Search dblp for Publications

export results for "stream:conf/ches:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/tches/AbdulrahmanBKK24,
  author       = {Amin Abdulrahman and
                  Hanno Becker and
                  Matthias J. Kannwischer and
                  Fabien Klein},
  title        = {Fast and Clean: Auditable high-performance assembly via constraint
                  solving},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {87--132},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.87-132},
  doi          = {10.46586/TCHES.V2024.I1.87-132},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AbdulrahmanBKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AdjBBERSVZ24,
  author       = {Gora Adj and
                  Stefano Barbero and
                  Emanuele Bellini and
                  Andre Esser and
                  Luis Rivera{-}Zamarripa and
                  Carlo Sanna and
                  Javier A. Verbel and
                  Floyd Zweydinger},
  title        = {MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {304--328},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.304-328},
  doi          = {10.46586/TCHES.V2024.I2.304-328},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AdjBBERSVZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AnandBCIILMRS24,
  author       = {Ravi Anand and
                  Subhadeep Banik and
                  Andrea Caforio and
                  Tatsuya Ishikawa and
                  Takanori Isobe and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Mostafizar Rahman and
                  Kosei Sakamoto},
  title        = {Gleeok: {A} Family of Low-Latency PRFs and its Applications to Authenticated
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {545--587},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.545-587},
  doi          = {10.46586/TCHES.V2024.I2.545-587},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AnandBCIILMRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ArnoldBEO24,
  author       = {Paula Arnold and
                  Sebastian Berndt and
                  Thomas Eisenbarth and
                  Maximilian Orlt},
  title        = {Polynomial sharings on two secrets: Buy one, get one free},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {671--706},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.671-706},
  doi          = {10.46586/TCHES.V2024.I3.671-706},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ArnoldBEO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AskelandNN24,
  author       = {Amund Askeland and
                  Svetla Nikova and
                  Ventzislav Nikov},
  title        = {Who Watches the Watchers: Attacking Glitch Detection Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {157--179},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.157-179},
  doi          = {10.46586/TCHES.V2024.I1.157-179},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AskelandNN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanikR24,
  author       = {Subhadeep Banik and
                  Francesco Regazzoni},
  title        = {Compact Circuits for Efficient M{\"{o}}bius Transform},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {481--521},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.481-521},
  doi          = {10.46586/TCHES.V2024.I2.481-521},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BanikR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeneaCFPW24,
  author       = {Licinius Benea and
                  Mikael Carmona and
                  Viktor Fischer and
                  Florian Pebay{-}Peyroula and
                  Romain Wacquez},
  title        = {Impact of the Flicker Noise on the Ring Oscillator-based TRNGs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {870--889},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.870-889},
  doi          = {10.46586/TCHES.V2024.I2.870-889},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeneaCFPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BernardGHBF24,
  author       = {Florent Bernard and
                  Arturo Mollinedo Garay and
                  Patrick Haddad and
                  Nathalie Bochard and
                  Viktor Fischer},
  title        = {Low Cost and Precise Jitter Measurement Method for {TRNG} Entropy
                  Assessment},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {207--228},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.207-228},
  doi          = {10.46586/TCHES.V2024.I1.207-228},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BernardGHBF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BettaiebBBPP24,
  author       = {Slim Bettaieb and
                  Lo{\"{\i}}c Bidoux and
                  Alessandro Budroni and
                  Marco Palumbi and
                  Lucas Pandolfo Perin},
  title        = {Enabling {PERK} and other MPC-in-the-Head Signatures on Resource-Constrained
                  Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {84--109},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.84-109},
  doi          = {10.46586/TCHES.V2024.I4.84-109},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BettaiebBBPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeullensCCHK24,
  author       = {Ward Beullens and
                  Fabio Campos and
                  Sof{\'{\i}}a Celi and
                  Basil Hess and
                  Matthias J. Kannwischer},
  title        = {Nibbling {MAYO:} Optimized Implementations for {AVX2} and Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {252--275},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.252-275},
  doi          = {10.46586/TCHES.V2024.I2.252-275},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeullensCCHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BonPR24,
  author       = {Nicolas Bon and
                  David Pointcheval and
                  Matthieu Rivain},
  title        = {Optimized Homomorphic Evaluation of Boolean Functions},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {302--341},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.302-341},
  doi          = {10.46586/TCHES.V2024.I3.302-341},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BonPR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BoslandEBI24,
  author       = {Jonah Bosland and
                  Stefan Ene and
                  Peter Baumgartner and
                  Vincent Immler},
  title        = {High-Performance Design Patterns and File Formats for Side-Channel
                  Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {769--794},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.769-794},
  doi          = {10.46586/TCHES.V2024.I2.769-794},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BoslandEBI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainAERS24,
  author       = {Olivier Bronchain and
                  Melissa Azouaoui and
                  Mohamed ElGhamrawy and
                  Joost Renes and
                  Tobias Schneider},
  title        = {Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
                  Application to CRYSTALS-Dilithium},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {359--383},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.359-383},
  doi          = {10.46586/TCHES.V2024.I2.359-383},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainAERS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BurszteinIKMPZ24,
  author       = {Elie Bursztein and
                  Luca Invernizzi and
                  Karel Kr{\'{a}}l and
                  Daniel Moghimi and
                  Jean{-}Michel Picod and
                  Marina Zhang},
  title        = {Generalized Power Attacks against Crypto Hardware using Long-Range
                  Deep Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {472--499},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.472-499},
  doi          = {10.46586/TCHES.V2024.I3.472-499},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BurszteinIKMPZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletDGT24,
  author       = {Claude Carlet and
                  Abderrahman Daif and
                  Sylvain Guilley and
                  C{\'{e}}dric Tavernier},
  title        = {Quasi-linear masking against {SCA} and FIA, with cost amortization},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {398--432},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.398-432},
  doi          = {10.46586/TCHES.V2024.I1.398-432},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CarletDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersGMMN24,
  author       = {Ga{\"{e}}tan Cassiers and
                  Barbara Gigerl and
                  Stefan Mangard and
                  Charles Momin and
                  Rishub Nagpal},
  title        = {Compress: Generate Small and Fast Masked Pipelined Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {500--529},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.500-529},
  doi          = {10.46586/TCHES.V2024.I3.500-529},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersGMMN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersSV24,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Corentin Verhamme},
  title        = {Low-Latency Masked Gadgets Robust against Physical Defaults with Application
                  to Ascon},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {603--633},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.603-633},
  doi          = {10.46586/TCHES.V2024.I3.603-633},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CastelnoviH24,
  author       = {Laurent Castelnovi and
                  Agathe Houzelot},
  title        = {On the (Im)possibility of Preventing Differential Computation Analysis
                  with Internal Encodings},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {452--471},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.452-471},
  doi          = {10.46586/TCHES.V2024.I3.452-471},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CastelnoviH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CharlesU24,
  author       = {Alex Charl{\`{e}}s and
                  Aleksei Udovenko},
  title        = {White-box filtering attacks breaking {SEL} masking: from exponential
                  to polynomial time},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {1--24},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.1-24},
  doi          = {10.46586/TCHES.V2024.I3.1-24},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CharlesU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenC24,
  author       = {Keng{-}Yu Chen and
                  Jiun{-}Peng Chen},
  title        = {Masking Floating-Point Number Multiplication and Addition of Falcon
                  First- and Higher-order Implementations and Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {276--303},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.276-303},
  doi          = {10.46586/TCHES.V2024.I2.276-303},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenPDLH24,
  author       = {Yutian Chen and
                  Cong Peng and
                  Yu Dai and
                  Min Luo and
                  Debiao He},
  title        = {Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication
                  Algorithm},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {522--544},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.522-544},
  doi          = {10.46586/TCHES.V2024.I2.522-544},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenPDLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenYZLYYZWL24,
  author       = {Xiangren Chen and
                  Bohan Yang and
                  Jianfeng Zhu and
                  Jun Liu and
                  Shuying Yin and
                  Guang Yang and
                  Min Zhu and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {UpWB: An Uncoupled Architecture Design for White-box Cryptography
                  Using Vectorized Montgomery Multiplication},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {677--713},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.677-713},
  doi          = {10.46586/TCHES.V2024.I2.677-713},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenYZLYYZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengCGMMYZ24,
