records of {AES} S-box}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {298--336}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.298-336}, doi = {10.13154/TCHES.V2018.I2.298-336}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Reyhani-Masoleh18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SahaMD18, author = {Sayandeep Saha and Debdeep Mukhopadhyay and Pallab Dasgupta}, title = {ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {242--276}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.242-276}, doi = {10.13154/TCHES.V2018.I2.242-276}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/SahaMD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/SekerFES18, author = {Okan Seker and Abraham Fernandez{-}Rubio and Thomas Eisenbarth and Rainer Steinwandt}, title = {Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {394--430}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.394-430}, doi = {10.13154/TCHES.V2018.I3.394-430}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/SekerFES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/Seo0LH18, author = {Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu}, title = {{SIDH} on {ARM:} Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {1--20}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.1-20}, doi = {10.13154/TCHES.V2018.I3.1-20}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/Seo0LH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TakahashiTA18, author = {Akira Takahashi and Mehdi Tibouchi and Masayuki Abe}, title = {New Bleichenbacher Records: Fault Attacks on qDSA Signatures}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {3}, pages = {331--371}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i3.331-371}, doi = {10.13154/TCHES.V2018.I3.331-371}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/TakahashiTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/0001LPRS17, author = {Zhe Liu and Patrick Longa and Geovandro C. C. F. Pereira and Oscar Reparaz and Hwajeong Seo}, editor = {Wieland Fischer and Naofumi Homma}, title = {Four {\textbackslash}mathbb {Q} on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {665--686}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_32}, doi = {10.1007/978-3-319-66787-4\_32}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/0001LPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AnceauBCMRT17, author = {St{\'{e}}phanie Anceau and Pierre Bleuet and Jessy Cl{\'{e}}di{\`{e}}re and Laurent Maingault and Jean{-}Luc Rainard and R{\'{e}}mi Tucoulou}, editor = {Wieland Fischer and Naofumi Homma}, title = {Nanofocused X-Ray Beam to Reprogram Secure Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {175--188}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_9}, doi = {10.1007/978-3-319-66787-4\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/AnceauBCMRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BanikPPSST17, author = {Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo}, editor = {Wieland Fischer and Naofumi Homma}, title = {{GIFT:} {A} Small Present - Towards Reaching the Limit of Lightweight Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {321--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_16}, doi = {10.1007/978-3-319-66787-4\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BanikPPSST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, editor = {Wieland Fischer and Naofumi Homma}, title = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {555--576}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_27}, doi = {10.1007/978-3-319-66787-4\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017, author = {Daniel J. Bernstein and Stefan K{\"{o}}lbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and Fran{\c{c}}ois{-}Xavier Standaert and Yosuke Todo and Beno{\^{\i}}t Viguier}, editor = {Wieland Fischer and Naofumi Homma}, title = {Gimli : {A} Cross-Platform Permutation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {299--320}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_15}, doi = {10.1007/978-3-319-66787-4\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BonteBBCIV17, author = {Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, editor = {Wieland Fischer and Naofumi Homma}, title = {Faster Homomorphic Function Evaluation Using Non-integral Base Encoding}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {579--600}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_28}, doi = {10.1007/978-3-319-66787-4\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BonteBBCIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CagliDP17, author = {Eleonora Cagli and C{\'{e}}cile Dumas and Emmanuel Prouff}, editor = {Wieland Fischer and Naofumi Homma}, title = {Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {45--68}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_3}, doi = {10.1007/978-3-319-66787-4\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CagliDP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChakrabortiIMN17, author = {Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi}, editor = {Wieland Fischer and Naofumi Homma}, title = {Blockcipher-Based Authenticated Encryption: How Small Can We Go?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {277--298}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_14}, doi = {10.1007/978-3-319-66787-4\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ChakrabortiIMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chou17, author = {Tung Chou}, editor = {Wieland Fischer and Naofumi Homma}, title = {McBits Revisited}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {213--231}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_11}, doi = {10.1007/978-3-319-66787-4\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chou17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChoudaryP17, author = {Marios O. Choudary and Pantelimon George Popescu}, editor = {Wieland Fischer and Naofumi Homma}, title = {Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {367--386}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_18}, doi = {10.1007/978-3-319-66787-4\_18}, timestamp = {Thu, 24 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChoudaryP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierR17, author = {Christophe Clavier and L{\'{e}}o Reynaud}, editor = {Wieland Fischer and Naofumi Homma}, title = {Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {24--44}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_2}, doi = {10.1007/978-3-319-66787-4\_2}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClavierR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Coron17, author = {Jean{-}S{\'{e}}bastien Coron}, editor = {Wieland Fischer and Naofumi Homma}, title = {High-Order Conversion from Boolean to Arithmetic Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {93--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_5}, doi = {10.1007/978-3-319-66787-4\_5}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Coron17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Daemen17, author = {Joan Daemen}, editor = {Wieland Fischer and Naofumi Homma}, title = {Changing of the Guards: {A} Simple and Efficient Method for Achieving Uniformity in Threshold Sharing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {137--153}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_7}, doi = {10.1007/978-3-319-66787-4\_7}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Daemen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoudarziRVV17, author = {Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek}, editor = {Wieland Fischer and Naofumi Homma}, title = {Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {154--171}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_8}, doi = {10.1007/978-3-319-66787-4\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GoudarziRVV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossM17, author = {Hannes Gro{\ss} and Stefan Mangard}, editor = {Wieland Fischer and Naofumi Homma}, title = {Reconciling d+1 Masking in Hardware and Software}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {115--136}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_6}, doi = {10.1007/978-3-319-66787-4\_6}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HaaseL17, author = {Bj{\"{o}}rn Haase and Beno{\^{\i}}t Labrique}, editor = {Wieland Fischer and Naofumi Homma}, title = {Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {346--364}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_17}, doi = {10.1007/978-3-319-66787-4\_17}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HaaseL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HillerO17, author = {Matthias Hiller and Aysun Gurur {\"{O}}nalan}, editor = {Wieland Fischer and Naofumi Homma}, title = {Hiding Secrecy Leakage in Leaky Helper Data}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {601--619}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_29}, doi = {10.1007/978-3-319-66787-4\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HillerO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HulsingRSS17, author = {Andreas H{\"{u}}lsing and Joost Rijneveld and John M. Schanck and Peter Schwabe}, editor = {Wieland Fischer and Naofumi Homma}, title = {High-Speed Key Encapsulation from {NTRU}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {232--252}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_12}, doi = {10.1007/978-3-319-66787-4\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HulsingRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ImmlerSU17, author = {Vincent Immler and Robert Specht and Florian Unterstein}, editor = {Wieland Fischer and Naofumi Homma}, title = {Your Rails Cannot Hide from Localized {EM:} How Dual-Rail Logic Fails on FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {403--424}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_20}, doi = {10.1007/978-3-319-66787-4\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ImmlerSU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JacobHZRS17, author = {Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl}, editor = {Wieland Fischer and Naofumi Homma}, title = {How to Break Secure Boot on {FPGA} SoCs Through Malicious Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {425--442}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_21}, doi = {10.1007/978-3-319-66787-4\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JacobHZRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JeanMPS17, author = {J{\'{e}}r{\'{e}}my Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, editor = {Wieland Fischer and Naofumi Homma}, title = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {687--707}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_33}, doi = {10.1007/978-3-319-66787-4\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JeanMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JournaultS17, author = {Anthony Journault and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Wieland Fischer and Naofumi Homma}, title = {Very High Order Masking: Efficient Implementation and Security Evaluation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {623--643}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_30}, doi = {10.1007/978-3-319-66787-4\_30}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JournaultS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MalisaKKSC17, author = {Luka Malisa and Kari Kostiainen and Thomas Knell and David M. Sommer and Srdjan Capkun}, editor = {Wieland Fischer and Naofumi Homma}, title = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {468--489}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_23}, doi = {10.1007/978-3-319-66787-4\_23}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MalisaKKSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoghimiIE17, author = {Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth}, editor = {Wieland Fischer and Naofumi Homma}, title = {CacheZoom: How {SGX} Amplifies the Power of Cache Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {69--90}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_4}, doi = {10.1007/978-3-319-66787-4\_4}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MoghimiIE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OlafsdottirRC17, author = {Hildur {\'{O}}lafsd{\'{o}}ttir and Aanjhan Ranganathan and Srdjan Capkun}, editor = {Wieland Fischer and Naofumi Homma}, title = {On the Security of Carrier Phase-Based Ranging}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {490--509}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_24}, doi = {10.1007/978-3-319-66787-4\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OlafsdottirRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoussierZS17, author = {Romain Poussier and Yuanyuan Zhou and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Wieland Fischer and Naofumi Homma}, title = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations with Worst-Case Horizontal Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {534--554}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_26}, doi = {10.1007/978-3-319-66787-4\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoussierZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PrimasPM17, author = {Robert Primas and Peter Pessl and Stefan Mangard}, editor = {Wieland Fischer and Naofumi Homma}, title = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {513--533}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_25}, doi = {10.1007/978-3-319-66787-4\_25}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PrimasPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ReisAL17, author = {Tiago B. S. Reis and Diego F. Aranha and Julio L{\'{o}}pez}, editor = {Wieland Fischer and Naofumi Homma}, title = {{PRESENT} Runs Fast - Efficient and Secure Implementation in Software}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {644--664}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_31}, doi = {10.1007/978-3-319-66787-4\_31}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ReisAL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ReparazGV17, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Wieland Fischer and Naofumi Homma}, title = {Fast Leakage Assessment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {387--399}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_19}, doi = {10.1007/978-3-319-66787-4\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ReparazGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RossiHHM17, author = {Melissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson}, editor = {Wieland Fischer and Naofumi Homma}, title = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {3--23}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_1}, doi = {10.1007/978-3-319-66787-4\_1}, timestamp = {Mon, 18 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RossiHHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ShinKKK17, author = {Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim}, editor = {Wieland Fischer and Naofumi Homma}, title = {Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {445--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_22}, doi = {10.1007/978-3-319-66787-4\_22}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ShinKKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WangSN17, author = {Wen Wang and Jakub Szefer and Ruben Niederhagen}, editor = {Wieland Fischer and Naofumi Homma}, title = {FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {253--274}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_13}, doi = {10.1007/978-3-319-66787-4\_13}, timestamp = {Thu, 11 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WangSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/XuSTF17, author = {Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte}, editor = {Wieland Fischer and Naofumi Homma}, title = {Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {189--210}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_10}, doi = {10.1007/978-3-319-66787-4\_10}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/XuSTF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2017, editor = {Wieland Fischer and Naofumi Homma}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4}, doi = {10.1007/978-3-319-66787-4}, isbn = {978-3-319-66786-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BattistelloCPZ16, author = {Alberto Battistello and Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Rina Zeitoun}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {23--39}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_2}, doi = {10.1007/978-3-662-53140-2\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BattistelloCPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BhattacharyaM16, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {602--624}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_29}, doi = {10.1007/978-3-662-53140-2\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BhattacharyaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosHMT16, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Differential Computation Analysis: Hiding Your White-Box Designs is Not Enough}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {215--236}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_11}, doi = {10.1007/978-3-662-53140-2\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BosHMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BossGGL0S16, author = {Erik Boss and Vincent Grosso and Tim G{\"{u}}neysu and Gregor Leander and Amir Moradi and Tobias Schneider}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Strong 8-bit Sboxes with Efficient Masking in Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {171--193}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_9}, doi = {10.1007/978-3-662-53140-2\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BossGGL0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruinderinkHLY16, author = {Leon Groot Bruinderink and Andreas H{\"{u}}lsing and Tanja Lange and Yuval Yarom}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Flush, Gauss, and Reload - {A} Cache Attack on the {BLISS} Lattice-Based Signature Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {323--345}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_16}, doi = {10.1007/978-3-662-53140-2\_16}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruinderinkHLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chou16, author = {Tung Chou}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {QcBits: Constant-Time Small-Key Code-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {280--300}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_14}, doi = {10.1007/978-3-662-53140-2\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chou16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Masking {AES} with d+1 Shares in Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {194--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_10}, doi = {10.1007/978-3-662-53140-2\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronGPZ16, author = {Jean{-}S{\'{e}}bastien Coron and Aur{\'{e}}lien Greuet and Emmanuel Prouff and Rina Zeitoun}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Faster Evaluation of SBoxes via Common Shares}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {498--514}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_24}, doi = {10.1007/978-3-662-53140-2\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronGPZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DelvauxGVHY16, author = {Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng{-}Day (Mandel) Yu}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {412--431}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_20}, doi = {10.1007/978-3-662-53140-2\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DelvauxGVHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DugardinGDNR16, author = {Margaux Dugardin and Sylvain Guilley and Jean{-}Luc Danger and Zakaria Najm and Olivier Rioul}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_1}, doi = {10.1007/978-3-662-53140-2\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DurvauxSP16, author = {Fran{\c{c}}ois Durvaux and Fran{\c{c}}ois{-}Xavier Standaert and Santos Merino Del Pozo}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Towards Easy Leakage Certification}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {40--60}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_3}, doi = {10.1007/978-3-662-53140-2\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DurvauxSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GanjiTFS16, author = {Fatemeh Ganji and Shahin Tajik and Fabian F{\"{a}}{\ss}ler and Jean{-}Pierre Seifert}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Strong Machine Learning Attack Against PUFs with No Mathematical Model}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {391--411}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_19}, doi = {10.1007/978-3-662-53140-2\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GanjiTFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GhandaliBHP16, author = {Samaneh Ghandali and Georg T. Becker and Daniel E. Holcomb and Christof Paar}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {625--647}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_30}, doi = {10.1007/978-3-662-53140-2\_30}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GhandaliBHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoudarziR16, author = {Dahmun Goudarzi and Matthieu Rivain}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {457--478}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_22}, doi = {10.1007/978-3-662-53140-2\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoudarziR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/InciGIES16, author = {Mehmet Sinan Inci and Berk G{\"{u}}lmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Cache Attacks Enable Bulk Key Recovery on the Cloud}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {368--388}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_18}, doi = {10.1007/978-3-662-53140-2\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/InciGIES16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JainG16, author = {Shalabh Jain and Jorge Guajardo}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Physical Layer Group Key Agreement for Automotive Controller Area Networks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {85--105}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_5}, doi = {10.1007/978-3-662-53140-2\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JainG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JarvinenMAL16, author = {Kimmo J{\"{a}}rvinen and Andrea Miele and Reza Azarderakhsh and Patrick Longa}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Four {\(\mathbb{Q}\)} on {FPGA:} New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {517--537}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_25}, doi = {10.1007/978-3-662-53140-2\_25}, timestamp = {Wed, 27 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JarvinenMAL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KammerstetterMB16, author = {Markus Kammerstetter and Markus Muellner and Daniel Burian and Christian Kudera and Wolfgang Kastner}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Efficient High-Speed {WPA2} Brute Force Attacks Using Scalable Low-Cost {FPGA} Clustering}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {559--577}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_27}, doi = {10.1007/978-3-662-53140-2\_27}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KammerstetterMB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LohrkeTBS16, author = {Heiko Lohrke and Shahin Tajik and Christian Boit and Jean{-}Pierre Seifert}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {No Place to Hide: Contactless Probing of Secret Data on FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {147--167}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_8}, doi = {10.1007/978-3-662-53140-2\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LohrkeTBS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/NurnbergerR16, author = {Stefan N{\"{u}}rnberger and Christian Rossow}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {- vatiCAN - Vetted, Authenticated {CAN} Bus}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {106--124}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_6}, doi = {10.1007/978-3-662-53140-2\_6}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/NurnbergerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OliveiraLR16, author = {Thomaz Oliveira and Julio L{\'{o}}pez and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Software Implementation of Koblitz Curves over Quadratic Fields}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {259--279}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_13}, doi = {10.1007/978-3-662-53140-2\_13}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OliveiraLR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoussierSG16, author = {Romain Poussier and Fran{\c{c}}ois{-}Xavier Standaert and Vincent Grosso}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {61--81}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_4}, doi = {10.1007/978-3-662-53140-2\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoussierSG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PulkusV16, author = {J{\"{u}}rgen Pulkus and Srinivas Vivek}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Reducing the Number of Non-linear Multiplications in Masking Schemes}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {479--497}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_23}, doi = {10.1007/978-3-662-53140-2\_23}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/PulkusV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenesSSB16, author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {{\textbackslash}mu Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {301--320}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_15}, doi = {10.1007/978-3-662-53140-2\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RenesSSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SahaC16, author = {Dhiman Saha and Dipanwita Roy Chowdhury}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on {PAEQ}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {581--601}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_28}, doi = {10.1007/978-3-662-53140-2\_28}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SahaC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/UenoMHA16, author = {Rei Ueno and Sumio Morioka and Naofumi Homma and Takafumi Aoki}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {A High Throughput/Gate {AES} Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {538--558}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_26}, doi = {10.1007/978-3-662-53140-2\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/UenoMHA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/XieS16, author = {Yang Xie and Ankur Srivastava}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Mitigating {SAT} Attack on Logic Locking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {127--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_7}, doi = {10.1007/978-3-662-53140-2\_7}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/XieS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/XiongSASG0S16, author = {Wenjie Xiong and Andr{\'{e}} Schaller and Nikolaos A. Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Stefan Katzenbeisser and Jakub Szefer}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Run-Time Accessible {DRAM} PUFs in Commodity Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {432--453}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_21}, doi = {10.1007/978-3-662-53140-2\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/XiongSASG0S16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YaromGH16, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {346--367}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_17}, doi = {10.1007/978-3-662-53140-2\_17}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YaromGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ZonenbergY16, author = {Andrew D. Zonenberg and B{\"{u}}lent Yener}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Antikernel: {A} Decentralized Secure Hardware-Software Operating System Architecture}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {237--256}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_12}, doi = {10.1007/978-3-662-53140-2\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ZonenbergY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2016, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2}, doi = {10.1007/978-3-662-53140-2}, isbn = {978-3-662-53139-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/0001SRGKV15, author = {Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Gro{\ss}sch{\"{a}}dl and Howon Kim and Ingrid Verbauwhede}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Efficient Ring-LWE Encryption on 8-Bit {AVR} Processors}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {663--682}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_33}, doi = {10.1007/978-3-662-48324-4\_33}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/0001SRGKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AysuGMSY15, author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {556--576}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_28}, doi = {10.1007/978-3-662-48324-4\_28}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/AysuGMSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BalaschGRV15, author = {Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {DPA, Bitslicing and Masking at 1 GHz}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {599--619}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_30}, doi = {10.1007/978-3-662-48324-4\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BalaschGRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BauerV15, author = {Aur{\'{e}}lie Bauer and Damien Vergnaud}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Practical Key Recovery for Discrete-Logarithm Based Authentication Schemes from Random Nonce Bits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {287--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_15}, doi = {10.1007/978-3-662-48324-4\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BauerV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Becker15, author = {Georg T. Becker}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {The Gap Between Promise and Reality: On the Insecurity of {XOR} Arbiter PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {535--555}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_27}, doi = {10.1007/978-3-662-48324-4\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Becker15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BelaidCFGKP15, author = {Sonia Bela{\"{\i}}d and Jean{-}S{\'{e}}bastien Coron and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Jean{-}Gabriel Kammerer and Emmanuel Prouff}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Improved Side-Channel Analysis of Finite-Field Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {395--415}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_20}, doi = {10.1007/978-3-662-48324-4\_20}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BelaidCFGKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BhattacharyaM15, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising Keys of {RSA} on Intel Platforms}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {248--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_13}, doi = {10.1007/978-3-662-48324-4\_13}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BhattacharyaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BigouT15, author = {Karim Bigou and Arnaud Tisserand}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Single Base Modular Multiplication for Efficient Hardware {RNS} Implementations of {ECC}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {123--140}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_7}, doi = {10.1007/978-3-662-48324-4\_7}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BigouT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruneauGHMR15, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {22--41}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_2}, doi = {10.1007/978-3-662-48324-4\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruneauGHMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BruneauGNT15, author = {Nicolas Bruneau and Sylvain Guilley and Zakaria Najm and Yannick Teglia}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Multi-variate High-Order Attacks of Shuffled Tables Recomputation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {475--494}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_24}, doi = {10.1007/978-3-662-48324-4\_24}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BruneauGNT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChakrabortiCHN15, author = {Avik Chakraborti and Anupam Chattopadhyay and Muhammad Hassan and Mridul Nandi}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {TriviA: {A} Fast and Secure Authenticated Encryption Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {330--353}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_17}, doi = {10.1007/978-3-662-48324-4\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ChakrabortiCHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoiselS15, author = {Iwen Coisel and Ignacio Sanchez}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Improved Cryptanalysis of the {DECT} Standard Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {269--286}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_14}, doi = {10.1007/978-3-662-48324-4\_14}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/CoiselS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DorozOSS15, author = {Yarkin Dor{\"{o}}z and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Erkay Savas and Berk Sunar}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Accelerating {LTV} Based Homomorphic Encryption in Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {185--204}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_10}, doi = {10.1007/978-3-662-48324-4\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DorozOSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GaleaMPT15, author = {Jake Longo and Elke De Mulder and Dan Page and Michael Tunstall}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {SoC It to {EM:} ElectroMagnetic Side-Channel Attacks on a Complex System-on-Chip}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {620--640}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_31}, doi = {10.1007/978-3-662-48324-4\_31}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GaleaMPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GenkinPPT15, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {207--228}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_11}, doi = {10.1007/978-3-662-48324-4\_11}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GenkinPPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HaddadFBN15, author = {Patrick Haddad and Viktor Fischer and Florent Bernard and Jean Nicolai}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {A Physical Approach for Stochastic Modeling of TERO-Based {TRNG}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {357--372}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_18}, doi = {10.1007/978-3-662-48324-4\_18}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HaddadFBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterSSW15, author = {Michael Hutter and J{\"{u}}rgen Schilling and Peter Schwabe and Wolfgang Wieser}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {NaCl's Crypto{\_}box in Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {81--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_5}, doi = {10.1007/978-3-662-48324-4\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HutterSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KelseyMT15, author = {John Kelsey and Kerry A. McKay and Meltem S{\"{o}}nmez Turan}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Predictive Models for Min-entropy Estimation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {373--392}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_19}, doi = {10.1007/978-3-662-48324-4\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KelseyMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KisonFP15, author = {Christian Kison and J{\"{u}}rgen Frinken and Christof Paar}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Finding the {AES} Bits in the Haystack: Reverse Engineering and {SCA} Using Voltage Contrast}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {641--660}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_32}, doi = {10.1007/978-3-662-48324-4\_32}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KisonFP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaesLSW15, author = {Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans M. J. Willems}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Secure Key Generation from Biased PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {517--534}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_26}, doi = {10.1007/978-3-662-48324-4\_26}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MaesLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiW15, author = {Amir Moradi and Alexander Wild}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Assessment of Hiding the Higher-Order Leakages in Hardware - What Are the Achievements Versus Overheads?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {453--474}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_23}, doi = {10.1007/978-3-662-48324-4\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MoradiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppelmannNPM15, author = {Thomas P{\"{o}}ppelmann and Michael Naehrig and Andrew Putnam and Adri{\'{a}}n Mac{\'{\i}}as}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Accelerating Homomorphic Evaluation on Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {143--163}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_8}, doi = {10.1007/978-3-662-48324-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppelmannNPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PozoS15, author = {Santos Merino Del Pozo and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Blind Source Separation from Single Measurements Using Singular Spectrum Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {42--59}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_3}, doi = {10.1007/978-3-662-48324-4\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PozoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenWW15, author = {Yanting Ren and An Wang and Liji Wu}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Transient-Steady Effect Attack on Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {433--450}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_22}, doi = {10.1007/978-3-662-48324-4\_22}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RenWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ReparazRVV15, author = {Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {A Masked Ring-LWE Implementation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {683--702}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_34}, doi = {10.1007/978-3-662-48324-4\_34}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ReparazRVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RoyJV15, author = {Sujoy Sinha Roy and Kimmo J{\"{a}}rvinen and Ingrid Verbauwhede}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Lightweight Coprocessor for Koblitz Curves: 283-Bit {ECC} Including Scalar Conversion with only 4300 Gates}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {102--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_6}, doi = {10.1007/978-3-662-48324-4\_6}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RoyJV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RoyJVDV15, author = {Sujoy Sinha Roy and Kimmo J{\"{a}}rvinen and Frederik Vercauteren and Vassil S. Dimitrov and Ingrid Verbauwhede}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {164--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_9}, doi = {10.1007/978-3-662-48324-4\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RoyJVDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SahaCNAM15, author = {Sayandeep Saha and Rajat Subhra Chakraborty and Srinivasa Shashank Nuthakki and Anshul and Debdeep Mukhopadhyay}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {577--596}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_29}, doi = {10.1007/978-3-662-48324-4\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SahaCNAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Schindler15, author = {Werner Schindler}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on {RSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {229--247}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_12}, doi = {10.1007/978-3-662-48324-4\_12}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Schindler15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchneiderM15, author = {Tobias Schneider and Amir Moradi}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Leakage Assessment Methodology - {A} Clear Roadmap for Side-Channel Evaluations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {495--513}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_25}, doi = {10.1007/978-3-662-48324-4\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SchneiderM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/UenoHSNA15, author = {Rei Ueno and Naofumi Homma and Yukihiro Sugawara and Yasuyuki Nogami and Takafumi Aoki}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Highly Efficient GF(2\({}^{\mbox{8}}\)) Inversion Circuit Based on Redundant {GF} Arithmetic and Its Application to {AES} Design}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {63--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_4}, doi = {10.1007/978-3-662-48324-4\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/UenoHSNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WangYLGSGXF15, author = {Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and Fran{\c{c}}ois{-}Xavier Standaert and Dawu Gu and Sen Xu and Rong Fu}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Evaluation and Improvement of Generic-Emulating {DPA} Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {416--432}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_21}, doi = {10.1007/978-3-662-48324-4\_21}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WangYLGSGXF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WhitnallO15, author = {Carolyn Whitnall and Elisabeth Oswald}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Robust Profiling for DPA-Style Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {3--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_1}, doi = {10.1007/978-3-662-48324-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WhitnallO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YangZSAG15, author = {Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {The Simeck Family of Lightweight Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {307--329}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_16}, doi = {10.1007/978-3-662-48324-4\_16}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YangZSAG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2015, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4}, doi = {10.1007/978-3-662-48324-4}, isbn = {978-3-662-48323-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BartheDFGTZ14, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Mehdi Tibouchi and Jean{-}Christophe Zapalowicz}, editor = {Lejla Batina and Matthew Robshaw}, title = {Making {RSA-PSS} Provably Secure against Non-random Faults}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {206--222}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_12}, doi = {10.1007/978-3-662-44709-3\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BartheDFGTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BauerJLPR14, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Victor Lomn{\'{e}} and Emmanuel Prouff and Thomas Roche}, editor = {Lejla Batina and Matthew Robshaw}, title = {Side-Channel Attack against {RSA} Key Generation Algorithms}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {223--241}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_13}, doi = {10.1007/978-3-662-44709-3\_13}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BauerJLPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BengerPSY14, author = {Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom}, editor = {Lejla Batina and Matthew Robshaw}, title = {"Ooh Aah... Just a Little Bit" : {A} Small Amount of Side Channel Can Go a Long Way}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {75--92}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_5}, doi = {10.1007/978-3-662-44709-3\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BengerPSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinCL14, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, editor = {Lejla Batina and Matthew Robshaw}, title = {Curve41417: Karatsuba Revisited}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {316--334}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_18}, doi = {10.1007/978-3-662-44709-3\_18}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BernsteinCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrennerGLRS14, author = {Hai Brenner and Lubos Gaspar and Ga{\"{e}}tan Leurent and Alon Rosen and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Lejla Batina and Matthew Robshaw}, title = {{FPGA} Implementations of {SPRING} - And Their Countermeasures against Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {414--432}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_23}, doi = {10.1007/978-3-662-44709-3\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrennerGLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierMW14, author = {Christophe Clavier and Damien Marion and Antoine Wurcker}, editor = {Lejla Batina and Matthew Robshaw}, title = {Simple Power Analysis on {AES} Key Expansion Revisited}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {279--297}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_16}, doi = {10.1007/978-3-662-44709-3\_16}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ClavierMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Coron0V14, author = {Jean{-}S{\'{e}}bastien Coron and Arnab Roy and Srinivas Vivek}, editor = {Lejla Batina and Matthew Robshaw}, title = {Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {170--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_10}, doi = {10.1007/978-3-662-44709-3\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Coron0V14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronGV14, author = {Jean{-}S{\'{e}}bastien Coron and Johann Gro{\ss}sch{\"{a}}dl and Praveen Kumar Vadnala}, editor = {Lejla Batina and Matthew Robshaw}, title = {Secure Conversion between Boolean and Arithmetic Masking of Any Order}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {188--205}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_11}, doi = {10.1007/978-3-662-44709-3\_11}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/CoronGV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DelvauxGSV14, author = {Jeroen Delvaux and Dawu Gu and Dries Schellekens and Ingrid Verbauwhede}, editor = {Lejla Batina and Matthew Robshaw}, title = {Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {451--475}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_25}, doi = {10.1007/978-3-662-44709-3\_25}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DelvauxGSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DingZFL14, author = {A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo}, editor = {Lejla Batina and Matthew Robshaw}, title = {A Statistical Model for Higher Order {DPA} on Masked Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {147--169}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_9}, doi = {10.1007/978-3-662-44709-3\_9}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DingZFL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FischerL14, author = {Viktor Fischer and David Lubicz}, editor = {Lejla Batina and Matthew Robshaw}, title = {Embedded Evaluation of Randomness in Oscillator Based Elementary {TRNG}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {527--543}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_29}, doi = {10.1007/978-3-662-44709-3\_29}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/FischerL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GenkinPT14, author = {Daniel Genkin and Itamar Pipman and Eran Tromer}, editor = {Lejla Batina and Matthew Robshaw}, title = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {242--260}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_14}, doi = {10.1007/978-3-662-44709-3\_14}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GenkinPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HeuserRG14, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, editor = {Lejla Batina and Matthew Robshaw}, title = {Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication Theory}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {55--74}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_4}, doi = {10.1007/978-3-662-44709-3\_4}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HeuserRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HolcombF14, author = {Daniel E. Holcomb and Kevin Fu}, editor = {Lejla Batina and Matthew Robshaw}, title = {Bitline {PUF:} Building Native Challenge-Response {PUF} Capability into Any {SRAM}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {510--526}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_28}, doi = {10.1007/978-3-662-44709-3\_28}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HolcombF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HommaHMFTNA14, author = {Naofumi Homma and Yu{-}ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki}, editor = {Lejla Batina and Matthew Robshaw}, title = {{EM} Attack Is Non-invasive? - Design Methodology and Validity Verification of {EM} Attack Sensor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_1}, doi = {10.1007/978-3-662-44709-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HommaHMFTNA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KhooPPY14, author = {Khoongming Khoo and Thomas Peyrin and Axel York Poschmann and Huihui Yap}, editor = {Lejla Batina and Matthew Robshaw}, title = {{FOAM:} Searching for Hardware-Optimal {SPN} Structures and Components with a Fair Comparison}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {433--450}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_24}, doi = {10.1007/978-3-662-44709-3\_24}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KhooPPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KunihiroH14, author = {Noboru Kunihiro and Junya Honda}, editor = {Lejla Batina and Matthew Robshaw}, title = {{RSA} Meets {DPA:} Recovering {RSA} Secret Keys from Noisy Analog Data}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {261--278}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_15}, doi = {10.1007/978-3-662-44709-3\_15}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KunihiroH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeisersonMW14, author = {Andrew J. Leiserson and Mark E. Marson and Megan A. Wachs}, editor = {Lejla Batina and Matthew Robshaw}, title = {Gate-Level Masking under a Path-Based Leakage Metric}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {580--597}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_32}, doi = {10.1007/978-3-662-44709-3\_32}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/LeisersonMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiW14, author = {Yongqiang Li and Mingsheng Wang}, editor = {Lejla Batina and Matthew Robshaw}, title = {Constructing S-boxes for Lightweight Cryptography with Feistel Structure}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {127--146}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_8}, doi = {10.1007/978-3-662-44709-3\_8}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LomnePRRT14, author = {Victor Lomn{\'{e}} and Emmanuel Prouff and Matthieu Rivain and Thomas Roche and Adrian Thillard}, editor = {Lejla Batina and Matthew Robshaw}, title = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {35--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_3}, doi = {10.1007/978-3-662-44709-3\_3}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/LomnePRRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaLCXLJ14, author = {Yuan Ma and Jingqiang Lin and Tianyu Chen and Changwei Xu and Zongbin Liu and Jiwu Jing}, editor = {Lejla Batina and Matthew Robshaw}, title = {Entropy Evaluation for Oscillator-Based True Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {544--561}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_30}, doi = {10.1007/978-3-662-44709-3\_30}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MaLCXLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MieleBKL14, author = {Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra}, editor = {Lejla Batina and Matthew Robshaw}, title = {Cofactorization on Graphics Processing Units}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {335--352}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_19}, doi = {10.1007/978-3-662-44709-3\_19}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MieleBKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Moradi14, author = {Amir Moradi}, editor = {Lejla Batina and Matthew Robshaw}, title = {Side-Channel Leakage through Static Power - Should We Care about in Practice?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {562--579}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_31}, doi = {10.1007/978-3-662-44709-3\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Moradi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiI14, author = {Amir Moradi and Vincent Immler}, editor = {Lejla Batina and Matthew Robshaw}, title = {Early Propagation and Imbalanced Routing, How to Diminish in FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {598--615}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_33}, doi = {10.1007/978-3-662-44709-3\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MorawieckiGHMPRSW14, author = {Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin W{\'{o}}jcik}, editor = {Lejla Batina and Matthew Robshaw}, title = {{ICEPOLE:} High-Speed, Hardware-Oriented Authenticated Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {392--413}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_22}, doi = {10.1007/978-3-662-44709-3\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MorawieckiGHMPRSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenWW14, author = {Yossef Oren and Ofir Weisse and Avishai Wool}, editor = {Lejla Batina and Matthew Robshaw}, title = {A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {17--34}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_2}, doi = {10.1007/978-3-662-44709-3\_2}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppelmannDG14, author = {Thomas P{\"{o}}ppelmann and L{\'{e}}o Ducas and Tim G{\"{u}}neysu}, editor = {Lejla Batina and Matthew Robshaw}, title = {Enhanced Lattice-Based Signatures on Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {353--370}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_20}, doi = {10.1007/978-3-662-44709-3\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppelmannDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RoyVMCV14, author = {Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede}, editor = {Lejla Batina and Matthew Robshaw}, title = {Compact Ring-LWE Cryptoprocessor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {371--391}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_21}, doi = {10.1007/978-3-662-44709-3\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RoyVMCV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RuhrmairXSMMKB14, author = {Ulrich R{\"{u}}hrmair and Xiaolin Xu and Jan S{\"{o}}lter and Ahmed Mahmoud and Mehrdad Majzoobi and Farinaz Koushanfar and Wayne P. Burleson}, editor = {Lejla Batina and Matthew Robshaw}, title = {Efficient Power and Timing Side Channels for Physical Unclonable Functions}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {476--492}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_26}, doi = {10.1007/978-3-662-44709-3\_26}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RuhrmairXSMMKB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SugawaraSFTHSF14, author = {Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino}, editor = {Lejla Batina and Matthew Robshaw}, title = {Reversing Stealthy Dopant-Level Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {112--126}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_7}, doi = {10.1007/978-3-662-44709-3\_7}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SugawaraSFTHSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TajikDFSNHBD14, author = {Shahin Tajik and Enrico Dietz and Sven Frohmann and Jean{-}Pierre Seifert and Dmitry Nedospasov and Clemens Helfmeier and Christian Boit and Helmar Dittrich}, editor = {Lejla Batina and Matthew Robshaw}, title = {Physical Characterization of Arbiter PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {493--509}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_27}, doi = {10.1007/978-3-662-44709-3\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TajikDFSNHBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TupsamudreBM14, author = {Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay}, editor = {Lejla Batina and Matthew Robshaw}, title = {Destroying Fault Invariant with Randomization - {A} Countermeasure for {AES} Against Differential Fault Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {93--111}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_6}, doi = {10.1007/978-3-662-44709-3\_6}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/TupsamudreBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/UnterluggauerW14, author = {Thomas Unterluggauer and Erich Wenger}, editor = {Lejla Batina and Matthew Robshaw}, title = {Efficient Pairings and {ECC} for Embedded Systems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {298--315}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_17}, doi = {10.1007/978-3-662-44709-3\_17}, timestamp = {Sun, 23 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/UnterluggauerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2014, editor = {Lejla Batina and Matthew Robshaw}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3}, doi = {10.1007/978-3-662-44709-3}, isbn = {978-3-662-44708-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AbdallaBF13, author = {Michel Abdalla and Sonia Bela{\"{\i}}d and Pierre{-}Alain Fouque}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Leakage-Resilient Symmetric Encryption via Re-keying}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {471--488}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_27}, doi = {10.1007/978-3-642-40349-1\_27}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/AbdallaBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BanikM13, author = {Subhadeep Banik and Subhamoy Maitra}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {A Differential Fault Attack on {MICKEY} 2.0}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {215--232}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_13}, doi = {10.1007/978-3-642-40349-1\_13}, timestamp = {Thu, 01 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BanikM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BayrakRNI13, author = {Ali Galip Bayrak and Francesco Regazzoni and David Novo and Paolo Ienne}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Sleuth: Automated Verification of Software Power Analysis Countermeasures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {293--310}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_17}, doi = {10.1007/978-3-642-40349-1\_17}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BayrakRNI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BeckerRPB13, author = {Georg T. Becker and Francesco Regazzoni and Christof Paar and Wayne P. Burleson}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Stealthy Dopant-Level Hardware Trojans}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {197--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_12}, doi = {10.1007/978-3-642-40349-1\_12}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BeckerRPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinCS13, author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {McBits: Fast Constant-Time Code-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {250--272}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_15}, doi = {10.1007/978-3-642-40349-1\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BhargavaM13, author = {Mudit Bhargava and Ken Mai}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {A High Reliability {PUF} Using Hot Carrier Injection Based Response Reinforcement}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {90--106}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_6}, doi = {10.1007/978-3-642-40349-1\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BhargavaM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BigouT13, author = {Karim Bigou and Arnaud Tisserand}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Improving Modular Inversion in {RNS} Using the Plus-Minus Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {233--249}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_14}, doi = {10.1007/978-3-642-40349-1\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BigouT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BilginBKMW13, author = {Beg{\"{u}}l Bilgin and Andrey Bogdanov and Miroslav Knezevic and Florian Mendel and Qingju Wang}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {142--158}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_9}, doi = {10.1007/978-3-642-40349-1\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BilginBKMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosCHL13, author = {Joppe W. Bos and Craig Costello and H{\"{u}}seyin Hisil and Kristin E. Lauter}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {High-Performance Scalar Multiplication Using 8-Dimensional {GLV/GLS} Decomposition}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {331--348}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_19}, doi = {10.1007/978-3-642-40349-1\_19}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BosCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CherkaouiFFA13, author = {Abdelkarim Cherkaoui and Viktor Fischer and Laurent Fesquet and Alain Aubert}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {A Very High Speed True Random Number Generator with Entropy Assessment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {179--196}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_11}, doi = {10.1007/978-3-642-40349-1\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CherkaouiFFA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GerardGNS13, author = {Beno{\^{\i}}t G{\'{e}}rard and Vincent Grosso and Mar{\'{\i}}a Naya{-}Plasencia and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Block Ciphers That Are Easier to Mask: How Far Can We Go?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {383--399}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_22}, doi = {10.1007/978-3-642-40349-1\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GerardGNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GhoshKDV13, author = {Santosh Ghosh and Amit Kumar and Amitabh Das and Ingrid Verbauwhede}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {On the Implementation of Unified Arithmetic on Binary Huff Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {349--364}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_20}, doi = {10.1007/978-3-642-40349-1\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GhoshKDV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossoSF13, author = {Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert and Sebastian Faust}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {400--416}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_23}, doi = {10.1007/978-3-642-40349-1\_23}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GrossoSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HeyseMG13, author = {Stefan Heyse and Ingo von Maurich and Tim G{\"{u}}neysu}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Smaller Keys for Code-Based Cryptography: {QC-MDPC} McEliece Implementations on Embedded Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {273--292}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_16}, doi = {10.1007/978-3-642-40349-1\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HeyseMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LashermesFG13, author = {Ronan Lashermes and Jacques J. A. Fournier and Louis Goubin}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic Curves Using Faults}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {365--382}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_21}, doi = {10.1007/978-3-642-40349-1\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LashermesFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiZFV13, author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {A New Model for Error-Tolerant Side-Channel Cube Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {453--470}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_26}, doi = {10.1007/978-3-642-40349-1\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiZFV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Maes13, author = {Roel Maes}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {An Accurate Probabilistic Reliability Model for Silicon PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {73--89}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_5}, doi = {10.1007/978-3-642-40349-1\_5}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Maes13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiM13, author = {Amir Moradi and Oliver Mischke}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {On the Simplicity of Converting Leakages from Multivariate to Univariate - (Case Study of a Glitch-Resistant Masking Scheme)}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {1--20}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_1}, doi = {10.1007/978-3-642-40349-1\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MulderHMP13, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit {ECDSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {435--452}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_25}, doi = {10.1007/978-3-642-40349-1\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MulderHMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OliveiraLAR13, author = {Thomaz Oliveira and Julio L{\'{o}}pez and Diego F. Aranha and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Lambda Coordinates for Binary Elliptic Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {311--330}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_18}, doi = {10.1007/978-3-642-40349-1\_18}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OliveiraLAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenSW13, author = {Yossef Oren and Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {107--125}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_7}, doi = {10.1007/978-3-642-40349-1\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PesslH13, author = {Peter Pessl and Michael Hutter}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Pushing the Limits of {SHA-3} Hardware Implementations to Fit on {RFID}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {126--141}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_8}, doi = {10.1007/978-3-642-40349-1\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PesslH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RoyV13, author = {Arnab Roy and Srinivas Vivek}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Analysis and Improvement of the Generic Higher-Order Masking Scheme of {FSE} 2012}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {417--434}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_24}, doi = {10.1007/978-3-642-40349-1\_24}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RoyV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ShoukryMTS13, author = {Yasser Shoukry and Paul D. Martin and Paulo Tabuada and Mani B. Srivastava}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Non-invasive Spoofing Attacks for Anti-lock Braking Systems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {55--72}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_4}, doi = {10.1007/978-3-642-40349-1\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ShoukryMTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SugawaraSSSF13, author = {Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {On Measurable Side-Channel Leaks Inside {ASIC} Design Primitives}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {159--178}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_10}, doi = {10.1007/978-3-642-40349-1\_10}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SugawaraSSSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ThillardPR13, author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {21--36}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_2}, doi = {10.1007/978-3-642-40349-1\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ThillardPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WhitnallO13, author = {Carolyn Whitnall and Elisabeth Oswald}, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Profiling {DPA:} Efficacy and Efficiency Trade-Offs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, pages = {37--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1\_3}, doi = {10.1007/978-3-642-40349-1\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WhitnallO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2013, editor = {Guido Bertoni and Jean{-}S{\'{e}}bastien Coron}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8086}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40349-1}, doi = {10.1007/978-3-642-40349-1}, isbn = {978-3-642-40348-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BanikMS12, author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {A Differential Fault Attack on the Grain Family of Stream Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {122--139}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_8}, doi = {10.1007/978-3-642-33027-8\_8}, timestamp = {Mon, 15 Jun 2020 17:09:16 +0200}, biburl = {https://dblp.org/rec/conf/ches/BanikMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinS12, author = {Daniel J. Bernstein and Peter Schwabe}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {{NEON} Crypto}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {320--339}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_19}, doi = {10.1007/978-3-642-33027-8\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BilginNNRS12, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg St{\"{u}}tz}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Threshold Implementations of All 3 {\texttimes}3 and 4 {\texttimes}4 S-Boxes}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {76--91}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_5}, doi = {10.1007/978-3-642-33027-8\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BilginNNRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12, author = {S{\'{e}}bastien Briais and St{\'{e}}phane Caron and Jean{-}Michel Cioranesco and Jean{-}Luc Danger and Sylvain Guilley and Jacques{-}Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {3D Hardware Canaries}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {1--22}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_1}, doi = {10.1007/978-3-642-33027-8\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChengCNY12, author = {Chen{-}Mou Cheng and Tung Chou and Ruben Niederhagen and Bo{-}Yin Yang}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Solving Quadratic Equations with {XL} on Parallel Architectures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {356--373}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_21}, doi = {10.1007/978-3-642-33027-8\_21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChengCNY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CzypekHT12, author = {Peter Czypek and Stefan Heyse and Enrico Thomae}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Efficient Implementations of {MQPKS} on Constrained Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {374--389}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_22}, doi = {10.1007/978-3-642-33027-8\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CzypekHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Debraize12, author = {Blandine Debraize}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Efficient and Provably Secure Methods for Switching from Arithmetic to Boolean Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {107--121}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_7}, doi = {10.1007/978-3-642-33027-8\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Debraize12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FaustPS12, author = {Sebastian Faust and Krzysztof Pietrzak and Joachim Schipper}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Practical Leakage-Resilient Symmetric Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {213--232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_13}, doi = {10.1007/978-3-642-33027-8\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FaustPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FeiLD12, author = {Yunsi Fei and Qiasi Luo and A. Adam Ding}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {A Statistical Model for {DPA} with Novel Algorithmic Confusion Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {233--250}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_14}, doi = {10.1007/978-3-642-33027-8\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FeiLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueGLTZ12, author = {Pierre{-}Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean{-}Christophe Zapalowicz}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Attacking {RSA-CRT} Signatures with Faults on Montgomery Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {447--462}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_26}, doi = {10.1007/978-3-642-33027-8\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/FouqueGLTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GerardS12, author = {Beno{\^{\i}}t G{\'{e}}rard and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {175--192}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_11}, doi = {10.1007/978-3-642-33027-8\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GerardS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GottertFSBH12, author = {Norman G{\"{o}}ttert and Thomas Feller and Michael Schneider and Johannes Buchmann and Sorin A. Huss}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {On the Design of Hardware Building Blocks for Modern Lattice-Based Encryption Schemes}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {512--529}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_30}, doi = {10.1007/978-3-642-33027-8\_30}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GottertFSBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuneysuLP12, author = {Tim G{\"{u}}neysu and Vadim Lyubashevsky and Thomas P{\"{o}}ppelmann}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Practical Lattice-Based Cryptography: {A} Signature Scheme for Embedded Systems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {530--547}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_31}, doi = {10.1007/978-3-642-33027-8\_31}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GuneysuLP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HeyseG12, author = {Stefan Heyse and Tim G{\"{u}}neysu}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography on Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {340--355}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_20}, doi = {10.1007/978-3-642-33027-8\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HeyseG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KatzenbeisserKRSVW12, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vladimir Rozic and Ahmad{-}Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {PUFs: Myth, Fact or Busted? {A} Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {283--301}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_17}, doi = {10.1007/978-3-642-33027-8\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KatzenbeisserKRSVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KerckhofDHBS12, author = {St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Durvaux and C{\'{e}}dric Hocquet and David Bol and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Towards Green Cryptography: {A} Comparison of Lightweight Ciphers from the Energy Viewpoint}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {390--407}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_23}, doi = {10.1007/978-3-642-33027-8\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KerckhofDHBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KnezevicNR12, author = {Miroslav Knezevic and Ventzislav Nikov and Peter Rombouts}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Low-Latency Encryption - Is "Lightweight = Light + Wait"?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {426--446}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_25}, doi = {10.1007/978-3-642-33027-8\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KnezevicNR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeeCCL12, author = {Jen{-}Wei Lee and Szu{-}Chi Chung and Hsie{-}Chia Chang and Chen{-}Yi Lee}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {An Efficient Countermeasure against Correlation Power-Analysis Attacks with Randomized Montgomery Operations for {DF-ECC} Processor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {548--564}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_32}, doi = {10.1007/978-3-642-33027-8\_32}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeeCCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeestPS12, author = {Vincent van der Leest and Bart Preneel and Erik van der Sluis}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Soft Decision Error Correction for Compact Memory-Based PUFs Using a Single Enrollment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {268--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_16}, doi = {10.1007/978-3-642-33027-8\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeestPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaesHV12, author = {Roel Maes and Anthony Van Herrewege and Ingrid Verbauwhede}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {{PUFKY:} {A} Fully Functional PUF-Based Cryptographic Key Generator}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {302--319}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_18}, doi = {10.1007/978-3-642-33027-8\_18}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MaesHV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MatsudaM12, author = {Seiichi Matsuda and Shiho Moriai}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {408--425}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_24}, doi = {10.1007/978-3-642-33027-8\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MatsudaM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MedwedSJ12, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert and Antoine Joux}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient PRFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {193--212}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_12}, doi = {10.1007/978-3-642-33027-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MedwedSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiM12, author = {Amir Moradi and Oliver Mischke}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {How Far Should Theory Be from Practice? - Evaluation of a Countermeasure}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {92--106}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_6}, doi = {10.1007/978-3-642-33027-8\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MossOPT12, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Compiler Assisted Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {58--75}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_4}, doi = {10.1007/978-3-642-33027-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MossOPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenRSW12, author = {Yossef Oren and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Avishai Wool}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {140--154}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_9}, doi = {10.1007/978-3-642-33027-8\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenRSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RebeiroRM12, author = {Chester Rebeiro and Sujoy Sinha Roy and Debdeep Mukhopadhyay}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Pushing the Limits of High-Speed {GF(2} m {)} Elliptic Curve Scalar Multiplication on FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {494--511}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_29}, doi = {10.1007/978-3-642-33027-8\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RebeiroRM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ReparazGV12, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Selecting Time Samples for Multivariate {DPA} Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {155--174}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_10}, doi = {10.1007/978-3-642-33027-8\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ReparazGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RuhrmairD12, author = {Ulrich R{\"{u}}hrmair and Marten van Dijk}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Practical Security Analysis of PUF-Based Two-Player