  author       = {Shing Hing William Cheng and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Dallas McNeil and
                  Toby Murray and
                  Yuval Yarom and
                  Zhiyuan Zhang},
  title        = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {224--248},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.224-248},
  doi          = {10.46586/TCHES.V2024.I3.224-248},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengCGMMYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengPW24,
  author       = {Hao Cheng and
                  Daniel Page and
                  Weijia Wang},
  title        = {eLIMInate: a Leakage-focused {ISE} for Masked Implementation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {329--358},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.329-358},
  doi          = {10.46586/TCHES.V2024.I2.329-358},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CheonCDGHKLMSY24,
  author       = {Jung Hee Cheon and
                  Hyeongmin Choe and
                  Julien Devevey and
                  Tim G{\"{u}}neysu and
                  Dongyeon Hong and
                  Markus Krausz and
                  Georg Land and
                  Marc M{\"{o}}ller and
                  Damien Stehl{\'{e}} and
                  MinJune Yi},
  title        = {{HAETAE:} Shorter Lattice-Based Fiat-Shamir Signatures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {25--75},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.25-75},
  doi          = {10.46586/TCHES.V2024.I3.25-75},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CheonCDGHKLMSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronGLTZ24,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois G{\'{e}}rard and
                  Tancr{\`{e}}de Lepoint and
                  Matthias Trannoy and
                  Rina Zeitoun},
  title        = {Improved High-Order Masked Generation of Masking Vector and Rejection
                  Sampling in Dilithium},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {335--354},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.335-354},
  doi          = {10.46586/TCHES.V2024.I4.335-354},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CoronGLTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DeshpandeHSY24,
  author       = {Sanjay Deshpande and
                  James Howe and
                  Jakub Szefer and
                  Dongze Yue},
  title        = {SDitH in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {215--251},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.215-251},
  doi          = {10.46586/TCHES.V2024.I2.215-251},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DeshpandeHSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DhoogheOT24,
  author       = {Siemen Dhooghe and
                  Artemii Ovchinnikov and
                  Dilara Toprakhisar},
  title        = {StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {229--263},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.229-263},
  doi          = {10.46586/TCHES.V2024.I1.229-263},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DhoogheOT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/EnderHFMP24,
  author       = {Maik Ender and
                  Felix Hahn and
                  Marc Fyrbiak and
                  Amir Moradi and
                  Christof Paar},
  title        = {JustSTART: How to Find an {RSA} Authentication Bypass on Xilinx UltraScale(+)
                  with Fuzzing},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {426--450},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.426-450},
  doi          = {10.46586/TCHES.V2024.I2.426-450},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/EnderHFMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ErataXPS24,
  author       = {Ferhat Erata and
                  Chuanqi Xu and
                  Ruzica Piskac and
                  Jakub Szefer},
  title        = {Quantum Circuit Reconstruction from Power Side-Channel Attacks on
                  Quantum Computer Controllers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {735--768},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.735-768},
  doi          = {10.46586/TCHES.V2024.I2.735-768},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ErataXPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FadaeiniaMM24,
  author       = {Bijan Fadaeinia and
                  Thorben Moos and
                  Amir Moradi},
  title        = {Static Leakage in Dual-Rail Precharge Logics},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {509--540},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.509-540},
  doi          = {10.46586/TCHES.V2024.I4.509-540},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FadaeiniaMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FallnichLZG24,
  author       = {Daniel Fallnich and
                  Christian Lanius and
                  Shutao Zhang and
                  Tobias Gemmeke},
  title        = {Efficient {ASIC} Architecture for Low Latency Classic McEliece Decoding},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {403--425},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.403-425},
  doi          = {10.46586/TCHES.V2024.I2.403-425},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FallnichLZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FarashahiFS24,
  author       = {Reza Rezaeian Farashahi and
                  Mojtaba Fadavi and
                  Soheila Sabbaghian},
  title        = {Faster Complete Addition Laws for Montgomery Curves},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {737--762},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.737-762},
  doi          = {10.46586/TCHES.V2024.I4.737-762},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FarashahiFS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FeldtkellerRSG24,
  author       = {Jakob Feldtkeller and
                  Jan Richter{-}Brockmann and
                  Pascal Sasdrich and
                  Tim G{\"{u}}neysu},
  title        = {Combined Threshold Implementation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {307--334},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.307-334},
  doi          = {10.46586/TCHES.V2024.I4.307-334},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FeldtkellerRSG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GanonL24,
  author       = {Oren Ganon and
                  Itamar Levi},
  title        = {CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric
                  Cryptography for Extendable and Deeply Embedded Processors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {377--417},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.377-417},
  doi          = {10.46586/TCHES.V2024.I3.377-417},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GanonL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GavrilanOWSZ24,
  author       = {Ivan Gavrilan and
                  Felix Oberhansl and
                  Alexander Wagner and
                  Emanuele Strieder and
                  Andreas Zankl},
  title        = {Impeccable Keccak Towards Fault Resilient {SPHINCS+} Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {154--189},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.154-189},
  doi          = {10.46586/TCHES.V2024.I2.154-189},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GavrilanOWSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GigerlKMMP24,
  author       = {Barbara Gigerl and
                  Franz Klug and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {Smooth Passage with the Guards: Second-Order Hardware Masking of the
                  {AES} with Low Randomness and Low Latency},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {309--335},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.309-335},
  doi          = {10.46586/TCHES.V2024.I1.309-335},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GigerlKMMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GoyMGL24,
  author       = {Guillaume Goy and
                  Julien Maillard and
                  Philippe Gaborit and
                  Antoine Loiseau},
  title        = {Single trace {HQC} shared key recovery with {SASCA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {64--87},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.64-87},
  doi          = {10.46586/TCHES.V2024.I2.64-87},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GoyMGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GrandammeTBDCG24,
  author       = {Paul Grandamme and
                  Pierre{-}Antoine Tissot and
                  Lilian Bossuet and
                  Jean{-}Max Dutertre and
                  Brice Colombier and
                  Vincent Grosso},
  title        = {Switching Off your Device Does Not Protect Against Fault Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {425--450},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.425-450},
  doi          = {10.46586/TCHES.V2024.I4.425-450},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GrandammeTBDCG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuerreauR24,
  author       = {Morgane Guerreau and
                  M{\'{e}}lissa Rossi},
  title        = {A Not So Discrete Sampler: Power Analysis Attacks on {HAWK} signature
                  scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {156--178},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.156-178},
  doi          = {10.46586/TCHES.V2024.I4.156-178},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuerreauR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuinetLBG24,
  author       = {Anna Guinet and
                  Georg Land and
                  Ioan Gabriel Bucur and
                  Tim G{\"{u}}neysu},
  title        = {A Tale of Snakes and Horses: Amplifying Correlation Power Analysis
                  on Quadratic Maps},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {27--50},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.27-50},
  doi          = {10.46586/TCHES.V2024.I1.27-50},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuinetLBG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HadzicCPMB24,
  author       = {Vedad Hadzic and
                  Ga{\"{e}}tan Cassiers and
                  Robert Primas and
                  Stefan Mangard and
                  Roderick Bloem},
  title        = {Quantile: Quantifying Information Leakage},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {433--456},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.433-456},
  doi          = {10.46586/TCHES.V2024.I1.433-456},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HadzicCPMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HajraCM24,
  author       = {Suvadeep Hajra and
                  Siddhartha Chowdhury and
                  Debdeep Mukhopadhyay},
  title        = {EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel
                  Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {336--374},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.336-374},
  doi          = {10.46586/TCHES.V2024.I1.336-374},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HajraCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HaringHB24,
  author       = {Johannes Haring and
                  Vedad Hadzic and
                  Roderick Bloem},
  title        = {Closing the Gap: Leakage Contracts for Processors with Transitions
                  and Glitches},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {110--132},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.110-132},
  doi          = {10.46586/TCHES.V2024.I4.110-132},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HaringHB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HeMKBX24,
  author       = {Pengzhou He and
                  Samira Carolina Oliva Madrigal and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Tianyou Bao and
                  Jiafeng Xie},
  title        = {{CASA:} {A} Compact and Scalable Accelerator for Approximate Homomorphic
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {451--480},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.451-480},
  doi          = {10.46586/TCHES.V2024.I2.451-480},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HeMKBX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HirataMALMNS24,
  author       = {Haruka Hirata and