Protocols}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {251--267}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_15}, doi = {10.1007/978-3-642-33027-8\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RuhrmairD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SarkarM12, author = {Santanu Sarkar and Subhamoy Maitra}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Side Channel Attack to Actual Cryptanalysis: Breaking {CRT-RSA} with Low Weight Decryption Exponents}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {476--493}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_28}, doi = {10.1007/978-3-642-33027-8\_28}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SarkarM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchlosserNKOS12, author = {Alexander Schl{\"{o}}sser and Dmitry Nedospasov and Juliane Kr{\"{a}}mer and Susanna Orlic and Jean{-}Pierre Seifert}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Simple Photonic Emission Analysis of {AES} - Photonic Side Channel Analysis for the Rest of Us}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {41--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_3}, doi = {10.1007/978-3-642-33027-8\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchlosserNKOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SkorobogatovW12, author = {Sergei Skorobogatov and Christopher Woods}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Breakthrough Silicon Scanning Discovers Backdoor in Military Chip}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {23--40}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_2}, doi = {10.1007/978-3-642-33027-8\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SkorobogatovW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Vielhaber12, author = {Michael Vielhaber}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication Plus: How to Break {RSA} by {DPA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {463--475}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_27}, doi = {10.1007/978-3-642-33027-8\_27}, timestamp = {Fri, 15 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Vielhaber12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2012, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8}, doi = {10.1007/978-3-642-33027-8}, isbn = {978-3-642-33026-1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinDLSY11, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo{-}Yin Yang}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {High-Speed High-Security Signatures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {124--142}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_9}, doi = {10.1007/978-3-642-23951-9\_9}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinDLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovKLTVV11, author = {Andrey Bogdanov and Miroslav Knezevic and Gregor Leander and Deniz Toz and Kerem Varici and Ingrid Verbauwhede}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {spongent: {A} Lightweight Hash Function}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {312--325}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_21}, doi = {10.1007/978-3-642-23951-9\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BogdanovKLTVV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosOS11, author = {Joppe W. Bos and Onur {\"{O}}zen and Martijn Stam}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Efficient Hashing Using the {AES} Instruction Set}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {507--522}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_33}, doi = {10.1007/978-3-642-23951-9\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BosOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrierNNT11, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Modulus Fault Attacks against {RSA-CRT} Signatures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {192--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_13}, doi = {10.1007/978-3-642-23951-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrierNNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CheungDFGVY11, author = {Ray C. C. Cheung and Sylvain Duquesne and Junfeng Fan and Nicolas Guillermin and Ingrid Verbauwhede and Gavin Xiaoxu Yao}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {{FPGA} Implementation of Pairings Using Residue Number System and Lazy Reduction}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {421--441}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_28}, doi = {10.1007/978-3-642-23951-9\_28}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CheungDFGVY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierFGRV11, author = {Christophe Clavier and Benoit Feix and Georges Gagnerot and Myl{\`{e}}ne Roussellet and Vincent Verneuil}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Improved Collision-Correlation Power Analysis on First Order Protected {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {49--62}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_4}, doi = {10.1007/978-3-642-23951-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClavierFGRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DerbezFL11, author = {Patrick Derbez and Pierre{-}Alain Fouque and Delphine Leresteux}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Meet-in-the-Middle and Impossible Differential Fault Analysis on {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {274--291}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_19}, doi = {10.1007/978-3-642-23951-9\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DerbezFL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FanGV11, author = {Junfeng Fan and Benedikt Gierlichs and Frederik Vercauteren}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {To Infinity and Beyond: Combined Attack on {ECC} Using Points of Low Order}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {143--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_10}, doi = {10.1007/978-3-642-23951-9\_10}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FanGV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GenellePQ11, author = {Laurie Genelle and Emmanuel Prouff and Micha{\"{e}}l Quisquater}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {240--255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_16}, doi = {10.1007/978-3-642-23951-9\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GenellePQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GhoshCD11, author = {Santosh Ghosh and Dipanwita Roy Chowdhury and Abhijit Das}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {High Speed Cryptoprocessor for {\(\eta\)} {T} Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {442--458}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_29}, doi = {10.1007/978-3-642-23951-9\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GhoshCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoubinM11, author = {Louis Goubin and Ange Martinelli}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Protecting {AES} with Shamir's Secret Sharing Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {79--94}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_6}, doi = {10.1007/978-3-642-23951-9\_6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GoubinM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrabherGHJPTW11, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Simon Hoerder and Kimmo J{\"{a}}rvinen and Dan Page and Stefan Tillich and Marcin W{\'{o}}jcik}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {An Exploration of Mechanisms for Dynamic Cryptographic Instruction Set Extension}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_1}, doi = {10.1007/978-3-642-23951-9\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrabherGHJPTW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuneysuM11, author = {Tim G{\"{u}}neysu and Amir Moradi}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Generic Side-Channel Countermeasures for Reconfigurable Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {33--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_3}, doi = {10.1007/978-3-642-23951-9\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuneysuM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuoPPR11, author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {The {LED} Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {326--341}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_22}, doi = {10.1007/978-3-642-23951-9\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GuoPPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HomsirikamolRG11, author = {Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Throughput vs. Area Trade-offs in High-Speed Architectures of Five Round 3 {SHA-3} Candidates Implemented Using Xilinx and Altera FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {491--506}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_32}, doi = {10.1007/978-3-642-23951-9\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HomsirikamolRG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterW11, author = {Michael Hutter and Erich Wenger}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {459--474}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_30}, doi = {10.1007/978-3-642-23951-9\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KatzenbeisserKLSSSW11, author = {Stefan Katzenbeisser and {\"{U}}nal Ko{\c{c}}abas and Vincent van der Leest and Ahmad{-}Reza Sadeghi and Geert Jan Schrijen and Heike Schr{\"{o}}der and Christian Wachsmann}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Recyclable PUFs: Logically Reconfigurable PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {374--389}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_25}, doi = {10.1007/978-3-642-23951-9\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KatzenbeisserKLSSSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KimHL11, author = {HeeSeok Kim and Seokhie Hong and Jongin Lim}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {A Fast and Provably Secure Higher-Order Masking of {AES} S-Box}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {95--107}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_7}, doi = {10.1007/978-3-642-23951-9\_7}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KimHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KrishnaNWB11, author = {Aswin Raghav Krishna and Seetharam Narasimhan and Xinmu Wang and Swarup Bhunia}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {{MECCA:} {A} Robust Low-Overhead {PUF} Using Embedded Memory Array}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {407--420}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_27}, doi = {10.1007/978-3-642-23951-9\_27}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KrishnaNWB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KuoSDRBCY11, author = {Po{-}Chun Kuo and Michael Schneider and {\"{O}}zg{\"{u}}r Dagdelen and Jan Reichelt and Johannes Buchmann and Chen{-}Mou Cheng and Bo{-}Yin Yang}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Extreme Enumeration on {GPU} and in Clouds - - How Many Dollars You Need to Break {SVP} Challenges -}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {176--191}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_12}, doi = {10.1007/978-3-642-23951-9\_12}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KuoSDRBCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MajzoobiKD11, author = {Mehrdad Majzoobi and Farinaz Koushanfar and Srinivas Devadas}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {17--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_2}, doi = {10.1007/978-3-642-23951-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MajzoobiKD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MedwedS11, author = {Marcel Medwed and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Extractors against Side-Channel Attacks: Weak or Strong?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {256--272}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_17}, doi = {10.1007/978-3-642-23951-9\_17}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MedwedS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiMPLOS11, author = {Amir Moradi and Oliver Mischke and Christof Paar and Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {292--311}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_20}, doi = {10.1007/978-3-642-23951-9\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OswaldP11, author = {David F. Oswald and Christof Paar}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Breaking Mifare DESFire {MF3ICD40:} Power Analysis and Templates in the Real World}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {207--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_14}, doi = {10.1007/978-3-642-23951-9\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OswaldP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PetzoldtTBW11, author = {Albrecht Petzoldt and Enrico Thomae and Stanislav Bulygin and Christopher Wolf}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Small Public Keys and Fast Verification for {\textdollar}{\textbackslash}mathcal\{M\}{\textdollar} ultivariate {\textdollar}{\textbackslash}mathcal\{Q\}{\textdollar} uadratic Public Key Systems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {475--490}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_31}, doi = {10.1007/978-3-642-23951-9\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PetzoldtTBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ProuffR11, author = {Emmanuel Prouff and Thomas Roche}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Higher-Order Glitches Free Implementation of the {AES} Using Secure Multi-party Computation Protocols}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {63--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_5}, doi = {10.1007/978-3-642-23951-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ProuffR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenauldKSF11, author = {Mathieu Renauld and Dina Kamel and Fran{\c{c}}ois{-}Xavier Standaert and Denis Flandre}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Information Theoretic and Security Analysis of a 65-Nanometer {DDSLL} {AES} S-Box}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {223--239}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_15}, doi = {10.1007/978-3-642-23951-9\_15}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RenauldKSF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchneiderG11, author = {Michael Schneider and Norman G{\"{o}}ttert}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Random Sampling for Short Lattice Vectors on Graphics Cards}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {160--175}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_11}, doi = {10.1007/978-3-642-23951-9\_11}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchneiderG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ShibutaniIHMAS11, author = {Kyoji Shibutani and Takanori Isobe and Harunaga Hiwatari and Atsushi Mitsuda and Toru Akishita and Taizo Shirai}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Piccolo: An Ultra-Lightweight Blockcipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {342--357}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_23}, doi = {10.1007/978-3-642-23951-9\_23}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ShibutaniIHMAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TaverneFARHL11, author = {Jonathan Taverne and Armando Faz{-}Hern{\'{a}}ndez and Diego F. Aranha and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Darrel Hankerson and Julio L{\'{o}}pez}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {108--123}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_8}, doi = {10.1007/978-3-642-23951-9\_8}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TaverneFARHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Tominaga11, author = {Tetsuya Tominaga}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Standardization Works for Security Regarding the Electromagnetic Environment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {273}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_18}, doi = {10.1007/978-3-642-23951-9\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Tominaga11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YamamotoSIOOTI11, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Takao Ochiai and Masahiko Takenaka and Kouichi Itoh}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Uniqueness Enhancement of {PUF} Responses Based on the Locations of Random Outputting {RS} Latches}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {390--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_26}, doi = {10.1007/978-3-642-23951-9\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YamamotoSIOOTI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YuMSD11, author = {Meng{-}Day (Mandel) Yu and David M'Ra{\"{\i}}hi and Richard Sowell and Srinivas Devadas}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Lightweight and Secure {PUF} Key Storage Using Limits of Machine Learning}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {358--373}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_24}, doi = {10.1007/978-3-642-23951-9\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YuMSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2011, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9}, doi = {10.1007/978-3-642-23951-9}, isbn = {978-3-642-23950-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AciicmezBG10, author = {Onur Acii{\c{c}}mez and Billy Bob Brumley and Philipp Grabher}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New Results on Instruction Cache Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {110--124}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_8}, doi = {10.1007/978-3-642-15031-9\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AciicmezBG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AumassonHMN10, author = {Jean{-}Philippe Aumasson and Luca Henzen and Willi Meier and Mar{\'{\i}}a Naya{-}Plasencia}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Quark: {A} Lightweight Hash}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_1}, doi = {10.1007/978-3-642-15031-9\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/AumassonHMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BadelDNORSSV10, author = {St{\'{e}}phane Badel and Nilay Dagtekin and Jorge Nakahara Jr. and Khaled Ouafi and Nicolas Reff{\'{e}} and Pouyan Sepehrdad and Petr Susil and Serge Vaudenay}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{ARMADILLO:} {A} Multi-purpose Cryptographic Primitive Dedicated to Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {398--412}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_27}, doi = {10.1007/978-3-642-15031-9\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BadelDNORSSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BenoitP10, author = {Olivier Beno{\^{\i}}t and Thomas Peyrin}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Side-Channel Analysis of Six {SHA-3} Candidates}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {140--157}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_10}, doi = {10.1007/978-3-642-15031-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BenoitP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BertoniDPA10, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Sponge-Based Pseudo-Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {33--47}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_3}, doi = {10.1007/978-3-642-15031-9\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BertoniDPA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BerzatiCG10, author = {Alexandre Berzati and C{\'{e}}cile Canovas{-}Dumas and Louis Goubin}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Public Key Perturbation of Randomized {RSA} Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {306--319}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_21}, doi = {10.1007/978-3-642-15031-9\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BerzatiCG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BosS10, author = {Joppe W. Bos and Deian Stefan}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Performance Analysis of the {SHA-3} Candidates on Exotic Multi-core Architectures}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {279--293}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_19}, doi = {10.1007/978-3-642-15031-9\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BosS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BouillaguetCCCNSY10, author = {Charles Bouillaguet and Hsieh{-}Chung Chen and Chen{-}Mou Cheng and Tung Chou and Ruben Niederhagen and Adi Shamir and Bo{-}Yin Yang}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fast Exhaustive Search for Polynomial Systems in \emph{F}\({}_{\mbox{2}}\)}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {203--218}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_14}, doi = {10.1007/978-3-642-15031-9\_14}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BouillaguetCCCNSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronK10, author = {Jean{-}S{\'{e}}bastien Coron and Ilya Kizhvatov}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Analysis and Improvement of the Random Delay Countermeasure of {CHES} 2009}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {95--109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_7}, doi = {10.1007/978-3-642-15031-9\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Di-BattistaCRTP10, author = {Jerome Di{-}Battista and Jean{-}Christophe Courr{\`{e}}ge and Bruno Rouzeyre and Lionel Torres and Philippe Perdu}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {When Failure Analysis Meets Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {188--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_13}, doi = {10.1007/978-3-642-15031-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Di-BattistaCRTP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DuNCB10, author = {Dongdong Du and Seetharam Narasimhan and Rajat Subhra Chakraborty and Swarup Bhunia}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Self-referencing: {A} Scalable Side-Channel Approach for Hardware Trojan Detection}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {173--187}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_12}, doi = {10.1007/978-3-642-15031-9\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DuNCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GajHR10, author = {Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two {SHA-3} Candidates Using FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {264--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_18}, doi = {10.1007/978-3-642-15031-9\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GajHR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoundarJM10, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Co-\emph{Z} Addition Formul{\ae} and Binary Ladders on Elliptic Curves - (Extended Abstract)}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {65--79}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_5}, doi = {10.1007/978-3-642-15031-9\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoundarJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Guillermin10, author = {Nicolas Guillermin}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over {\textbackslash}mathbb\emph{F}\({}_{\mbox{\emph{p}}}\){\textbackslash}mathbb\{F\}{\_}p}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {48--64}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_4}, doi = {10.1007/978-3-642-15031-9\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Guillermin10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HenzenGGPZG10, author = {Luca Henzen and Pietro Gendotti and Patrice Guillet and Enrico Pargaetzi and Martin Zoller and Frank K. G{\"{u}}rkaynak}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Developing a Hardware Evaluation Method for {SHA-3} Candidates}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {248--263}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_17}, doi = {10.1007/978-3-642-15031-9\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HenzenGGPZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HoferB10, author = {Maximilian Hofer and Christoph B{\"{o}}hm}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {An Alternative to Error Correction for SRAM-Like PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {335--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_23}, doi = {10.1007/978-3-642-15031-9\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HoferB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JarvinenKSS10, author = {Kimmo J{\"{a}}rvinen and Vladimir Kolesnikov and Ahmad{-}Reza Sadeghi and Thomas Schneider}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version)}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {383--397}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_26}, doi = {10.1007/978-3-642-15031-9\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/JarvinenKSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KnudsenLPR10, author = {Lars R. Knudsen and Gregor Leander and Axel Poschmann and Matthew J. B. Robshaw}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {PRINTcipher: {A} Block Cipher for IC-Printing}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {16--32}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_2}, doi = {10.1007/978-3-642-15031-9\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KnudsenLPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiSGFTO10, author = {Yang Li and Kazuo Sakiyama and Shigeto Gomisawa and Toshinori Fukunaga and Junko Takahashi and Kazuo Ohta}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fault Sensitivity Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {320--334}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_22}, doi = {10.1007/978-3-642-15031-9\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LongaG10, author = {Patrick Longa and Catherine H. Gebotys}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Efficient Techniques for High-Speed Elliptic Curve Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {80--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_6}, doi = {10.1007/978-3-642-15031-9\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LongaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiME10, author = {Amir Moradi and Oliver Mischke and Thomas Eisenbarth}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Correlation-Enhanced Power Analysis Collision Attack}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {125--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_9}, doi = {10.1007/978-3-642-15031-9\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiME10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/NogamiNTHM10, author = {Yasuyuki Nogami and Kenta Nekado and Tetsumi Toyota and Naoto Hongo and Yoshitaka Morikawa}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Mixed Bases for Efficient Inversion in {\textbackslash}mathbb \emph{F}((2\({}^{\mbox{2}}\))\({}^{\mbox{2}}\)) and Conversion Matrices of SubBytes of {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {234--247}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_16}, doi = {10.1007/978-3-642-15031-9\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/NogamiNTHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenKPW10, author = {Yossef Oren and Mario Kirschbaum and Thomas Popp and Avishai