                  Daiki Miyahara and
                  Victor Arribas and
                  Yang Li and
                  Noriyuki Miura and
                  Svetla Nikova and
                  Kazuo Sakiyama},
  title        = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection
                  M{\&}M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {133--156},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.133-156},
  doi          = {10.46586/TCHES.V2024.I1.133-156},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HirataMALMNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangAZDLCKC24,
  author       = {Junhao Huang and
                  Alexandre Adomnicai and
                  Jipeng Zhang and
                  Wangchen Dai and
                  Yao Liu and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Revisiting Keccak and Dilithium Implementations on ARMv7-M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {1--24},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.1-24},
  doi          = {10.46586/TCHES.V2024.I2.1-24},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HuangAZDLCKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JahandidehMB24,
  author       = {Vahid Jahandideh and
                  Bart Mennink and
                  Lejla Batina},
  title        = {An Algebraic Approach for Evaluating Random Probing Security With
                  Application to {AES}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {657--689},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.657-689},
  doi          = {10.46586/TCHES.V2024.I4.657-689},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JahandidehMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JancarSSSC24,
  author       = {Jan Jancar and
                  Vojtech Suchanek and
                  Petr Svenda and
                  Vladimir Sedlacek and
                  Lukasz Chmielewski},
  title        = {pyecsca: Reverse engineering black-box elliptic curve cryptography
                  via side-channel analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {355--381},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.355-381},
  doi          = {10.46586/TCHES.V2024.I4.355-381},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JancarSSSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JayasingheUP24,
  author       = {Darshana Jayasinghe and
                  Brian Udugama and
                  Sri Parameswaran},
  title        = {1LUTSensor: Detecting {FPGA} Voltage Fluctuations using LookUp Tables},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {51--86},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.51-86},
  doi          = {10.46586/TCHES.V2024.I1.51-86},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JayasingheUP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KarabulutA24,
  author       = {Emre Karabulut and
                  Aydin Aysu},
  title        = {Masking FALCON's Floating-Point Multiplication in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {483--508},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.483-508},
  doi          = {10.46586/TCHES.V2024.I4.483-508},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KarabulutA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KiyanRSSHAS24,
  author       = {Tuba Kiyan and
                  Lars Renkes and
                  Xhani Marvin Sa{\ss} and
                  Antonio Saavedra and
                  Norbert Herfurth and
                  Elham Amini and
                  Jean{-}Pierre Seifert},
  title        = {Through the Looking-Glass: Sensitive Data Extraction by Optical Probing
                  of Scan Chains},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {541--568},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.541-568},
  doi          = {10.46586/TCHES.V2024.I4.541-568},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KiyanRSSHAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KrahmerPLG24,
  author       = {Elisabeth Krahmer and
                  Peter Pessl and
                  Georg Land and
                  Tim G{\"{u}}neysu},
  title        = {Correction Fault Attacks on Randomized CRYSTALS-Dilithium},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {174--199},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.174-199},
  doi          = {10.46586/TCHES.V2024.I3.174-199},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KrahmerPLG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KunduCSKMV24,
  author       = {Suparna Kundu and
                  Siddhartha Chowdhury and
                  Sayandeep Saha and
                  Angshuman Karmakar and
                  Debdeep Mukhopadhyay and
                  Ingrid Verbauwhede},
  title        = {Carry Your Fault: {A} Fault Propagation Attack on Side-Channel Protected
                  LWE-based {KEM}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {844--869},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.844-869},
  doi          = {10.46586/TCHES.V2024.I2.844-869},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KunduCSKMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LandMRG24,
  author       = {Georg Land and
                  Adrian Marotzke and
                  Jan Richter{-}Brockmann and
                  Tim G{\"{u}}neysu},
  title        = {Gadget-based Masking of Streamlined {NTRU} Prime Decapsulation in
                  Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {1--26},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.1-26},
  doi          = {10.46586/TCHES.V2024.I1.1-26},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LandMRG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiLLWWCW24,
  author       = {Zhihao Li and
                  Ying Liu and
                  Xianhui Lu and
                  Ruida Wang and
                  Benqiang Wei and
                  Chunling Chen and
                  Kunpeng Wang},
  title        = {Faster Bootstrapping via Modulus Raising and Composite {NTT}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {563--591},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.563-591},
  doi          = {10.46586/TCHES.V2024.I1.563-591},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiLLWWCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiLWWLZZWH24,
  author       = {Zhihao Li and
                  Xianhui Lu and
                  Zhiwei Wang and
                  Ruida Wang and
                  Ying Liu and
                  Yinhang Zheng and
                  Lutan Zhao and
                  Kunpeng Wang and
                  Rui Hou},
  title        = {Faster NTRU-based Bootstrapping in less than 4 ms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {418--451},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.418-451},
  doi          = {10.46586/TCHES.V2024.I3.418-451},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiLWWLZZWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiangJWCGLZ24,
  author       = {Ziyuan Liang and
                  Qi'ao Jin and
                  Zhiyong Wang and
                  Zhaohui Chen and
                  Zhen Gu and
                  Yanheng Lu and
                  Fan Zhang},
  title        = {{SHAPER:} {A} General Architecture for Privacy-Preserving Primitives
                  in Secure Machine Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {819--843},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.819-843},
  doi          = {10.46586/TCHES.V2024.I2.819-843},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiangJWCGLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiuJWJ24,
  author       = {Guoxiao Liu and
                  Keting Jia and
                  Puwen Wei and
                  Lei Ju},
  title        = {High-Performance Hardware Implementation of MPCitH and Picnic3},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {190--214},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.190-214},
  doi          = {10.46586/TCHES.V2024.I2.190-214},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiuJWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiuSS24,
  author       = {Zhenyuan Liu and
                  Dillibabu Shanmugam and
                  Patrick Schaumont},
  title        = {FaultDetective Explainable to a Fault, from the Design Layout to the
                  Software},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {610--632},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.610-632},
  doi          = {10.46586/TCHES.V2024.I4.610-632},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiuSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiuZPYZHZWL24,
  author       = {Jiangxue Liu and
                  Cankun Zhao and
                  Shuohang Peng and
                  Bohan Yang and
                  Hang Zhao and
                  Xiangdong Han and
                  Min Zhu and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {A Low-Latency High-Order Arithmetic to Boolean Masking Conversion},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {630--653},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.630-653},
  doi          = {10.46586/TCHES.V2024.I2.630-653},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiuZPYZHZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MaHWZW24,
  author       = {Shihe Ma and
                  Tairong Huang and
                  Anyu Wang and
                  Qixian Zhou and
                  Xiaoyun Wang},
  title        = {Fast and Accurate: Efficient Full-Domain Functional Bootstrap and
                  Digit Decomposition for Homomorphic Computation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {592--616},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.592-616},
  doi          = {10.46586/TCHES.V2024.I1.592-616},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MaHWZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MehtaHFTG24,
  author       = {Dev M. Mehta and
                  Mohammad Hashemi and
                  Domenic Forte and
                  Shahin Tajik and
                  Fatemeh Ganji},
  title        = {1/0 Shades of {UC:} Photonic Side-Channel Analysis of Universal Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {574--602},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.574-602},
  doi          = {10.46586/TCHES.V2024.I3.574-602},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MehtaHFTG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MehtaHKFG24,
  author       = {Dev M. Mehta and
                  Mohammad Hashemi and
                  David Selasi Koblah and
                  Domenic Forte and
                  Fatemeh Ganji},
  title        = {Bake It Till You Make It Heat-induced Power Leakage from Masked Neural
                  Networks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {569--609},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.569-609},
  doi          = {10.46586/TCHES.V2024.I4.569-609},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MehtaHKFG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MercadierNRU24,
  author       = {Darius Mercadier and
                  Viet Sang Nguyen and
                  Matthieu Rivain and
                  Aleksei Udovenko},
  title        = {{OBSCURE:} Versatile Software Obfuscation from a Lightweight Secure
                  Element},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {588--629},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.588-629},
  doi          = {10.46586/TCHES.V2024.I2.588-629},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MercadierNRU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MishraPMCRM24,
  author       = {Nimish Mishra and
                  Kuheli Pratihar and
                  Satota Mandal and
                  Anirban Chakraborty and
                  Ulrich R{\"{u}}hrmair and
                  Debdeep Mukhopadhyay},
  title        = {CalyPSO: An Enhanced Search Optimization based Framework to Model
                  Delay-based PUFs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {501--526},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.501-526},
  doi          = {10.46586/TCHES.V2024.I1.501-526},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MishraPMCRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MonoKG24,
  author       = {Johannes Mono and
                  Kamil Kluczniak and
                  Tim G{\"{u}}neysu},
  title        = {Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like
                  Schemes},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {633--656},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.633-656},
  doi          = {10.46586/TCHES.V2024.I4.633-656},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MonoKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoosSS24,
  author       = {Thorben Moos and
                  Sayandeep Saha and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Prime Masking vs. Faults - Exponential Security Amplification against
                  Selected Classes of Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {690--736},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.690-736},
  doi          = {10.46586/TCHES.V2024.I4.690-736},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MoosSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MukherjeeAMLKDR24,
  author       = {Anisha Mukherjee and
                  Aikata and
                  Ahmet Can Mert and
                  Yongwoo Lee and
                  Sunmin Kwon and
                  Maxim Deryabin and
                  Sujoy Sinha Roy},
  title        = {ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials
                  and Limitations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {527--562},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.527-562},
  doi          = {10.46586/TCHES.V2024.I1.527-562},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MukherjeeAMLKDR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MullerLM24,
  author       = {Nicolai M{\"{u}}ller and
                  Daniel Lammers and
                  Amir Moradi},
  title        = {A Deep Analysis of two Glitch-Free Hardware Masking Schemes {SESYM}
                  and {LMDPL}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {76--98},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.76-98},
  doi          = {10.46586/TCHES.V2024.I3.76-98},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MullerLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MullerM24,
  author       = {Nicolai M{\"{u}}ller and
                  Amir Moradi},
  title        = {Automated Generation of Fault-Resistant Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {136--173},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.136-173},
  doi          = {10.46586/TCHES.V2024.I3.136-173},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MullerM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MullerM24a,
  author       = {Nicolai M{\"{u}}ller and
                  Amir Moradi},
  title        = {Robust but Relaxed Probing Model},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {451--482},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.451-482},
  doi          = {10.46586/TCHES.V2024.I4.451-482},
  timestamp    = {Thu, 03 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MullerM24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Noes24,
  author       = {Mathieu Des Noes},
  title        = {Distribution of Signal to Noise Ratio and Application to Leakage Detection},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {384--402},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.384-402},
  doi          = {10.46586/TCHES.V2024.I2.384-402},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Noes24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/OFlynn24,
  author       = {Colin O'Flynn},
  title        = {Phase Modulation Side Channels: Jittery {JTAG} for On-Chip Voltage
                  Measurements},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {382--424},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.382-424},
  doi          = {10.46586/TCHES.V2024.I4.382-424},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/OFlynn24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/OlmosBGGLLOS24,
  author       = {Santiago Arranz Olmos and
                  Gilles Barthe and
                  Ruben Gonzalez and
                  Benjamin Gr{\'{e}}goire and
                  Vincent Laporte and
                  Jean{-}Christophe L{\'{e}}chenet and
                  Tiago Oliveira and
                  Peter Schwabe},
  title        = {High-assurance zeroization},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {375--397},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.375-397},
  doi          = {10.46586/TCHES.V2024.I1.375-397},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/OlmosBGGLLOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PeetermansV24,
  author       = {Adriaan Peetermans and
                  Ingrid Verbauwhede},
  title        = {{TRNG} Entropy Model in the Presence of Flicker {FM} Noise},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {285--306},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.285-306},
  doi          = {10.46586/TCHES.V2024.I4.285-306},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PeetermansV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RaviPJDB24,
  author       = {Prasanna Ravi and
                  Thales Paiva and
                  Dirmanto Jap and
                  Jan{-}Pieter D'Anvers and
                  Shivam Bhasin},
  title        = {Defeating Low-Cost Countermeasures against Side-Channel Attacks in
                  Lattice-based Encryption {A} Case Study on Crystals-Kyber},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {795--818},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.795-818},
  doi          = {10.46586/TCHES.V2024.I2.795-818},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RaviPJDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SchildAP24,
  author       = {Leonard Schild and
                  Aysajan Abidin and
                  Bart Preneel},
  title        = {Fast Transciphering Via Batched And Reconfigurable {LUT} Evaluation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {205--230},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.205-230},
  doi          = {10.46586/TCHES.V2024.I4.205-230},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SchildAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SchinkWOKSFK24,
  author       = {Marc Schink and
                  Alexander Wagner and
                  Felix Oberhansl and
                  Stefan K{\"{o}}ckeis and
                  Emanuele Strieder and
                  Sven Freud and
                  Dominik Klein},
  title        = {Unlock the Door to my Secrets, but don't Forget to Glitch {A} comprehensive
                  analysis of flash erase suppression attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {88--129},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.88-129},
  doi          = {10.46586/TCHES.V2024.I2.88-129},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SchinkWOKSFK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShiHWZLL24,
  author       = {Hetian Shi and
                  Yi He and
                  Qing Wang and
                  Jianwei Zhuge and
                  Qi Li and
                  Xin Liu},
  title        = {Laser-Based Command Injection Attacks on Voice-Controlled Microphone
                  Arrays},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {654--676},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.654-676},
  doi          = {10.46586/TCHES.V2024.I2.654-676},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShiHWZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SieckZBCEY24,
  author       = {Florian Sieck and
                  Zhiyuan Zhang and
                  Sebastian Berndt and
                  Chitchanok Chuengsatiansup and
                  Thomas Eisenbarth and
                  Yuval Yarom},
  title        = {TeeJam: Sub-Cache-Line Leakages Strike Back},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {457--500},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.457-500},
  doi          = {10.46586/TCHES.V2024.I1.457-500},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SieckZBCEY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SvendaDBLJZP24,
  author       = {Petr Svenda and
                  Antonin Dufka and
                  Milan Broz and
                  Roman Lacko and
                  Tomas Jaros and
                  Daniel Zatovic and
                  Josef Pospisil},
  title        = {TPMScan: {A} wide-scale study of security-relevant properties of {TPM}
                  2.0 chips},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {714--734},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.714-734},
  doi          = {10.46586/TCHES.V2024.I2.714-734},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SvendaDBLJZP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TanGSCW24,
  author       = {Huiyu Tan and
                  Pengfei Gao and
                  Fu Song and
                  Taolue Chen and
                  Zhilin Wu},
  title        = {SAT-based Formal Verification of Fault Injection Countermeasures for
                  Cryptographic Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {1--39},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.1-39},
  doi          = {10.46586/TCHES.V2024.I4.1-39},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TanGSCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TangGZLL24,
  author       = {Yufeng Tang and
                  Zheng Gong and
                  Liangju Zhao and
                  Di Li and
                  Zhe Liu},
  title        = {Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation
                  Analysis and Its Applications},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {634--670},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.634-670},
  doi          = {10.46586/TCHES.V2024.I3.634-670},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TangGZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TollecHNABCHJM24,
  author       = {Simon Tollec and
                  Vedad Hadzic and
                  Pascal Nasahl and
                  Mihail Asavoae and
                  Roderick Bloem and
                  Damien Courouss{\'{e}} and
                  Karine Heydemann and
                  Mathieu Jan and
                  Stefan Mangard},
  title        = {Fault-Resistant Partitioning of Secure CPUs for System Co-Verification
                  against Faults},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {179--204},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.179-204},
  doi          = {10.46586/TCHES.V2024.I4.179-204},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TollecHNABCHJM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoHIM24,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Fallen Sanctuary: {A} Higher-Order and Leakage-Resilient Rekeying
                  Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {264--308},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.264-308},
  doi          = {10.46586/TCHES.V2024.I1.264-308},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoHIM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UhleSM24,
  author       = {Felix Uhle and
                  Florian Stolz and
                  Amir Moradi},
  title        = {Another Evidence to not Employ Customized Masked Hardware Identifying
                  and Fixing Flaws in {SCARV}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {133--155},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.133-155},
  doi          = {10.46586/TCHES.V2024.I4.133-155},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UhleSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/VDBGV24,
  author       = {Dilip Kumar S. V. and
                  Siemen Dhooghe and
                  Josep Balasch and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  title        = {Time Sharing - {A} Novel Approach to Low-Latency Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {249--272},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.249-272},
  doi          = {10.46586/TCHES.V2024.I3.249-272},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/VDBGV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangDWZWSZ24,
  author       = {Ziyu Wang and
                  Yaoling Ding and
                  An Wang and
                  Yuwei Zhang and
                  Congming Wei and
                  Shaofei Sun and
                  Liehuang Zhu},