Wool}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Algebraic Side-Channel Analysis in the Presence of Errors}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {428--442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_29}, doi = {10.1007/978-3-642-15031-9\_29}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenKPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoschmannLW10, author = {Axel Poschmann and San Ling and Huaxiong Wang}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {256 Bit Standardized Crypto for 650 {GE} - {GOST} Revisited}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {219--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_15}, doi = {10.1007/978-3-642-15031-9\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoschmannLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RivainP10, author = {Matthieu Rivain and Emmanuel Prouff}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provably Secure Higher-Order Masking of {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {413--427}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_28}, doi = {10.1007/978-3-642-15031-9\_28}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RivainP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Skorobogatov10, author = {Sergei Skorobogatov}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Flash Memory 'Bumping' Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {158--172}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_11}, doi = {10.1007/978-3-642-15031-9\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Skorobogatov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SuzukiS10, author = {Daisuke Suzuki and Koichi Shimizu}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The Glitch {PUF:} {A} New Delay-PUF Architecture Exploiting Glitch Shapes}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {366--382}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_25}, doi = {10.1007/978-3-642-15031-9\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SuzukiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TunstallJ10, author = {Michael Tunstall and Marc Joye}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Coordinate Blinding over Large Prime Fields}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {443--455}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_30}, doi = {10.1007/978-3-642-15031-9\_30}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/TunstallJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/VarcholaD10, author = {Michal Varchola and Milos Drutarovsk{\'{y}}}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {New High Entropy Element for {FPGA} Based True Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {351--365}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_24}, doi = {10.1007/978-3-642-15031-9\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/VarcholaD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Wenzel-BennerG10, author = {Christian Wenzel{-}Benner and Jens Gr{\"{a}}f}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {{XBX:} eXternal Benchmarking eXtension for the {SUPERCOP} Crypto Benchmarking Framework}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {294--305}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_20}, doi = {10.1007/978-3-642-15031-9\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Wenzel-BennerG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2010, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9}, doi = {10.1007/978-3-642-15031-9}, isbn = {978-3-642-15030-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaGL09, author = {Lejla Batina and Benedikt Gierlichs and Kerstin Lemke{-}Rust}, editor = {Christophe Clavier and Kris Gaj}, title = {Differential Cluster Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {112--127}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_9}, doi = {10.1007/978-3-642-04138-9\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BeuchatDEOR09, author = {Jean{-}Luc Beuchat and J{\'{e}}r{\'{e}}mie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, editor = {Christophe Clavier and Kris Gaj}, title = {Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {225--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_17}, doi = {10.1007/978-3-642-04138-9\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BeuchatDEOR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CanniereDK09, author = {Christophe De Canni{\`{e}}re and Orr Dunkelman and Miroslav Knezevic}, editor = {Christophe Clavier and Kris Gaj}, title = {{KATAN} and {KTANTAN} - {A} Family of Small and Efficient Hardware-Oriented Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {272--288}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_20}, doi = {10.1007/978-3-642-04138-9\_20}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CanniereDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChakrabortyWPPB09, author = {Rajat Subhra Chakraborty and Francis G. Wolff and Somnath Paul and Christos A. Papachristou and Swarup Bhunia}, editor = {Christophe Clavier and Kris Gaj}, title = {{MERO:} {A} Statistical Approach for Hardware Trojan Detection}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {396--410}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_28}, doi = {10.1007/978-3-642-04138-9\_28}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChakrabortyWPPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChenCCCDKLY09, author = {Anna Inn{-}Tung Chen and Ming{-}Shing Chen and Tien{-}Ren Chen and Chen{-}Mou Cheng and Jintai Ding and Eric Li{-}Hsiang Kuo and Frost Yu{-}Shuang Lee and Bo{-}Yin Yang}, editor = {Christophe Clavier and Kris Gaj}, title = {{SSE} Implementation of Multivariate PKCs on Modern x86 CPUs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {33--48}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_3}, doi = {10.1007/978-3-642-04138-9\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChenCCCDKLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronJKNP09, author = {Jean{-}S{\'{e}}bastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, editor = {Christophe Clavier and Kris Gaj}, title = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {444--456}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_31}, doi = {10.1007/978-3-642-04138-9\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronK09, author = {Jean{-}S{\'{e}}bastien Coron and Ilya Kizhvatov}, editor = {Christophe Clavier and Kris Gaj}, title = {An Efficient Method for Random Delay Generation in Embedded Software}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {156--170}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_12}, doi = {10.1007/978-3-642-04138-9\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Devadas09, author = {Srini Devadas}, editor = {Christophe Clavier and Kris Gaj}, title = {Physical Unclonable Functions and Secure Processors}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {65}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_5}, doi = {10.1007/978-3-642-04138-9\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Devadas09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/EisenbarthGHP09, author = {Thomas Eisenbarth and Tim G{\"{u}}neysu and Stefan Heyse and Christof Paar}, editor = {Christophe Clavier and Kris Gaj}, title = {MicroEliece: McEliece for Embedded Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {49--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_4}, doi = {10.1007/978-3-642-04138-9\_4}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/EisenbarthGHP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FanVV09, author = {Junfeng Fan and Frederik Vercauteren and Ingrid Verbauwhede}, editor = {Christophe Clavier and Kris Gaj}, title = {Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {240--253}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_18}, doi = {10.1007/978-3-642-04138-9\_18}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FanVV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FinkeGS09, author = {Thomas Finke and Max Gebhardt and Werner Schindler}, editor = {Christophe Clavier and Kris Gaj}, title = {A New Side-Channel Attack on {RSA} Prime Generation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {141--155}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_11}, doi = {10.1007/978-3-642-04138-9\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FinkeGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueLRV09, author = {Pierre{-}Alain Fouque and Ga{\"{e}}tan Leurent and Denis R{\'{e}}al and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Christophe Clavier and Kris Gaj}, title = {Practical Electromagnetic Template Attack on {HMAC}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {66--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_6}, doi = {10.1007/978-3-642-04138-9\_6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FouqueLRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuoFSV09, author = {Xu Guo and Junfeng Fan and Patrick Schaumont and Ingrid Verbauwhede}, editor = {Christophe Clavier and Kris Gaj}, title = {Programmable and Parallel {ECC} Coprocessor Architecture: Tradeoffs between Area, Speed and Security}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {289--303}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_21}, doi = {10.1007/978-3-642-04138-9\_21}, timestamp = {Fri, 04 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GuoFSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hamburg09, author = {Mike Hamburg}, editor = {Christophe Clavier and Kris Gaj}, title = {Accelerating {AES} with Vector Permute Instructions}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {18--32}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_2}, doi = {10.1007/978-3-642-04138-9\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hamburg09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HammouriDS09, author = {Ghaith Hammouri and Aykutlu Dana and Berk Sunar}, editor = {Christophe Clavier and Kris Gaj}, title = {CDs Have Fingerprints Too}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {348--362}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_25}, doi = {10.1007/978-3-642-04138-9\_25}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HammouriDS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hlavac09, author = {Martin Hlav{\'{a}}c}, editor = {Christophe Clavier and Kris Gaj}, title = {Known-Plaintext-Only Attack on {RSA-CRT} with Montgomery Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {128--140}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_10}, doi = {10.1007/978-3-642-04138-9\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hlavac09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KammlerZSSLAAM09, author = {David Kammler and Diandian Zhang and Peter Schwabe and Hanno Scharw{\"{a}}chter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rudolf Mathar}, editor = {Christophe Clavier and Kris Gaj}, title = {Designing an {ASIP} for Cryptographic Pairings over Barreto-Naehrig Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {254--271}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_19}, doi = {10.1007/978-3-642-04138-9\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KammlerZSSLAAM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KasperS09, author = {Emilia K{\"{a}}sper and Peter Schwabe}, editor = {Christophe Clavier and Kris Gaj}, title = {Faster and Timing-Attack Resistant {AES-GCM}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {1--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_1}, doi = {10.1007/978-3-642-04138-9\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KasperS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LinKGPB09, author = {Lang Lin and Markus Kasper and Tim G{\"{u}}neysu and Christof Paar and Wayne P. Burleson}, editor = {Christophe Clavier and Kris Gaj}, title = {Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {382--395}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_27}, doi = {10.1007/978-3-642-04138-9\_27}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LinKGPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaesTV09, author = {Roel Maes and Pim Tuyls and Ingrid Verbauwhede}, editor = {Christophe Clavier and Kris Gaj}, title = {Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for {SRAM} PUFs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {332--347}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_24}, doi = {10.1007/978-3-642-04138-9\_24}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MaesTV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MarkettosM09, author = {A. Theodore Markettos and Simon W. Moore}, editor = {Christophe Clavier and Kris Gaj}, title = {The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {317--331}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_23}, doi = {10.1007/978-3-642-04138-9\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MarkettosM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MateusV09, author = {Paulo Mateus and Serge Vaudenay}, editor = {Christophe Clavier and Kris Gaj}, title = {On Tamper-Resistance from a Theoretical Viewpoint}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {411--428}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_29}, doi = {10.1007/978-3-642-04138-9\_29}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MateusV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MeloniH09, author = {Nicolas M{\'{e}}loni and M. Anwar Hasan}, editor = {Christophe Clavier and Kris Gaj}, title = {Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {304--316}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_22}, doi = {10.1007/978-3-642-04138-9\_22}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MeloniH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Paar09, author = {Christof Paar}, editor = {Christophe Clavier and Kris Gaj}, title = {Crypto Engineering: Some History and Some Case Studies}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {220--224}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_16}, doi = {10.1007/978-3-642-04138-9\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Paar09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ProuffM09, author = {Emmanuel Prouff and Robert P. McEvoy}, editor = {Christophe Clavier and Kris Gaj}, title = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {81--96}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_7}, doi = {10.1007/978-3-642-04138-9\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ProuffM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RegazzoniCSBKBLI09, author = {Francesco Regazzoni and Alessandro Cevrero and Fran{\c{c}}ois{-}Xavier Standaert and St{\'{e}}phane Badel and Theo Kluter and Philip Brisk and Yusuf Leblebici and Paolo Ienne}, editor = {Christophe Clavier and Kris Gaj}, title = {A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {205--219}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_15}, doi = {10.1007/978-3-642-04138-9\_15}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RegazzoniCSBKBLI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RenauldSV09, author = {Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Veyrat{-}Charvillon}, editor = {Christophe Clavier and Kris Gaj}, title = {Algebraic Side-Channel Attacks on the {AES:} Why Time also Matters in {DPA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {97--111}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_8}, doi = {10.1007/978-3-642-04138-9\_8}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/RenauldSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Rivain09, author = {Matthieu Rivain}, editor = {Christophe Clavier and Kris Gaj}, title = {Differential Fault Analysis on {DES} Middle Rounds}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {457--469}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_32}, doi = {10.1007/978-3-642-04138-9\_32}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Rivain09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RivainPD09, author = {Matthieu Rivain and Emmanuel Prouff and Julien Doget}, editor = {Christophe Clavier and Kris Gaj}, title = {Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {171--188}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_13}, doi = {10.1007/978-3-642-04138-9\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RivainPD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SaekiSSS09, author = {Minoru Saeki and Daisuke Suzuki and Koichi Shimizu and Akashi Satoh}, editor = {Christophe Clavier and Kris Gaj}, title = {A Design Methodology for a DPA-Resistant Cryptographic {LSI} with {RSL} Techniques}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {189--204}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_14}, doi = {10.1007/978-3-642-04138-9\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SaekiSSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TorranceJ09, author = {Randy Torrance and Dick James}, editor = {Christophe Clavier and Kris Gaj}, title = {The State-of-the-Art in {IC} Reverse Engineering}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {363--381}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_26}, doi = {10.1007/978-3-642-04138-9\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TorranceJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Veyrat-CharvillonS09, author = {Nicolas Veyrat{-}Charvillon and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Christophe Clavier and Kris Gaj}, title = {Mutual Information Analysis: How, When and Why?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, pages = {429--443}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9\_30}, doi = {10.1007/978-3-642-04138-9\_30}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Veyrat-CharvillonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2009, editor = {Christophe Clavier and Kris Gaj}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5747}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04138-9}, doi = {10.1007/978-3-642-04138-9}, isbn = {978-3-642-04137-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BaddamZ08, author = {Karthik Baddam and Mark Zwolinski}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Divided Backend Duplication Methodology for Balanced Dual Rail Routing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {396--410}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_25}, doi = {10.1007/978-3-540-85053-3\_25}, timestamp = {Thu, 14 Oct 2021 10:28:51 +0200}, biburl = {https://dblp.org/rec/conf/ches/BaddamZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinLF08, author = {Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Binary Edwards Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {244--265}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_16}, doi = {10.1007/978-3-540-85053-3\_16}, timestamp = {Mon, 25 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BerzatiCG08, author = {Alexandre Berzati and C{\'{e}}cile Canovas and Louis Goubin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Perturbating {RSA} Public Keys: An Improved Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {380--395}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_24}, doi = {10.1007/978-3-540-85053-3\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BerzatiCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Bogdanov08, author = {Andrey Bogdanov}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Multiple-Differential Side-Channel Collision Attacks on {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {30--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_3}, doi = {10.1007/978-3-540-85053-3\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Bogdanov08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovERW08, author = {Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {45--61}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_4}, doi = {10.1007/978-3-540-85053-3\_4}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BogdanovERW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08, author = {Andrey Bogdanov and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Hash Functions and {RFID} Tags: Mind the Gap}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {283--299}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_18}, doi = {10.1007/978-3-540-85053-3\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BoschGSST08, author = {Christoph B{\"{o}}sch and Jorge Guajardo and Ahmad{-}Reza Sadeghi and Jamshid Shokrollahi and Pim Tuyls}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Efficient Helper Data Key Extractor on FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {181--197}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_12}, doi = {10.1007/978-3-540-85053-3\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BoschGSST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Brickell08, author = {Ernie Brickell}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Vision for Platform Security}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {444}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_29}, doi = {10.1007/978-3-540-85053-3\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Brickell08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronGPR08, author = {Jean{-}S{\'{e}}bastien Coron and Christophe Giraud and Emmanuel Prouff and Matthieu Rivain}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Attack and Improvement of a Secure S-Box Calculation Based on the Fourier Transform}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {1--14}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_1}, doi = {10.1007/978-3-540-85053-3\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronGPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueRVD08, author = {Pierre{-}Alain Fouque and Denis R{\'{e}}al and Fr{\'{e}}d{\'{e}}ric Valette and M'hamed Drissi}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {The Carry Leakage on the Randomized Exponent Countermeasure}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {198--213}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_13}, doi = {10.1007/978-3-540-85053-3\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/FouqueRVD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GendrullisNR08, author = {Timo Gendrullis and Martin Novotn{\'{y}} and Andy Rupp}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Real-World Attack Breaking {A5/1} within Hours}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {266--282}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_17}, doi = {10.1007/978-3-540-85053-3\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GendrullisNR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsBTP08, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls and Bart Preneel}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Mutual Information Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {426--442}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_27}, doi = {10.1007/978-3-540-85053-3\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrabherGP08, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Dan Page}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {331--345}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_21}, doi = {10.1007/978-3-540-85053-3\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrabherGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuneysuP08, author = {Tim G{\"{u}}neysu and Christof Paar}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Ultra High Performance {ECC} over {NIST} Primes on Commercial FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {62--78}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_5}, doi = {10.1007/978-3-540-85053-3\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuneysuP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HommaMASS08, author = {Naofumi Homma and Atsushi Miyamoto and Takafumi Aoki and Akashi Satoh and Adi Shamir}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message Pairs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {15--29}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_2}, doi = {10.1007/978-3-540-85053-3\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HommaMASS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterSP08, author = {Michael Hutter and J{\"{o}}rn{-}Marc Schmidt and Thomas Plos}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {{RFID} and Its Vulnerability to Faults}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {363--379}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_23}, doi = {10.1007/978-3-540-85053-3\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KermaniR08, author = {Mehran Mozaffari Kermani and Arash Reyhani{-}Masoleh}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Lightweight Concurrent Fault Detection Scheme for the {AES} S-Boxes Using Normal Basis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {113--129}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_8}, doi = {10.1007/978-3-540-85053-3\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KermaniR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KillmannS08, author = {Wolfgang Killmann and Werner Schindler}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Design for a Physical {RNG} with Robust Entropy Estimators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {146--163}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_10}, doi = {10.1007/978-3-540-85053-3\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KillmannS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MentensGV08, author = {Nele Mentens and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {346--362}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_22}, doi = {10.1007/978-3-540-85053-3\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MentensGV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Reyhani-Masoleh08, author = {Arash Reyhani{-}Masoleh}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {300--314}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_19}, doi = {10.1007/978-3-540-85053-3\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Reyhani-Masoleh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SatohSHA08, author = {Akashi Satoh and Takeshi Sugawara and Naofumi Homma and Takafumi Aoki}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {High-Performance Concurrent Error Detection Scheme for {AES} Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {100--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_7}, doi = {10.1007/978-3-540-85053-3\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SatohSHA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Shamir08, author = {Adi Shamir}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {RSA-Past, Present, Future}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {443}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_28}, doi = {10.1007/978-3-540-85053-3\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Shamir08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertA08, author = {Fran{\c{c}}ois{-}Xavier Standaert and C{\'{e}}dric Archambeau}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {411--425}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_26}, doi = {10.1007/978-3-540-85053-3\_26}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SzerwinskiG08, author = {Robert Szerwinski and Tim G{\"{u}}neysu}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Exploiting the Power of GPUs for Asymmetric Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {79--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_6}, doi = {10.1007/978-3-540-85053-3\_6}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SzerwinskiG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TillichH08, author = {Stefan Tillich and Christoph Herbst}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Attacking State-of-the-Art Software Countermeasures-A Case Study for {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {228--243}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_15}, doi = {10.1007/978-3-540-85053-3\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TillichH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/VasyltsovHKK08, author = {Ihor V. Vasyltsov and Eduard Hambardzumyan and Young{-}Sik Kim and Bohdan Karpinskyy}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Fast Digital {TRNG} Based on Metastable Ring Oscillator}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {164--180}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_11}, doi = {10.1007/978-3-540-85053-3\_11}, timestamp = {Fri, 12 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/VasyltsovHKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Vigilant08, author = {David Vigilant}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {{RSA} with {CRT:} {A} New Cost-Effective Solution to Thwart Fault Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {130--145}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_9}, doi = {10.1007/978-3-540-85053-3\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Vigilant08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter08, author = {Colin D. Walter}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {214--227}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_14}, doi = {10.1007/978-3-540-85053-3\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YamamotoYI08, author = {Dai Yamamoto and Jun Yajima and Kouichi Itoh}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {A Very Compact Hardware Implementation of the {MISTY1} Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {315--330}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_20}, doi = {10.1007/978-3-540-85053-3\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YamamotoYI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2008, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3}, doi = {10.1007/978-3-540-85053-3}, isbn = {978-3-540-85052-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BeuchatBDO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Arithmetic Operators for Pairing-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {239--255}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_17}, doi = {10.1007/978-3-540-74735-2\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BeuchatBDO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BiryukovBKK07, author = {Alex Biryukov and Andrey Bogdanov and Dmitry Khovratovich and Timo Kasper}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Collision Attacks on AES-Based {MAC:} Alpha-MAC}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {166--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_12}, doi = {10.1007/978-3-540-74735-2\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BiryukovBKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BiryukovK07, author = {Alex Biryukov and Dmitry Khovratovich}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Two New Techniques of Side-Channel Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {195--208}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_14}, doi = {10.1007/978-3-540-74735-2\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BiryukovK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovER07, author = {Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {A Hardware-Assisted Realtime Attack on {A5/2} Without Precomputations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {394--412}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_27}, doi = {10.1007/978-3-540-74735-2\_27}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BogdanovER07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin and C. Vikkelsoe}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{PRESENT:} An Ultra-Lightweight Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {450--466}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_31}, doi = {10.1007/978-3-540-74735-2\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Clavier07, author = {Christophe Clavier}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Secret External Encodings Do Not Prevent Transient Fault Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {181--194}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_13}, doi = {10.1007/978-3-540-74735-2\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Clavier07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClavierC07, author = {Christophe Clavier and Jean{-}S{\'{e}}bastien Coron}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {On the Implementation of a Fast Prime Generation Algorithm}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {443--449}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_30}, doi = {10.1007/978-3-540-74735-2\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClavierC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronPR07, author = {Jean{-}S{\'{e}}bastien Coron and Emmanuel Prouff and Matthieu Rivain}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Side Channel Cryptanalysis of a Higher Order Masking Scheme}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {28--44}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_3}, doi = {10.1007/978-3-540-74735-2\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronPR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DeJeanK07, author = {Gerald DeJean and Darko Kirovski}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{RF-DNA:} Radio-Frequency Certificates of Authenticity}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {346--363}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_24}, doi = {10.1007/978-3-540-74735-2\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DeJeanK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DichtlG07, author = {Markus Dichtl and Jovan Dj. Golic}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {High-Speed True Random Number Generation with Logic Gates Only}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {45--62}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_4}, doi = {10.1007/978-3-540-74735-2\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DichtlG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DormaleBQ07, author = {Guerric Meurice de Dormale and Philippe Bulens and Jean{-}Jacques Quisquater}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Collision Search for Elliptic Curve Discrete Logarithm over GF(2\({}^{\mbox{ \emph{m} }}\)) with {FPGA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {378--393}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_26}, doi = {10.1007/978-3-540-74735-2\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DormaleBQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ElbazCLTSG07, author = {Reouven Elbaz and David Champagne and Ruby B. Lee and Lionel Torres and Gilles Sassatelli and Pierre Guillemin}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {TEC-Tree: {A} Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {289--302}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_20}, doi = {10.1007/978-3-540-74735-2\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ElbazCLTSG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Gierlichs07, author = {Benedikt Gierlichs}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {DPA-Resistance Without Routing Constraints?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {107--120}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_8}, doi = {10.1007/978-3-540-74735-2\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Gierlichs07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuajardoKST07, author = {Jorge Guajardo and Sandeep S. Kumar and Geert Jan Schrijen and Pim Tuyls}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{FPGA} Intrinsic PUFs and Their Use for {IP} Protection}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {63--80}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_5}, doi = {10.1007/978-3-540-74735-2\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuajardoKST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HarrisonW07, author = {Owen Harrison and John Waldron}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{AES} Encryption Implementation and Analysis on Commodity Graphics Processing Units}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {209--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_15}, doi = {10.1007/978-3-540-74735-2\_15}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/HarrisonW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HutterMF07, author = {Michael Hutter and Stefan Mangard and Martin Feldhofer}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {320--333}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_22}, doi = {10.1007/978-3-540-74735-2\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HutterMF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/IzuKS07, author = {Tetsuya Izu and Jun Kogure and Takeshi Shimoyama}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{CAIRN} 2: An {FPGA} Implementation of the Sieving Step in the Number Field Sieve Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {364--377}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_25}, doi = {10.1007/978-3-540-74735-2\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/IzuKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Jaffe07, author = {Joshua Jaffe}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {A First-Order {DPA} Attack Against {AES} in Counter Mode with Unknown Initial Counter}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {1--13}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_1}, doi = {10.1007/978-3-540-74735-2\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Jaffe07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JarvinenFS07, author = {Kimmo U. J{\"{a}}rvinen and Juha Forsten and Jorma Skytt{\"{a}}}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{FPGA} Design of Self-certified Signature Verification on Koblitz Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {256--271}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_18}, doi = {10.1007/978-3-540-74735-2\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JarvinenFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Joye07, author = {Marc Joye}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Highly Regular Right-to-Left Algorithms for Scalar Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {135--147}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_10}, doi = {10.1007/978-3-540-74735-2\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Joye07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Lemke-RustP07, author = {Kerstin Lemke{-}Rust and Christof Paar}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Gaussian Mixture Models for Higher-Order Side Channel Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {14--27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_2}, doi = {10.1007/978-3-540-74735-2\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Lemke-RustP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LemsitzerWFB07, author = {Stefan Lemsitzer and Johannes Wolkerstorfer and Norbert Felber and Matthias Braendli}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Multi-gigabit {GCM-AES} Architecture Optimized for FPGAs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {227--238}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_16}, doi = {10.1007/978-3-540-74735-2\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LemsitzerWFB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MaceSQ07, author = {Fran{\c{c}}ois Mac{\'{e}} and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {427--442}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_29}, doi = {10.1007/978-3-540-74735-2\_29}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MaceSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MatsuiN07, author = {Mitsuru Matsui and Junko Nakajima}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {On the Power of Bitslice Implementation on Intel Core2 Processor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {121--134}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_9}, doi = {10.1007/978-3-540-74735-2\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MatsuiN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppKZM07, author = {Thomas Popp and Mario Kirschbaum and Thomas Zefferer and Stefan Mangard}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Evaluation of the Masked Logic Style {MDPL} on a Prototype Chip}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {81--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_6}, doi = {10.1007/978-3-540-74735-2\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppKZM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/RobissonM07, author = {Bruno Robisson and Pascal Manet}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Differential Behavioral Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {413--426}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_28}, doi = {10.1007/978-3-540-74735-2\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/RobissonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SavryPDRR07, author = {Olivier Savry and Florian Pebay{-}Peyroula and Fran{\c{c}}ois Dehmas and G{\'{e}}rard Robert and Jacques Reverdy}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{RFID} Noisy Reader How to Prevent from Eavesdropping on the Communication?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {334--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_23}, doi = {10.1007/978-3-540-74735-2\_23}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SavryPDRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchaumontT07, author = {Patrick Schaumont and Kris Tiri}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Masking and Dual-Rail Logic Don't Add Up}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {95--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_7}, doi = {10.1007/978-3-540-74735-2\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchaumontT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Suzuki07, author = {Daisuke Suzuki}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {How to Maximize the Potential of {FPGA} Resources for Modular Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {272--288}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_19}, doi = {10.1007/978-3-540-74735-2\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Suzuki07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TillichG07, author = {Stefan Tillich and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Power Analysis Resistant {AES} Implementation with Instruction Set Extensions}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {303--319}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_21}, doi = {10.1007/978-3-540-74735-2\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TillichG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YoshidaWOKWKP07, author = {Hirotaka Yoshida and Dai Watanabe and Katsuyuki Okeya and Jun Kitahara and Hongjun Wu and {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and Bart Preneel}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{MAME:} {A} Compression Function with Reduced Hardware Requirements}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {148--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_11}, doi = {10.1007/978-3-540-74735-2\_11}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/YoshidaWOKWKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2007, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2}, doi = {10.1007/978-3-540-74735-2}, isbn = {978-3-540-74734-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AkishitaKK06, author = {Toru Akishita and Masanobu Katagi and Izuru Kitamura}, editor = {Louis Goubin and Mitsuru Matsui}, title = {SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems Combining Divisor Decomposition Technique and Joint Regular Form}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {148--159}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_12}, doi = {10.1007/11894063\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AkishitaKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Aoki06, author = {Kazumaro Aoki}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Integer Factoring Utilizing {PC} Cluster}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {60}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_5}, doi = {10.1007/11894063\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Aoki06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ArchambeauPSQ06, author = {C{\'{e}}dric Archambeau and Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Template Attacks in Principal Subspaces}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_1}, doi = {10.1007/11894063\_1}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ArchambeauPSQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BonneauM06, author = {Joseph Bonneau and Ilya Mironov}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Cache-Collision Timing Attacks Against {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {201--215}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_16}, doi = {10.1007/11894063\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BonneauM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BouesseSR06, author = {G. Fraidy Bouesse and Gilles Sicard and Marc Renaudin}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Path Swapping Method to Improve {DPA} Resistance of Quasi Delay Insensitive Asynchronous Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {384--398}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_30}, doi = {10.1007/11894063\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BouesseSR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrierCCC06, author = {Eric Brier and Beno{\^{\i}}t Chevallier{-}Mames and Mathieu Ciet and Christophe Clavier}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Why One Should Also Secure {RSA} Public Key Elements}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {324--338}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_26}, doi = {10.1007/11894063\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrierCCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BucciGLT06, author = {Marco Bucci and Luca Giancane and Raimondo Luzzi and Alessandro Trifiletti}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Three-Phase Dual-Rail Pre-charge Logic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {232--241}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_19}, doi = {10.1007/11894063\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BucciGLT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChavesKSV06, author = {Ricardo Chaves and Georgi Kuzmanov and Leonel Sousa and Stamatis Vassiliadis}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Improving {SHA-2} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {298--310}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_24}, doi = {10.1007/11894063\_24}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ChavesKSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChenZ06, author = {Zhimin Chen and Yujie Zhou}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Dual-Rail Random Switching Logic: {A} Countermeasure to Reduce Side Channel Leakage}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {242--254}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_20}, doi = {10.1007/11894063\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChenZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DimitrovJJCH06, author = {Vassil S. Dimitrov and Kimmo U. J{\"{a}}rvinen and Michael J. Jacobson Jr. and W. F. Chan and Zhun Huang}, editor = {Louis Goubin and Mitsuru Matsui}, title = {{FPGA} Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {445--459}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_35}, doi = {10.1007/11894063\_35}, timestamp = {Tue, 28 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/DimitrovJJCH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueKMMV06, author = {Pierre{-}Alain Fouque and S{\'{e}}bastien Kunz{-}Jacques and Gwena{\"{e}}lle Martinet and Fr{\'{e}}d{\'{e}}ric Muller and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Power Attack on Small {RSA} Public Exponent}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {339--353}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_27}, doi = {10.1007/11894063\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FouqueKMMV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GajKBKLKB06, author = {Kris Gaj and Soonhak Kwon and Patrick Baier and Paul Kohlbrenner and Hoang Le and Mohammed Khaleeluddin and Ramakrishna Bachimanchi}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {119--133}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_10}, doi = {10.1007/11894063\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GajKBKLKB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GierlichsLP06, author = {Benedikt Gierlichs and Kerstin Lemke{-}Rust and Christof Paar}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Templates vs. Stochastic Methods}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {15--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_2}, doi = {10.1007/11894063\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GierlichsLP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HommaNIAS06, author = {Naofumi Homma and Sei Nagashima and Yuichi Imai and Takafumi Aoki and Akashi Satoh}, editor = {Louis Goubin and Mitsuru Matsui}, title = {High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {187--200}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_15}, doi = {10.1007/11894063\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HommaNIAS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HongSHLLKLCLJKKC06, author = {Deukjo Hong and Jaechul Sung and Seokhie Hong and Jongin Lim and Sangjin Lee and Bonseok Koo and Changhoon Lee and Donghoon Chang and Jesang Lee and Kitae Jeong and Hyun Kim and Jongsung Kim and Seongtaek Chee}, editor = {Louis Goubin and Mitsuru Matsui}, title = {{HIGHT:} {A} New Block Cipher Suitable for Low-Resource Device}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {46--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_4}, doi = {10.1007/11894063\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HongSHLLKLCLJKKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeP06, author = {Marc Joye and Pascal Paillier}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Fast Generation of Prime Numbers on Portable Devices: An Update}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {160--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_13}, doi = {10.1007/11894063\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Juels06, author = {Ari Juels}, editor = {Louis Goubin and Mitsuru Matsui}, title = {The Outer Limits of {RFID} Security}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {231}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_18}, doi = {10.1007/11894063\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Juels06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KoschuchLWGSTW06, author = {Manuel Koschuch and Joachim Lechner and Andreas Weitzer and Johann Gro{\ss}sch{\"{a}}dl and Alexander Szekely and Stefan Tillich and Johannes Wolkerstorfer}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {430--444}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_34}, doi = {10.1007/11894063\_34}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KoschuchLWGSTW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KulikowskiST06, author = {Konrad J. Kulikowski and Alexander B. Smirnov and Alexander Taubin}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {399--413}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_31}, doi = {10.1007/11894063\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KulikowskiST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KumarPPPS06, author = {Sandeep S. Kumar and Christof Paar and Jan Pelzl and Gerd Pfeiffer and Manfred Schimmler}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Breaking Ciphers with {COPACOBANA} - {A} Cost-Optimized Parallel Code Breaker}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {101--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_9}, doi = {10.1007/11894063\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KumarPPPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeCCRSL06, author = {Thanh{-}Ha Le and Jessy Cl{\'{e}}di{\`{e}}re and C{\'{e}}cile Canovas and Bruno Robisson and Christine Servi{\`{e}}re and Jean{-}Louis Lacoume}, editor = {Louis Goubin and Mitsuru Matsui}, title = {A Proposition for Correlation Power Analysis Enhancement}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {174--186}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_14}, doi = {10.1007/11894063\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeCCRSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MangardS06, author = {Stefan Mangard and Kai Schramm}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Pinpointing the Side-Channel Leakage of Masked {AES} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {76--90}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_7}, doi = {10.1007/11894063\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MangardS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MasoumiRA06, author = {Massoud Masoumi and Farshid Raissi and Mahmoud Ahmadian}, editor = {Louis Goubin and Mitsuru Matsui}, title = {NanoCMOS-Molecular Realization of Rijndael}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {285--297}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_23}, doi = {10.1007/11894063\_23}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MasoumiRA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiSS06, author = {Amir Moradi and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh}, editor = {Louis Goubin and Mitsuru Matsui}, title = {A Generalized Method of Differential Fault Attack Against {AES} Cryptosystem}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {91--100}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_8}, doi = {10.1007/11894063\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/MoradiSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ProuffGA06, author = {Emmanuel Prouff and Christophe Giraud and S{\'{e}}bastien Aum{\^{o}}nier}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Provably Secure S-Box Implementation Based on Fourier Transform}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {216--230}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_17}, doi = {10.1007/11894063\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ProuffGA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Sadeghi06, author = {Ahmad{-}Reza Sadeghi}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Challenges for Trusted Computing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {414}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_32}, doi = {10.1007/11894063\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Sadeghi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SakiyamaBPV06, author = {Kazuo Sakiyama and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {415--429}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_33}, doi = {10.1007/11894063\_33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ScottCA06, author = {Michael Scott and Neil Costigan and Wesam Abdulwahab}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Implementing Cryptographic Pairings on Smartcards}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {134--147}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_11}, doi = {10.1007/11894063\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ScottCA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SimpsonS06, author = {Eric Simpson and Patrick Schaumont}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Offline Hardware/Software Authentication for Reconfigurable Platforms}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {311--323}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_25}, doi = {10.1007/11894063\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SimpsonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Skorobogatov06, author = {Sergei P. Skorobogatov}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Optically Enhanced Position-Locked Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {61--75}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_6}, doi = {10.1007/11894063\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Skorobogatov06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertPAQ06, author = {Fran{\c{c}}ois{-}Xavier Standaert and Eric Peeters and C{\'{e}}dric Archambeau and Jean{-}Jacques Quisquater}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Towards Security Limits in Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {30--45}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_3}, doi = {10.1007/11894063\_3}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertPAQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StebilaT06, author = {Douglas Stebila and Nicolas Th{\'{e}}riault}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Unified Point Addition Formul{\ae} and Side-Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {354--368}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_28}, doi = {10.1007/11894063\_28}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/StebilaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SuzukiS06, author = {Daisuke Suzuki and Minoru Saeki}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Security Evaluation of {DPA} Countermeasures Using Dual-Rail Pre-charge Logic Style}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {255--269}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_21}, doi = {10.1007/11894063\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SuzukiS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TillichG06, author = {Stefan Tillich and Johann Gro{\ss}sch{\"{a}}dl}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Instruction Set Extensions for Efficient {AES} Implementation on 32-bit Processors}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {270--284}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_22}, doi = {10.1007/11894063\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TillichG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TuylsSSGVW06, author = {Pim Tuyls and Geert Jan Schrijen and Boris Skoric and Jan van Geloven and Nynke Verhaegh and Rob Wolters}, editor = {Louis Goubin and Mitsuru Matsui}, title = {Read-Proof Hardware from Protective Coatings}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {369--383}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_29}, doi = {10.1007/11894063\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TuylsSSGVW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2006, editor = {Louis Goubin and Mitsuru Matsui}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063}, doi = {10.1007/11894063}, isbn = {3-540-46559-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AgrawalRRS05, author = {Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi and Kai Schramm}, editor = {Josyula R. Rao and Berk Sunar}, title = {Templates as Master Keys}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {15--29}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_2}, doi = {10.1007/11545262\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalRRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BatinaHHPV05, author = {Lejla Batina and David Hwang and Alireza Hodjat and Bart Preneel and Ingrid Verbauwhede}, editor = {Josyula R. Rao and Berk Sunar}, title = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)} on the 8051{\(\mathrm{\mu}\)}P}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {106--118}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_8}, doi = {10.1007/11545262\_8}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BucciL05, author = {Marco Bucci and Raimondo Luzzi}, editor = {Josyula R. Rao and Berk Sunar}, title = {Design of Testable Random Bit Generators}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {147--156}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_11}, doi = {10.1007/11545262\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BucciL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Canright05, author = {David Canright}, editor = {Josyula R. Rao and Berk Sunar}, title = {A Very Compact S-Box for {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {441--455}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_32}, doi = {10.1007/11545262\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Canright05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronLP05, author = {Jean{-}S{\'{e}}bastien Coron and David Lefranc and Guillaume Poupard}, editor = {Josyula R. Rao and Berk Sunar}, title = {A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {47--60}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_4}, doi = {10.1007/11545262\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/DupuyK05, author = {William Dupuy and S{\'{e}}bastien Kunz{-}Jacques}, editor = {Josyula R. Rao and Berk Sunar}, title = {Resistance of Randomized Projective Coordinates Against Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {1--14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_1}, doi = {10.1007/11545262\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/DupuyK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FischerG05, author = {Wieland Fischer and Berndt M. Gammel}, editor = {Josyula R. Rao and Berk Sunar}, title = {Masking at Gate Level in the Presence of Glitches}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {187--200}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_14}, doi = {10.1007/11545262\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FischerG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FrankeKPPPS05, author = {Jens Franke and Thorsten Kleinjung and Christof Paar and Jan Pelzl and Christine Priplata and Colin Stahlke}, editor = {Josyula R. Rao and Berk Sunar}, title = {{SHARK:} {A} Realizable Special Hardware Sieving Device for Factoring 1024-Bit Integers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {119--130}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_9}, doi = {10.1007/11545262\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FrankeKPPPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GebotysHT05, author = {Catherine H. Gebotys and Simon Ho and C. C. Tiu}, editor = {Josyula R. Rao and Berk Sunar}, title = {{EM} Analysis of Rijndael and {ECC} on a Wireless Java-Based {PDA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {250--264}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_19}, doi = {10.1007/11545262\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GebotysHT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GeiselmannSST05, author = {Willi Geiselmann and Adi Shamir and Rainer Steinwandt and Eran Tromer}, editor = {Josyula R. Rao and Berk Sunar}, title = {Scalable Hardware for Sparse Systems of Linear Equations, with Applications to Integer Factorization}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {131--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_10}, doi = {10.1007/11545262\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GeiselmannSST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GoodB05, author = {Tim Good and Mohammed Benaissa}, editor = {Josyula R. Rao and Berk Sunar}, title = {{AES} on {FPGA} from the Fastest to the Smallest}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {427--440}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_31}, doi = {10.1007/11545262\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GoodB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrabherP05, author = {Philipp Grabher and Dan Page}, editor = {Josyula R. Rao and Berk Sunar}, title = {Hardware Acceleration of the Tate Pairing in Characteristic Three}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {398--411}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_29}, doi = {10.1007/11545262\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrabherP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GreenNS05, author = {P. J. Green and Richard Noad and Nigel P. Smart}, editor = {Josyula R. Rao and Berk Sunar}, title = {Further Hidden Markov Model Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {61--74}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_5}, doi = {10.1007/11545262\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GreenNS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossschadlAST05, author = {Johann Gro{\ss}sch{\"{a}}dl and Roberto Maria Avanzi and Erkay Savas and Stefan Tillich}, editor = {Josyula R. Rao and Berk Sunar}, title = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {75--90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_6}, doi = {10.1007/11545262\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossschadlAST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuilleyHMP05, author = {Sylvain Guilley and Philippe Hoogvorst and Yves Mathieu and Renaud Pacalet}, editor = {Josyula R. Rao and Berk Sunar}, title = {The "Backend Duplication" Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {383--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_28}, doi = {10.1007/11545262\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuilleyHMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hars05, author = {Laszlo Hars}, editor = {Josyula R. Rao and Berk Sunar}, title = {Fast Truncated Multiplication for Cryptographic Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {211--225}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_16}, doi = {10.1007/11545262\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hars05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyePS05, author = {Marc Joye and Pascal Paillier and Berry Schoenmakers}, editor = {Josyula R. Rao and Berk Sunar}, title = {On Second-Order Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {293--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_22}, doi = {10.1007/11545262\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KaiharaT05, author = {Marcelo E. Kaihara and Naofumi Takagi}, editor = {Josyula R. Rao and Berk Sunar}, title = {Bipartite Modular Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {201--210}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_15}, doi = {10.1007/11545262\_15}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KaiharaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KerinsMPB05, author = {Tim Kerins and William P. Marnane and Emanuel M. Popovici and Paulo S. L. M. Barreto}, editor = {Josyula R. Rao and Berk Sunar}, title = {Efficient Hardware for the Tate Pairing Calculation in Characteristic Three}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {412--426}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_30}, doi = {10.1007/11545262\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KerinsMPB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Kuhn05, author = {Markus G. Kuhn}, editor = {Josyula R. Rao and Berk Sunar}, title = {Security Limits for Compromising Emanations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {265--279}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_20}, doi = {10.1007/11545262\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Kuhn05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KuhnKLSS05, author = {Ulrich K{\"{u}}hn and Klaus Kursawe and Stefan Lucks and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble}, editor = {Josyula R. Rao and Berk Sunar}, title = {Secure Data Management in Trusted Computing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {324--338}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_24}, doi = {10.1007/11545262\_24}, timestamp = {Mon, 05 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/KuhnKLSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiMM05, author = {Huiyun Li and A. Theodore Markettos and Simon W. Moore}, editor = {Josyula R. Rao and Berk Sunar}, title = {Security Evaluation Against Electromagnetic Analysis at Design Time}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {280--292}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_21}, doi = {10.1007/11545262\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MangardPO05, author = {Stefan Mangard and Norbert Pramstaller and Elisabeth Oswald}, editor = {Josyula R. Rao and Berk Sunar}, title = {Successfully Attacking Masked {AES} Hardware Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {157--171}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_12}, doi = {10.1007/11545262\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MangardPO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OkeyaTV05, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Josyula R. Rao and Berk Sunar}, title = {Short Memory Scalar Multiplication on Koblitz Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {91--105}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_7}, doi = {10.1007/11545262\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OkeyaTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PeetersSDQ05, author = {Eric Peeters and Fran{\c{c}}ois{-}Xavier Standaert and Nicolas Donckers and Jean{-}Jacques Quisquater}, editor = {Josyula R. Rao and Berk Sunar}, title = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {309--323}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_23}, doi = {10.1007/11545262\_23}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PoppM05, author = {Thomas Popp and Stefan Mangard}, editor = {Josyula R. Rao and Berk Sunar}, title = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing Constraints}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {172--186}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_13}, doi = {10.1007/11545262\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PoppM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchindlerLP05, author = {Werner Schindler and Kerstin Lemke and Christof Paar}, editor = {Josyula R. Rao and Berk Sunar}, title = {A Stochastic Model for Differential Side Channel Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {30--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_3}, doi = {10.1007/11545262\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Seysen05, author = {Martin Seysen}, editor = {Josyula R. Rao and Berk Sunar}, title = {Using an {RSA} Accelerator for Modular Inversion}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {226--236}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_17}, doi = {10.1007/11545262\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Seysen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Skorobogatov05, author = {Sergei P. Skorobogatov}, editor = {Josyula R. Rao and Berk Sunar}, title = {Data Remanence in Flash Memory Devices}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {339--353}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_25}, doi = {10.1007/11545262\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Skorobogatov05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SunarC05, author = {Berk Sunar and David Cyganski}, editor = {Josyula R. Rao and Berk Sunar}, title = {Comparison of Bit and Word Level Algorithms for Evaluating Unstructured Functions over Finite Rings}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {237--249}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_18}, doi = {10.1007/11545262\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SunarC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SuzukiSI05, author = {Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa}, editor = {Josyula R. Rao and Berk Sunar}, title = {{DPA} Leakage Models for {CMOS} Logic Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {366--382}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_27}, doi = {10.1007/11545262\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SuzukiSI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TiriHHLYSV05, author = {Kris Tiri and David D. Hwang and Alireza Hodjat and Bo{-}Cheng Lai and Shenglin Yang and Patrick Schaumont and Ingrid Verbauwhede}, editor = {Josyula R. Rao and Berk Sunar}, title = {Prototype {IC} with {WDDL} and Differential Routing - {DPA} Resistance Assessment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {354--365}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_26}, doi = {10.1007/11545262\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TiriHHLYSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2005, editor = {Josyula R. Rao and Berk Sunar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262}, doi = {10.1007/11545262}, isbn = {3-540-28474-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AignerBHW04, author = {Harald Aigner and Holger Bock and Markus H{\"{u}}tter and Johannes Wolkerstorfer}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {A Low-Cost {ECC} Coprocessor for Smartcards}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {107--118}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_8}, doi = {10.1007/978-3-540-28632-5\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AignerBHW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Avanzi04, author = {Roberto Maria Avanzi}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {148--162}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_11}, doi = {10.1007/978-3-540-28632-5\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Avanzi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BajardILT04, author = {Jean{-}Claude Bajard and Laurent Imbert and Pierre{-}Yvan Liardet and Yannick Teglia}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Leak Resistant Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {62--75}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_5}, doi = {10.1007/978-3-540-28632-5\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BajardILT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BockBL04, author = {Holger Bock and Marco Bucci and Raimondo Luzzi}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {An Offset-Compensated Oscillator-Based Random Bit Source for Security Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {268--281}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_20}, doi = {10.1007/978-3-540-28632-5\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BockBL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BrierCO04, author = {Eric Brier and Christophe Clavier and Francis Olivier}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Correlation Power Analysis with a Leakage Model}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {16--29}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_2}, doi = {10.1007/978-3-540-28632-5\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BrierCO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04, author = {Beno{\^{\i}}t Chevallier{-}Mames and David Naccache and Pascal Paillier and David Pointcheval}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {How to Disembed a Program?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {441--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_32}, doi = {10.1007/978-3-540-28632-5\_32}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FeldhoferDW04, author = {Martin Feldhofer and Sandra Dominikus and Johannes Wolkerstorfer}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Strong Authentication for {RFID} Systems Using the {AES} Algorithm}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {357--370}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_26}, doi = {10.1007/978-3-540-28632-5\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FeldhoferDW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueMPV04, author = {Pierre{-}Alain Fouque and Fr{\'{e}}d{\'{e}}ric Muller and Guillaume Poupard and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Defeating Countermeasures Based on Randomized {BSD} Representations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {312--327}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_23}, doi = {10.1007/978-3-540-28632-5\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FouqueMPV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GiraultL04, author = {Marc Girault and David Lefranc}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Public Key Authentication with One (Online) Single Addition}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {413--427}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_30}, doi = {10.1007/978-3-540-28632-5\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GiraultL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GrossschadlS04, author = {Johann Gro{\ss}sch{\"{a}}dl and Erkay Savas}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Instruction Set Extensions for Fast Arithmetic in Finite Fields {GF(} p) and GF(2\({}^{\mbox{m}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {133--147}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_10}, doi = {10.1007/978-3-540-28632-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GrossschadlS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuraPWES04, author = {Nils Gura and Arun Patel and Arvinderpal Wander and Hans Eberle and Sheueling Chang Shantz}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Comparing Elliptic Curve Cryptography and {RSA} on 8-bit CPUs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {119--132}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_9}, doi = {10.1007/978-3-540-28632-5\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuraPWES04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hars04, author = {Laszlo Hars}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Long Modular Multiplication for Cryptographic Applications}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {45--61}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_4}, doi = {10.1007/978-3-540-28632-5\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hars04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Hemme04, author = {Ludger Hemme}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {A Differential Fault Attack Against Early Rounds of (Triple-)DES}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {254--267}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_19}, doi = {10.1007/978-3-540-28632-5\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Hemme04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HochS04, author = {Jonathan J. Hoch and Adi Shamir}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Fault Analysis of Stream Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {240--253}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_18}, doi = {10.1007/978-3-540-28632-5\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HochS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoshiWK04, author = {Nikhil Joshi and Kaijie Wu and Ramesh Karri}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Concurrent Error Detection Schemes for Involution Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {400--412}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_29}, doi = {10.1007/978-3-540-28632-5\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoshiWK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KwonGKH04, author = {Soonhak Kwon and Kris Gaj and Chang Hoon Kim and Chun Pyo Hong}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Efficient Linear Array for Multiplication in GF(2\({}^{\mbox{m}}\)) Using a Normal Basis for Elliptic Curve Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {76--91}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_6}, doi = {10.1007/978-3-540-28632-5\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KwonGKH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LeadbitterPS04, author = {Peter James Leadbitter and Dan Page and Nigel P. Smart}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Attacking {DSA} Under a Repeated Bits Assumption}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {428--440}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_31}, doi = {10.1007/978-3-540-28632-5\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LeadbitterPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LedigMV04, author = {Herv{\'{e}} Ledig and Fr{\'{e}}d{\'{e}}ric Muller and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Enhancing Collision Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {176--190}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_13}, doi = {10.1007/978-3-540-28632-5\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LedigMV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LemkeSP04, author = {Kerstin Lemke and Kai Schramm and Christof Paar}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {{DPA} on n-Bit Sized Boolean and Arithmetic Operations and Its Application to IDEA, RC6, and the HMAC-Construction}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {205--219}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_15}, doi = {10.1007/978-3-540-28632-5\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/LemkeSP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MamiyaMM04, author = {Hideyo Mamiya and Atsuko Miyaji and Hiroaki Morimoto}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Efficient Countermeasures against RPA, DPA, and {SPA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {343--356}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_25}, doi = {10.1007/978-3-540-28632-5\_25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/MamiyaMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Mishra04, author = {Pradeep Kumar Mishra}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {328--342}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_24}, doi = {10.1007/978-3-540-28632-5\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Mishra04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/NeisseP04, author = {Olaf Nei{\ss}e and J{\"{u}}rgen Pulkus}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Switching Blindings with a View Towards {IDEA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {230--239}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_17}, doi = {10.1007/978-3-540-28632-5\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/NeisseP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Olson04, author = {Loren D. Olson}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Side-Channel Attacks in {ECC:} {A} General Technique for Varying the Parametrization of the Elliptic Curve}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {220--229}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_16}, doi = {10.1007/978-3-540-28632-5\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Olson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OzturkSS04, author = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and Berk Sunar and Erkay Savas}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {92--106}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_7}, doi = {10.1007/978-3-540-28632-5\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OzturkSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PeetersNC04, author = {Eric Peeters and Michael Neve and Mathieu Ciet}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {{XTR} Implementation on Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {386--399}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_28}, doi = {10.1007/978-3-540-28632-5\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PeetersNC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SakaiS04, author = {Yasuyuki Sakai and Kouichi Sakurai}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {A New Attack with Side Channel Leakage During Exponent Recoding Computations}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {298--311}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_22}, doi = {10.1007/978-3-540-28632-5\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SakaiS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SchrammLFP04, author = {Kai Schramm and Gregor Leander and Patrick Felke and Christof Paar}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {A Collision-Attack on {AES:} Combining Side Channel- and Differential-Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {163--175}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_12}, doi = {10.1007/978-3-540-28632-5\_12}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/SchrammLFP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SokolovMBY04, author = {Danil Sokolov and Julian P. Murphy and Alexandre V. Bystrov and Alexandre Yakovlev}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Improving the Security of Dual-Rail Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {282--297}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_21}, doi = {10.1007/978-3-540-28632-5\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SokolovMBY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertOP04, author = {Fran{\c{c}}ois{-}Xavier Standaert and Siddika Berna {\"{O}}rs and Bart Preneel}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Power Analysis of an {FPGA:} Implementation of Rijndael: Is Pipelining a {DPA} Countermeasure?