  title        = {{SPA-GPT:} General Pulse Tailor for Simple Power Analysis Based on
                  Reinforcement Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {40--83},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.40-83},
  doi          = {10.46586/TCHES.V2024.I4.40-83},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangDWZWSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangZZGC24,
  author       = {Tengfei Wang and
                  Chi Zhang and
                  Xiaolin Zhang and
                  Dawu Gu and
                  Pei Cao},
  title        = {Optimized Hardware-Software Co-Design for Kyber and Dilithium on {RISC-V}
                  SoC {FPGA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {99--135},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.99-135},
  doi          = {10.46586/TCHES.V2024.I3.99-135},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangZZGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WeiLWLLW24,
  author       = {Benqiang Wei and
                  Xianhui Lu and
                  Ruida Wang and
                  Kun Liu and
                  Zhihao Li and
                  Kunpeng Wang},
  title        = {Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers
                  in 3GPP by combining two modes of {TFHE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {530--573},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.530-573},
  doi          = {10.46586/TCHES.V2024.I3.530-573},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WeiLWLLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WilkeWRE24,
  author       = {Luca Wilke and
                  Jan Wichelmann and
                  Anja Rabich and
                  Thomas Eisenbarth},
  title        = {SEV-Step {A} Single-Stepping Framework for {AMD-SEV}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {180--206},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.180-206},
  doi          = {10.46586/TCHES.V2024.I1.180-206},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WilkeWRE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YeSZCCH24,
  author       = {Zewen Ye and
                  Ruibing Song and
                  Hao Zhang and
                  Donglong Chen and
                  Ray Chak{-}Chung Cheung and
                  Kejie Huang},
  title        = {A Highly-efficient Lattice-based Post-Quantum Cryptography Processor
                  for IoT Applications},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {130--153},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.130-153},
  doi          = {10.46586/TCHES.V2024.I2.130-153},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/YeSZCCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YuCYWPW24,
  author       = {Tianrun Yu and
                  Chi Cheng and
                  Zilong Yang and
                  Yingchen Wang and
                  Yanbin Pan and
                  Jian Weng},
  title        = {Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis
                  of Number Theoretic Transform in Lattice-Based KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {200--223},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.200-223},
  doi          = {10.46586/TCHES.V2024.I3.200-223},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/YuCYWPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZeitschnerM24,
  author       = {Jannik Zeitschner and
                  Amir Moradi},
  title        = {PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded
                  Software},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {342--376},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.342-376},
  doi          = {10.46586/TCHES.V2024.I3.342-376},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZeitschnerM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangWSJWLYW24,
  author       = {Juelin Zhang and
                  Taoyun Wang and
                  Yiteng Sun and
                  Fanjie Ji and
                  Bohan Wang and
                  Lu Li and
                  Yu Yu and
                  Weijia Wang},
  title        = {Efficient Table-Based Masking with Pre-processing},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {273--301},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.273-301},
  doi          = {10.46586/TCHES.V2024.I3.273-301},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangWSJWLYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhaoZLYZYZWL24,
  author       = {Cankun Zhao and
                  Hang Zhao and
                  Jiangxue Liu and
                  Bohan Yang and
                  Wenping Zhu and
                  Shuying Yin and
                  Min Zhu and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {Breaking Ground: {A} New Area Record for Low-Latency First-Order Masked
                  {SHA-3} Advancing from the 4x Area Era to the 3x Area Era},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {231--257},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.231-257},
  doi          = {10.46586/TCHES.V2024.I4.231-257},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhaoZLYZYZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhouZFWTSBL24,
  author       = {Tian Zhou and
                  Fangyu Zheng and
                  Guang Fan and
                  Lipeng Wan and
                  Wenxu Tang and
                  Yixuan Song and
                  Yi Bian and
                  Jingqiang Lin},
  title        = {ConvKyber: Unleashing the Power of {AI} Accelerators for Faster Kyber
                  with Novel Iteration-based Approaches},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {25--63},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.25-63},
  doi          = {10.46586/TCHES.V2024.I2.25-63},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhouZFWTSBL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhuHYDZH24,
  author       = {Xudong Zhu and
                  Haoqi He and
                  Zhengbang Yang and
                  Yi Deng and
                  Lutan Zhao and
                  Rui Hou},
  title        = {Elastic {MSM:} {A} Fast, Elastic and Modular Preprocessing Technique
                  for Multi-Scalar Multiplication Algorithm on GPUs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {4},
  pages        = {258--284},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i4.258-284},
  doi          = {10.46586/TCHES.V2024.I4.258-284},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhuHYDZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AcharyaGF23,
  author       = {Rabin Yu Acharya and
                  Fatemeh Ganji and
                  Domenic Forte},
  title        = {Information Theory-based Evolution of Neural Networks for Side-channel
                  Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {401--437},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.401-437},
  doi          = {10.46586/TCHES.V2023.I1.401-437},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AcharyaGF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Aikata0CMR23,
  author       = {Aikata and
                  Andrea Basso and
                  Ga{\"{e}}tan Cassiers and
                  Ahmet Can Mert and
                  Sujoy Sinha Roy},
  title        = {Kavach: Lightweight masking techniques for polynomial arithmetic in
                  lattice-based cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {366--390},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.366-390},
  doi          = {10.46586/TCHES.V2023.I3.366-390},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Aikata0CMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlexanderVV23,
  author       = {Anju Alexander and
                  Annapurna Valiveti and
                  Srinivas Vivek},
  title        = {A Faster Third-Order Masking of Lookup Tables},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {538--556},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.538-556},
  doi          = {10.46586/TCHES.V2023.I1.538-556},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlexanderVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlmeidaBBGLL00Q23,
  author       = {Jos{\'{e}} Bacelar Almeida and
                  Manuel Barbosa and
                  Gilles Barthe and
                  Benjamin Gr{\'{e}}goire and
                  Vincent Laporte and
                  Jean{-}Christophe L{\'{e}}chenet and
                  Tiago Oliveira and
                  Hugo Pacheco and
                  Miguel Quaresma and
                  Peter Schwabe and
                  Antoine S{\'{e}}r{\'{e}} and
                  Pierre{-}Yves Strub},
  title        = {Formally verifying Kyber Episode {IV:} Implementation correctness},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {164--193},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.164-193},
  doi          = {10.46586/TCHES.V2023.I3.164-193},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AlmeidaBBGLL00Q23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AulbachCKSS23,
  author       = {Thomas Aulbach and
                  Fabio Campos and
                  Juliane Kr{\"{a}}mer and
                  Simona Samardjiska and
                  Marc St{\"{o}}ttinger},
  title        = {Separating Oil and Vinegar with a Single Trace Side-Channel Assisted
                  Kipnis-Shamir Attack on {UOV}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {221--245},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.221-245},
  doi          = {10.46586/TCHES.V2023.I3.221-245},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AulbachCKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzouaouiBCHKRSSSV23,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers and
                  Cl{\'{e}}ment Hoffmann and
                  Yulia Kuzovkova and
                  Joost Renes and
                  Tobias Schneider and
                  Markus Sch{\"{o}}nauer and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Christine van Vredendaal},
  title        = {Protecting Dilithium against Leakage Revisited Sensitivity Analysis
                  and Improved Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {58--79},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.58-79},
  doi          = {10.46586/TCHES.V2023.I4.58-79},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AzouaouiBCHKRSSSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BatinaCHSS23,
  author       = {Lejla Batina and
                  Lukasz Chmielewski and
                  Bj{\"{o}}rn Haase and
                  Niels Samwel and
                  Peter Schwabe},
  title        = {SoK: SCA-secure {ECC} in software - mission impossible?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {557--589},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.557-589},
  doi          = {10.46586/TCHES.V2023.I1.557-589},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BatinaCHSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelaidR23,
  author       = {Sonia Bela{\"{\i}}d and
                  Matthieu Rivain},
  title        = {High Order Side-Channel Security for Elliptic-Curve Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {238--276},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.238-276},
  doi          = {10.46586/TCHES.V2023.I1.238-276},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BelaidR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelenkyDTBKAK23,
  author       = {Yaacov Belenky and
                  Ira Dushar and
                  Valery Teper and
                  Vadim Bugaenko and
                  Oleg Karavaev and
                  Leonid Azriel and
                  Yury Kreimer},
  title        = {Carry-based Differential Power Analysis {(CDPA)} and its Application
                  to Attacking {HMAC-SHA-2}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {1--29},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.1-29},
  doi          = {10.46586/TCHES.V2023.I3.1-29},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelenkyDTBKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelkheyarDDGR23,
  author       = {Yanis Belkheyar and
                  Joan Daemen and
                  Christoph Dobraunig and
                  Santosh Ghosh and
                  Shahram Rasoolzadeh},
  title        = {BipBip: {A} Low-Latency Tweakable Block Cipher with Small Dimensions},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {326--368},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.326-368},
  doi          = {10.46586/TCHES.V2023.I1.326-368},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelkheyarDDGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiFO23,
  author       = {Francesco Berti and
                  Sebastian Faust and
                  Maximilian Orlt},
  title        = {Provable Secure Parallel Gadgets},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {420--459},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.420-459},
  doi          = {10.46586/TCHES.V2023.I4.420-459},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BertiFO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BerzatiVCMVV23,
  author       = {Alexandre Berzati and
                  Andersson Calle Viera and
                  Maya Chartouny and
                  Steven Madec and
                  Damien Vergnaud and
                  David Vigilant},
  title        = {Exploiting Intermediate Value Leakage in Dilithium: {A} Template-Based
                  Approach},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {188--210},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.188-210},
  doi          = {10.46586/TCHES.V2023.I4.188-210},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BerzatiVCMVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeullensCHKPSY23,
  author       = {Ward Beullens and
                  Ming{-}Shing Chen and
                  Shih{-}Hao Hung and
                  Matthias J. Kannwischer and
                  Bo{-}Yuan Peng and
                  Cheng{-}Jhih Shih and
                  Bo{-}Yin Yang},
  title        = {Oil and Vinegar: Modern Parameters and Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {321--365},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.321-365},
  doi          = {10.46586/TCHES.V2023.I3.321-365},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeullensCHKPSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BiryukovLU23,
  author       = {Alex Biryukov and
                  Baptiste Lambin and
                  Aleksei Udovenko},
  title        = {Cryptanalysis of ARX-based White-box Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {97--135},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.97-135},
  doi          = {10.46586/TCHES.V2023.I3.97-135},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BiryukovLU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BockBL23,
  author       = {Estuardo Alpirez Bock and
                  Chris Brzuska and
                  Russell W. F. Lai},
  title        = {On Provable White-Box Security in the Strong Incompressibility Model},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {167--187},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.167-187},
  doi          = {10.46586/TCHES.V2023.I4.167-187},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BockBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BosBCRVV23,
  author       = {Joppe W. Bos and
                  Olivier Bronchain and
                  Frank Custers and
                  Joost Renes and
                  Denise Verbakel and
                  Christine van Vredendaal},
  title        = {Enabling FrodoKEM on Embedded Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {74--96},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.74-96},
  doi          = {10.46586/TCHES.V2023.I3.74-96},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BosBCRVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BotrelH23,
  author       = {Gautam Botrel and
                  Youssef El Housni},
  title        = {Faster Montgomery multiplication and Multi-Scalar-Multiplication for
                  SNARKs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {504--521},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.504-521},
  doi          = {10.46586/TCHES.V2023.I3.504-521},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BotrelH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CamuratiDS23,
  author       = {Giovanni Camurati and
                  Matteo Dell'Amico and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security
                  Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {277--300},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.277-300},
  doi          = {10.46586/TCHES.V2023.I1.277-300},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CamuratiDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersDSU23,
  author       = {Ga{\"{e}}tan Cassiers and
                  Henri Devillez and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi},
  title        = {Efficient Regression-Based Linear Discriminant Analysis for Side-Channel
                  Security Evaluations Towards Analytical Attacks against 32-bit Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {270--293},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.270-293},
  doi          = {10.46586/TCHES.V2023.I3.270-293},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersDSU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersMMMS23,
  author       = {Ga{\"{e}}tan Cassiers and
                  Lo{\"{\i}}c Masure and
                  Charles Momin and
                  Thorben Moos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Prime-Field Masking in Hardware and its Soundness against Low-Noise
                  {SCA} Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {482--518},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.482-518},
  doi          = {10.46586/TCHES.V2023.I2.482-518},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersMMMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CharlesU23,
  author       = {Alex Charl{\`{e}}s and
                  Aleksei Udovenko},
  title        = {LPN-based Attacks in the White-box Setting},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {318--343},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.318-343},
  doi          = {10.46586/TCHES.V2023.I4.318-343},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CharlesU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenO23,
  author       = {Zitai Chen and
                  David F. Oswald},
  title        = {PMFault: Faulting and Bricking Server CPUs through Management Interfaces
                  Or: {A} Modern Example of Halt and Catch Fire},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {1--23},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.1-23},
  doi          = {10.46586/TCHES.V2023.I2.1-23},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengGMPP23,
  author       = {Hao Cheng and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Ben Marshall and
                  Dan Page and
                  Thinh Hung Pham},
  title        = {{RISC-V} Instruction Set Extensions for Lightweight Symmetric Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {193--237},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.193-237},
  doi          = {10.46586/TCHES.V2023.I1.193-237},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ChengGMPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronGMZ23,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois G{\'{e}}rard and
                  Simon Montoya and
                  Rina Zeitoun},
  title        = {High-order Polynomial Comparison and Masking Lattice-based Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {153--192},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.153-192},
  doi          = {10.46586/TCHES.V2023.I1.153-192},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CoronGMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronGTZ23,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois G{\'{e}}rard and
                  Matthias Trannoy and
                  Rina Zeitoun},
  title        = {High-order masking of {NTRU}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {180--211},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.180-211},
  doi          = {10.46586/TCHES.V2023.I2.180-211},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CoronGTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronGTZ23a,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois G{\'{e}}rard and
                  Matthias Trannoy and
                  Rina Zeitoun},
  title        = {Improved Gadgets for the High-Order Masking of Dilithium},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {110--145},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.110-145},
  doi          = {10.46586/TCHES.V2023.I4.110-145},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CoronGTZ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CostesS23,
  author       = {Nicolas Costes and
                  Martijn Stam},
  title        = {Pincering {SKINNY} by Exploiting Slow Diffusion Enhancing Differential
                  Power Analysis with Cluster Graph Inference},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {460--492},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.460-492},
  doi          = {10.46586/TCHES.V2023.I4.460-492},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CostesS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaiZZ23,
  author       = {Yu Dai and
                  Fangguo Zhang and
                  Chang{-}An Zhao},
  title        = {Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {393--419},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.393-419},
  doi          = {10.46586/TCHES.V2023.I4.393-419},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DaiZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DingGGSZL23,
  author       = {Yuanchao Ding and
                  Hua Guo and
                  Yewei Guan and
                  Hutao Song and
                  Xiyong Zhang and
                  Jianwei Liu},
  title        = {Some New Methods to Generate Short Addition Chains},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {270--285},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.270-285},
  doi          = {10.46586/TCHES.V2023.I2.270-285},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DingGGSZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Dobraunig0HRSW23,
  author       = {Christoph Dobraunig and
                  Lorenzo Grassi and
                  Lukas Helminger and
                  Christian Rechberger and
                  Markus Schofnegger and
                  Roman Walch},
  title        = {Pasta: {A} Case for Hybrid Homomorphic Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {30--73},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.30-73},
  doi          = {10.46586/TCHES.V2023.I3.30-73},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Dobraunig0HRSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ElGhamrawyABRSSSV23,
  author       = {Mohamed ElGhamrawy and
                  Melissa Azouaoui and
                  Olivier Bronchain and
                  Joost Renes and
                  Tobias Schneider and
                  Markus Sch{\"{o}}nauer and
                  Okan Seker and
                  Christine van Vredendaal},
  title        = {From {MLWE} to {RLWE:} {A} Differential Fault Attack on Randomized
                  {\&} Deterministic Dilithium},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {262--286},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.262-286},
  doi          = {10.46586/TCHES.V2023.I4.262-286},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ElGhamrawyABRSSSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FischerBBDS23,
  author       = {Viktor Fischer and
                  Florent Bernard and
                  Nathalie Bochard and
                  Quentin Dallison and
                  Maciej Sk{\'{o}}rski},
  title        = {Enhancing Quality and Security of the {PLL-TRNG}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {211--237},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.211-237},
  doi          = {10.46586/TCHES.V2023.I4.211-237},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FischerBBDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaspozD23,
  author       = {John Gaspoz and
                  Siemen Dhooghe},
  title        = {Threshold Implementations in Software: Micro-architectural Leakages
                  in Algorithms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {155--179},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.155-179},