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {30--44}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_3}, doi = {10.1007/978-3-540-28632-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertOP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/WaddleW04, author = {Jason Waddle and David A. Wagner}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Towards Efficient Second-Order Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_1}, doi = {10.1007/978-3-540-28632-5\_1}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/WaddleW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Walter04, author = {Colin D. Walter}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Simple Power Analysis of Unified Code for {ECC} Double and Add}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {191--204}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_14}, doi = {10.1007/978-3-540-28632-5\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Walter04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YangCC04, author = {Bo{-}Yin Yang and Jiun{-}Ming Chen and Yen{-}Hung Chen}, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {{TTS:} High-Speed Signatures on a Low-Cost Smart Card}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, pages = {371--385}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28632-5\_27}, doi = {10.1007/978-3-540-28632-5\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YangCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2004, editor = {Marc Joye and Jean{-}Jacques Quisquater}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3156}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99451}, doi = {10.1007/B99451}, isbn = {3-540-22666-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AgrawalRR03, author = {Dakshi Agrawal and Josyula R. Rao and Pankaj Rohatgi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Multi-channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {2--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_2}, doi = {10.1007/978-3-540-45238-6\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalRR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Avanzi03, author = {Roberto Maria Avanzi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {366--381}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_29}, doi = {10.1007/978-3-540-45238-6\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Avanzi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BarakST03, author = {Boaz Barak and Ronen Shaltiel and Eran Tromer}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {True Random Number Generators Secure in a Changing Environment}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {166--180}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_14}, doi = {10.1007/978-3-540-45238-6\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BarakST03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CathaloKQ03, author = {Julien Cathalo and Fran{\c{c}}ois Koeune and Jean{-}Jacques Quisquater}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A New Type of Timing Attack: Application to {GPS}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {291--303}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_24}, doi = {10.1007/978-3-540-45238-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CathaloKQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03, author = {Beno{\^{\i}}t Chevallier{-}Mames and Marc Joye and Pascal Paillier}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Faster Double-Size Modular Multiplication from Euclidean Multipliers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {214--227}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10931455\_18}, doi = {10.1007/10931455\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChodowiecG03, author = {Pawel Chodowiec and Kris Gaj}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Very Compact {FPGA} Implementation of the {AES} Algorithm}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {319--333}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_26}, doi = {10.1007/978-3-540-45238-6\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChodowiecG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Clulow03, author = {Jolyon Clulow}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {On the Security of PKCS{\#}11}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {411--425}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_32}, doi = {10.1007/978-3-540-45238-6\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Clulow03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CoronT03, author = {Jean{-}S{\'{e}}bastien Coron and Alexei Tchulkine}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A New Algorithm for Switching from Arithmetic to Boolean Masking}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {89--97}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_8}, doi = {10.1007/978-3-540-45238-6\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CoronT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Dhem03, author = {Jean{-}Fran{\c{c}}ois Dhem}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Modular Reduction Algorithm in IF\({}_{\mbox{q}}\)[x] and Its Application to "Left to Right" Modular Multiplication in IF\({}_{\mbox{2}}\)[x]}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {203--213}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_17}, doi = {10.1007/978-3-540-45238-6\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Dhem03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Dichtl03, author = {Markus Dichtl}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {How to Predict the Output of a Hardware Random Number Generator}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {181--188}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_15}, doi = {10.1007/978-3-540-45238-6\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Dichtl03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/EpsteinHKRZ03, author = {Michael Epstein and Laszlo Hars and Raymond Krasinski and Martin Rosner and Hao Zheng}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {152--165}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_13}, doi = {10.1007/978-3-540-45238-6\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/EpsteinHKRZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueMP03, author = {Pierre{-}Alain Fouque and Gwena{\"{e}}lle Martinet and Guillaume Poupard}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Attacking Unbalanced {RSA-CRT} Using {SPA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {254--268}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_21}, doi = {10.1007/978-3-540-45238-6\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FouqueMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FouqueV03, author = {Pierre{-}Alain Fouque and Fr{\'{e}}d{\'{e}}ric Valette}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {The Doubling Attack - \emph{Why Upwards Is Better than Downwards}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {269--280}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_22}, doi = {10.1007/978-3-540-45238-6\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/FouqueV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FournierMLMT03, author = {Jacques J. A. Fournier and Simon W. Moore and Huiyun Li and Robert D. Mullins and George S. Taylor}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Security Evaluation of Asynchronous Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {137--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_12}, doi = {10.1007/978-3-540-45238-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FournierMLMT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GeiselmannS03, author = {Willi Geiselmann and Rainer Steinwandt}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Hardware to Solve Sparse Systems of Linear Equations over {GF(2)}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {51--61}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_5}, doi = {10.1007/978-3-540-45238-6\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GeiselmannS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Golic03, author = {Jovan Dj. Golic}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {DeKaRT: {A} New Paradigm for Key-Dependent Reversible Circuits}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {98--112}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_9}, doi = {10.1007/978-3-540-45238-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Golic03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItohIT03, author = {Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Practical Countermeasure against Address-Bit Differential Power Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {382--396}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_30}, doi = {10.1007/978-3-540-45238-6\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ItohIT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/JoyeP03, author = {Marc Joye and Pascal Paillier}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {GCD-Free Algorithms for Computing Modular Inverses}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {243--253}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_20}, doi = {10.1007/978-3-540-45238-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/JoyeP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KarlofW03, author = {Chris Karlof and David A. Wagner}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Hidden Markov Model Cryptanalysis}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {17--34}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_3}, doi = {10.1007/978-3-540-45238-6\_3}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KarlofW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KarriKG03, author = {Ramesh Karri and Grigori Kuznetsov and Michael G{\"{o}}ssel}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {113--124}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_10}, doi = {10.1007/978-3-540-45238-6\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KarriKG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KlimaPR03, author = {Vlastimil Kl{\'{\i}}ma and Ondrej Pokorn{\'{y}} and Tom{\'{a}}s Rosa}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Attacking RSA-Based Sessions in {SSL/TLS}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {426--440}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_33}, doi = {10.1007/978-3-540-45238-6\_33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KlimaPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KwonKH03, author = {Soonhak Kwon and Chang Hoon Kim and Chun Pyo Hong}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Exponentiation for a Class of Finite Fields {GF(2} \({}^{\mbox{n}}\)) Determined by Gauss Periods}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {228--242}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_19}, doi = {10.1007/978-3-540-45238-6\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KwonKH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OkeyaT03, author = {Katsuyuki Okeya and Tsuyoshi Takagi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A More Flexible Countermeasure against Side Channel Attacks Using Window Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {397--410}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_31}, doi = {10.1007/978-3-540-45238-6\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OkeyaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrsOP03, author = {Siddika Berna {\"{O}}rs and Elisabeth Oswald and Bart Preneel}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Power-Analysis Attacks on an {FPGA} - First Experimental Results}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {35--50}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_4}, doi = {10.1007/978-3-540-45238-6\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrsOP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PelzlWGP03, author = {Jan Pelzl and Thomas J. Wollinger and Jorge Guajardo and Christof Paar}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {351--365}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_28}, doi = {10.1007/978-3-540-45238-6\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PelzlWGP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/PiretQ03, author = {Gilles Piret and Jean{-}Jacques Quisquater}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Differential Fault Attack Technique against {SPN} Structures, with Application to the {AES} and {KHAZAD}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {77--88}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_7}, doi = {10.1007/978-3-540-45238-6\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/PiretQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Reyhani-MasolehH03, author = {Arash Reyhani{-}Masoleh and M. Anwarul Hasan}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {On Low Complexity Bit Parallel Polynomial Basis Multipliers}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {189--202}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_16}, doi = {10.1007/978-3-540-45238-6\_16}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/Reyhani-MasolehH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/SatohM03, author = {Akashi Satoh and Sumio Morioka}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Unified Hardware Architecture for 128-Bit Block Ciphers {AES} and Camellia}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {304--318}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_25}, doi = {10.1007/978-3-540-45238-6\_25}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/SatohM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Smart03, author = {Nigel P. Smart}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {An Analysis of Goubin's Refined Power Analysis Attack}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {281--290}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_23}, doi = {10.1007/978-3-540-45238-6\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Smart03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Stajano03, author = {Frank Stajano}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {The Security Challenges of Ubiquitous Computing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {1}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_1}, doi = {10.1007/978-3-540-45238-6\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Stajano03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/StandaertRQL03, author = {Fran{\c{c}}ois{-}Xavier Standaert and Ga{\"{e}}l Rouvroy and Jean{-}Jacques Quisquater and Jean{-}Didier Legat}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {334--350}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_27}, doi = {10.1007/978-3-540-45238-6\_27}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/StandaertRQL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TiriV03, author = {Kris Tiri and Ingrid Verbauwhede}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Securing Encryption Algorithms against {DPA} at the Logic Level: Next Generation Smart Card Technology}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {125--136}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_11}, doi = {10.1007/978-3-540-45238-6\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/TiriV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/TsunooSSSM03, author = {Yukiyasu Tsunoo and Teruo Saito and Tomoyasu Suzaki and Maki Shigeri and Hiroshi Miyauchi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptanalysis of {DES} Implemented on Computers with Cache}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {62--76}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_6}, doi = {10.1007/978-3-540-45238-6\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/TsunooSSSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2002, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36400-5}, doi = {10.1007/3-540-36400-5}, isbn = {3-540-00409-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2003, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6}, doi = {10.1007/978-3-540-45238-6}, isbn = {3-540-40833-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AgrawalARR02, author = {Dakshi Agrawal and Bruce Archambeault and Josyula R. Rao and Pankaj Rohatgi}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {The {EM} Side-Channel(s)}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {29--45}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_4}, doi = {10.1007/3-540-36400-5\_4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/AgrawalARR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/AumullerBFHS02, author = {Christian Aum{\"{u}}ller and Peter Bier and Wieland Fischer and Peter Hofreiter and Jean{-}Pierre Seifert}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Fault Attacks on {RSA} with {CRT:} Concrete Results and Practical Countermeasures}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {260--275}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_20}, doi = {10.1007/3-540-36400-5\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/AumullerBFHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BertoniBFMM02, author = {Guido Bertoni and Luca Breveglieri and Pasqualina Fragneto and Marco Macchetti and Stefano Marchesin}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Efficient Software Implementation of {AES} on 32-Bit Platforms}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {159--171}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_13}, doi = {10.1007/3-540-36400-5\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BertoniBFMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BoerLW02, author = {Bert den Boer and Kerstin Lemke and Guntram Wicke}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A {DPA} Attack against the Modular Reduction within a {CRT} Implementation of {RSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {228--243}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_18}, doi = {10.1007/3-540-36400-5\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BoerLW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BostonCLW02, author = {Nigel Boston and T. Charles Clancy and Y. Liow and Jonathan E. Webster}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Genus Two Hyperelliptic Curve Coprocessor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {400--414}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_29}, doi = {10.1007/3-540-36400-5\_29}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BostonCLW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChariRR02, author = {Suresh Chari and Josyula R. Rao and Pankaj Rohatgi}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Template Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {13--28}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_3}, doi = {10.1007/3-540-36400-5\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ChariRR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CietQS02, author = {Mathieu Ciet and Jean{-}Jacques Quisquater and Francesco Sica}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Preventing Differential Analysis in {GLV} Elliptic Curve Scalar Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {540--550}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_39}, doi = {10.1007/3-540-36400-5\_39}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CietQS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ClaytonB02, author = {Richard Clayton and Mike Bond}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Experience Using a Low-Cost {FPGA} Design to Crack {DES} Keys}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {579--592}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_42}, doi = {10.1007/3-540-36400-5\_42}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ClaytonB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ErnstJMHB02, author = {M. Ernst and Michael Jung and Felix Madlener and Sorin A. Huss and Rainer Bl{\"{u}}mel}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2\({}^{\mbox{n}}\))}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {381--399}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_28}, doi = {10.1007/3-540-36400-5\_28}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ErnstJMHB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FischerD02, author = {Viktor Fischer and Milos Drutarovsk{\'{y}}}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {True Random Number Generator Embedded in Reconfigurable Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {415--430}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_30}, doi = {10.1007/3-540-36400-5\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FischerD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/FischerS02, author = {Wieland Fischer and Jean{-}Pierre Seifert}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Increasing the Bitlength of a Crypto-Coprocessor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {71--81}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_7}, doi = {10.1007/3-540-36400-5\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/FischerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GebotysG02, author = {Catherine H. Gebotys and Robert J. Gebotys}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a {DSP} Processor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {114--128}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_10}, doi = {10.1007/3-540-36400-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GebotysG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GolicT02, author = {Jovan Dj. Golic and Christophe Tymen}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Multiplicative Masking and Power Analysis of {AES}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {198--212}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_16}, doi = {10.1007/3-540-36400-5\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GolicT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Gueron02, author = {Shay Gueron}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Enhanced Montgomery Multiplication}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {46--56}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_5}, doi = {10.1007/3-540-36400-5\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Gueron02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuraSEGGFGS02, author = {Nils Gura and Sheueling Chang Shantz and Hans Eberle and Sumit Gupta and Vipul Gupta and Daniel F. Finchelstein and Edouard Goupy and Douglas Stebila}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {An End-to-End Systems Approach to Elliptic Curve Cryptography}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {349--365}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_26}, doi = {10.1007/3-540-36400-5\_26}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GuraSEGGFGS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GutubTSK02, author = {Adnan Abdul{-}Aziz Gutub and Alexandre F. Tenca and Erkay Savas and {\c{C}}etin Kaya Ko{\c{c}}}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and {GF(2)}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {484--499}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_35}, doi = {10.1007/3-540-36400-5\_35}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/GutubTSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HaM02, author = {JaeCheol Ha and Sang{-}Jae Moon}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Randomized Signed-Scalar Multiplication of {ECC} to Resist Power Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {551--563}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_40}, doi = {10.1007/3-540-36400-5\_40}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HaM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Huang02, author = {Andrew Shane Huang}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Keeping Secrets in Hardware: The Microsoft Xbox{\texttrademark} Case Study}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {213--227}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_17}, doi = {10.1007/3-540-36400-5\_17}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/Huang02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItohIT02, author = {Kouichi Itoh and Tetsuya Izu and Masahiko Takenaka}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Address-Bit Differential Power Analysis of Cryptographic Schemes {OK-ECDH} and {OK-ECDSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {129--143}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_11}, doi = {10.1007/3-540-36400-5\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ItohIT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ItohYTT02, author = {Kouichi Itoh and Jun Yajima and Masahiko Takenaka and Naoya Torii}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {{DPA} Countermeasures by Improving the Window Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {303--317}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_23}, doi = {10.1007/3-540-36400-5\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/ItohYTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.