  doi          = {10.46586/TCHES.V2023.I2.155-179},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GaspozD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GeelenBPHMSWDVVA23,
  author       = {Robin Geelen and
                  Michiel Van Beirendonck and
                  Hilder V. L. Pereira and
                  Brian Huffman and
                  Tynan McAuley and
                  Ben Selfridge and
                  Daniel Wagner and
                  Georgios D. Dimou and
                  Ingrid Verbauwhede and
                  Frederik Vercauteren and
                  David W. Archer},
  title        = {{BASALISC:} Programmable Hardware Accelerator for {BGV} Fully Homomorphic
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {32--57},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.32-57},
  doi          = {10.46586/TCHES.V2023.I4.32-57},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GeelenBPHMSWDVVA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Genet23,
  author       = {Aymeric Gen{\^{e}}t},
  title        = {On Protecting {SPHINCS+} Against Fault Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {80--114},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.80-114},
  doi          = {10.46586/TCHES.V2023.I2.80-114},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Genet23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HermelinkMSPR23,
  author       = {Julius Hermelink and
                  Erik M{\aa}rtensson and
                  Simona Samardjiska and
                  Peter Pessl and
                  Gabi Dreo Rodosek},
  title        = {Belief Propagation Meets Lattice Reduction: Security Estimates for
                  Error-Tolerant Key Recovery from Decryption Errors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {287--317},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.287-317},
  doi          = {10.46586/TCHES.V2023.I4.287-317},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HermelinkMSPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HermelinkSST23,
  author       = {Julius Hermelink and
                  Silvan Streit and
                  Emanuele Strieder and
                  Katharina Thieme},
  title        = {Adapting Belief Propagation to Counter Shuffling of NTTs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {60--88},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.60-88},
  doi          = {10.46586/TCHES.V2023.I1.60-88},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HermelinkSST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangSC0023,
  author       = {Senyang Huang and
                  Rui Qi Sim and
                  Chitchanok Chuengsatiansup and
                  Qian Guo and
                  Thomas Johansson},
  title        = {Cache-Timing Attack Against {HQC}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {136--163},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.136-163},
  doi          = {10.46586/TCHES.V2023.I3.136-163},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HuangSC0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/IsobeILMNSS23,
  author       = {Takanori Isobe and
                  Ryoma Ito and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Motoki Nakahashi and
                  Kosei Sakamoto and
                  Rentaro Shiba},
  title        = {Areion: Highly-Efficient Permutations and Its Applications to Hash
                  Functions for Short Input},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {115--154},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.115-154},
  doi          = {10.46586/TCHES.V2023.I2.115-154},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/IsobeILMNSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KR23,
  author       = {Keerthi K. and
                  Chester Rebeiro},
  title        = {FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {212--240},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.212-240},
  doi          = {10.46586/TCHES.V2023.I2.212-240},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KluczniakS23,
  author       = {Kamil Kluczniak and
                  Leonard Schild},
  title        = {{FDFB:} Full Domain Functional Bootstrapping Towards Practical Fully
                  Homomorphic Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {501--537},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.501-537},
  doi          = {10.46586/TCHES.V2023.I1.501-537},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KluczniakS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LeviH23,
  author       = {Itamar Levi and
                  Carmit Hazay},
  title        = {Garbled Circuits from an {SCA} Perspective Free {XOR} can be Quite
                  Expensive. .},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {54--79},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.54-79},
  doi          = {10.46586/TCHES.V2023.I2.54-79},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LeviH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Longa23,
  author       = {Patrick Longa},
  title        = {Efficient Algorithms for Large Prime Characteristic Fields and Their
                  Application to Bilinear Pairings},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {445--472},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.445-472},
  doi          = {10.46586/TCHES.V2023.I3.445-472},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Longa23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LuWYCFWWC23,
  author       = {Tao Lu and
                  Chengkun Wei and
                  Ruijing Yu and
                  Chaochao Chen and
                  Wenjing Fang and
                  Lei Wang and
                  Zeke Wang and
                  Wenzhi Chen},
  title        = {cuZK: Accelerating Zero-Knowledge Proof with {A} Faster Parallel Multi-Scalar
                  Multiplication Algorithm on GPUs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {194--220},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.194-220},
  doi          = {10.46586/TCHES.V2023.I3.194-220},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LuWYCFWWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LuoFG23,
  author       = {Guiwen Luo and
                  Shihui Fu and
                  Guang Gong},
  title        = {Speeding Up Multi-Scalar Multiplication over Fixed Points Towards
                  Efficient zkSNARKs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {358--380},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.358-380},
  doi          = {10.46586/TCHES.V2023.I2.358-380},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LuoFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureCHS23,
  author       = {Lo{\"{\i}}c Masure and
                  Ga{\"{e}}tan Cassiers and
                  Julien M. Hendrickx and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Information Bounds and Convergence Rates for Side-Channel Security
                  Evaluators},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {522--569},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.522-569},
  doi          = {10.46586/TCHES.V2023.I3.522-569},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MasureCHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureCLS23,
  author       = {Lo{\"{\i}}c Masure and
                  Valence Cristiani and
                  Maxime Lecomte and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Don't Learn What You Already Know Scheme-Aware Modeling for Profiling
                  Side-Channel Analysis against Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {32--59},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.32-59},
  doi          = {10.46586/TCHES.V2023.I1.32-59},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MasureCLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MayS23,
  author       = {Alexander May and
                  Carl Richard Theodor Schneider},
  title        = {Dlog is Practically as Hard (or Easy) as {DH} - Solving Dlogs via
                  {DH} Oracles on {EC} Standards},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {146--166},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.146-166},
  doi          = {10.46586/TCHES.V2023.I4.146-166},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MayS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MertAKSYLR23,
  author       = {Ahmet Can Mert and
                  Aikata and
                  Sunmin Kwon and
                  Youngsam Shin and
                  Donghoon Yoo and
                  Yongwoo Lee and
                  Sujoy Sinha Roy},
  title        = {Medha: Microcoded Hardware Accelerator for computing on Encrypted
                  Data},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {463--500},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.463-500},
  doi          = {10.46586/TCHES.V2023.I1.463-500},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MertAKSYLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MosavirikMST23,
  author       = {Tahoura Mosavirik and
                  Saleh Khalaj Monfared and
                  Maryam Saadat{-}Safa and
                  Shahin Tajik},
  title        = {Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective
                  Impedance Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {238--261},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.238-261},
  doi          = {10.46586/TCHES.V2023.I4.238-261},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MosavirikMST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MosavirikST23,
  author       = {Tahoura Mosavirik and
                  Patrick Schaumont and
                  Shahin Tajik},
  title        = {ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering
                  Detection},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {301--325},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.301-325},
  doi          = {10.46586/TCHES.V2023.I1.301-325},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MosavirikST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NaitoSS23,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara},
  title        = {{MMM:} Authenticated Encryption with Minimum Secret State for Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {80--109},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.80-109},
  doi          = {10.46586/TCHES.V2023.I4.80-109},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NaitoSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PhalakarnSRH23,
  author       = {Kittiphon Phalakarn and
                  Vorapong Suppakitpaisarn and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  M. Anwar Hasan},
  title        = {Vectorized and Parallel Computation of Large Smooth-Degree Isogenies
                  using Precedence-Constrained Scheduling},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {246--269},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.246-269},
  doi          = {10.46586/TCHES.V2023.I3.246-269},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PhalakarnSRH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Qiu023,
  author       = {Zehong (Zephyr) Qiu and
                  Fan Zhang},
  title        = {{RAFA:} Redundancies-assisted Algebraic Fault Analysis and its implementation
                  on {SPN} block ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {570--596},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.570-596},
  doi          = {10.46586/TCHES.V2023.I3.570-596},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Qiu023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RajendranRDBC23,
  author       = {Gokulnath Rajendran and
                  Prasanna Ravi and
                  Jan{-}Pieter D'Anvers and
                  Shivam Bhasin and
                  Anupam Chattopadhyay},
  title        = {Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs
                  - Parallel {PC} Oracle Attacks on Kyber {KEM} and Beyond},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {418--446},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.418-446},
  doi          = {10.46586/TCHES.V2023.I2.418-446},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RajendranRDBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RaviYBZC23,
  author       = {Prasanna Ravi and
                  Bolin Yang and
                  Shivam Bhasin and
                  Fan Zhang and
                  Anupam Chattopadhyay},
  title        = {Fiddling the Twiddle Constants - Fault Injection Analysis of the Number
                  Theoretic Transform},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {447--481},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.447-481},
  doi          = {10.46586/TCHES.V2023.I2.447-481},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RaviYBZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SchoosMTG23,
  author       = {Kai Schoos and
                  Sergej Meschkov and
                  Mehdi B. Tahoori and
                  Dennis R. E. Gnad},
  title        = {JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {294--320},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.294-320},
  doi          = {10.46586/TCHES.V2023.I3.294-320},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SchoosMTG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShahmirzadiDM23,
  author       = {Aein Rezaei Shahmirzadi and
                  Siemen Dhooghe and
                  Amir Moradi},
  title        = {Low-Latency and Low-Randomness Second-Order Masked Cubic Functions},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {113--152},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.113-152},
  doi          = {10.46586/TCHES.V2023.I1.113-152},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShahmirzadiDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShenCZGJ23,
  author       = {Muyan Shen and
                  Chi Cheng and
                  Xiaohan Zhang and
                  Qian Guo and
                  Tao Jiang},
  title        = {Find the Bad Apples: An efficient method for perfect key recovery
                  under imperfect {SCA} oracles - {A} case study of Kyber},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {89--112},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.89-112},
  doi          = {10.46586/TCHES.V2023.I1.89-112},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShenCZGJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShuklaABMM23,
  author       = {Shubhi Shukla and
                  Manaar Alam and
                  Sarani Bhattacharya and
                  Pabitra Mitra and
                  Debdeep Mukhopadhyay},
  title        = {"Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy
                  in Deep Neural Networks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {587--613},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.587-613},
  doi          = {10.46586/TCHES.V2023.I2.587-613},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShuklaABMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SpielmannGS23,
  author       = {David Spielmann and
                  Ognjen Glamocanin and
                  Mirjana Stojilovic},
  title        = {{RDS:} {FPGA} Routing Delay Sensors for Effective Remote Power Analysis
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {543--567},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.543-567},
  doi          = {10.46586/TCHES.V2023.I2.543-567},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SpielmannGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Staib023,
  author       = {Marvin Staib and
                  Amir Moradi},
  title        = {Deep Learning Side-Channel Collision Attack},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {422--444},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.422-444},
  doi          = {10.46586/TCHES.V2023.I3.422-444},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Staib023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/StolzTSG23,
  author       = {Florian Stolz and
                  Jan Philipp Thoma and
                  Pascal Sasdrich and
                  Tim G{\"{u}}neysu},
  title        = {Risky Translations: Securing TLBs against Timing Side Channels},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {1--31},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.1-31},
  doi          = {10.46586/TCHES.V2023.I1.1-31},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/StolzTSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SuYRYZWL23,
  author       = {Shuqin Su and
                  Bohan Yang and
                  Vladimir Rozic and
                  Mingyuan Yang and
                  Min Zhu and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {A Closer Look at the Chaotic Ring Oscillators based {TRNG} Design},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {381--417},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.381-417},
  doi          = {10.46586/TCHES.V2023.I2.381-417},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SuYRYZWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TanakaUXITH23,
  author       = {Yutaro Tanaka and
                  Rei Ueno and
                  Keita Xagawa and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {473--503},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.473-503},
  doi          = {10.46586/TCHES.V2023.I3.473-503},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TanakaUXITH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TangGCX23,
  author       = {Yufeng Tang and
                  Zheng Gong and
                  Jinhai Chen and
                  Nanjiang Xie},
  title        = {Higher-Order {DCA} Attacks on White-Box Implementations with Masking
                  and Shuffling Countermeasures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {369--400},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.369-400},
  doi          = {10.46586/TCHES.V2023.I1.369-400},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/TangGCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TangGLZ23,
  author       = {Yufeng Tang and
                  Zheng Gong and
                  Bin Li and
                  Liangju Zhao},
  title        = {Revisiting the Computation Analysis against Internal Encodings in
                  White-Box Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {493--522},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.493-522},
  doi          = {10.46586/TCHES.V2023.I4.493-522},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TangGLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoH23,
  author       = {Rei Ueno and
                  Naofumi Homma},
  title        = {How Secure is Exponent-blinded {RSA-CRT} with Sliding Window Exponentiation?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {241--269},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.241-269},
  doi          = {10.46586/TCHES.V2023.I2.241-269},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UlitzschMBTS23,
  author       = {Vincent Quentin Ulitzsch and
                  Soundes Marzougui and
                  Alexis Bagia and
                  Mehdi Tibouchi and
                  Jean{-}Pierre Seifert},
  title        = {Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice
                  Signatures with {ILP}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {367--392},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.367-392},
  doi          = {10.46586/TCHES.V2023.I4.367-392},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UlitzschMBTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangJZY23,
  author       = {Weijia Wang and
                  Fanjie Ji and
                  Juelin Zhang and
                  Yu Yu},
  title        = {Efficient Private Circuits with Precomputation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {286--309},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.286-309},
  doi          = {10.46586/TCHES.V2023.I2.286-309},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangJZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/XuDWL23,
  author       = {Luyao Xu and
                  Zhengyi Dai and
                  Baofeng Wu and
                  Dongdai Lin},
  title        = {Improved Attacks on {(EC)DSA} with Nonce Leakage by Lattice Sieving
                  with Predicate},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {568--586},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.568-586},
  doi          = {10.46586/TCHES.V2023.I2.568-586},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/XuDWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YapBBP23,
  author       = {Trevor Yap and
                  Adrien Benamira and
                  Shivam Bhasin and
                  Thomas Peyrin},
  title        = {Peek into the Black-Box: Interpretable Neural Network using {SAT}
                  Equations in Side-Channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {24--53},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.24-53},
  doi          = {10.46586/TCHES.V2023.I2.24-53},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/YapBBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YouKSH23,
  author       = {Shih{-}Chun You and
                  Markus G. Kuhn and
                  Sumanta Sarkar and
                  Feng Hao},
  title        = {Low Trace-Count Template Attacks on 32-bit Implementations of {ASCON}
                  {AEAD}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {344--366},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.344-366},
  doi          = {10.46586/TCHES.V2023.I4.344-366},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/YouKSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YuDQKJWZ23,
  author       = {Qingyuan Yu and
                  Xiaoyang Dong and
                  Lingyue Qin and
                  Yongze Kang and
                  Keting Jia and
                  Xiaoyun Wang and
                  Guoyan Zhang},
  title        = {Automatic Search of Meet-in-the-Middle Differential Fault Analysis
                  on AES-like Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {4},
  pages        = {1--31},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i4.1-31},
  doi          = {10.46586/TCHES.V2023.I4.1-31},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/YuDQKJWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZaidBCHV23,
  author       = {Gabriel Zaid and
                  Lilian Bossuet and
                  Mathieu Carbone and
                  Amaury Habrard and
                  Alexandre Venelli},
  title        = {Conditional Variational AutoEncoder based on Stochastic Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {310--357},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.310-357},
  doi          = {10.46586/TCHES.V2023.I2.310-357},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZaidBCHV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZeitschnerM023,
  author       = {Jannik Zeitschner and
                  Nicolai M{\"{u}}ller and
                  Amir Moradi},
  title        = {PROLEAD{\_}SW Probing-Based Software Leakage Detection for {ARM} Binaries},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {391--421},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.391-421},
  doi          = {10.46586/TCHES.V2023.I3.391-421},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZeitschnerM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangHFGTRZG23,
  author       = {Fan Zhang and
                  Run Huang and
                  Tianxiang Feng and
                  Xue Gong and
                  Yulong Tao and
                  Kui Ren and
                  Xinjie Zhao and
                  Shize Guo},
  title        = {Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {519--542},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.519-542},
  doi          = {10.46586/TCHES.V2023.I2.519-542},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangHFGTRZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhuZOTW23,
  author       = {Danyang Zhu and
                  Rongrong Zhang and
                  Lun Ou and
                  Jing Tian and
                  Zhongfeng Wang},
  title        = {Low-Latency Design and Implementation of the Squaring in Class Groups
                  for Verifiable Delay Function Using Redundant Representation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {438--462},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.438-462},
  doi          = {10.46586/TCHES.V2023.I1.438-462},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhuZOTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AbdulrahmanCCHK22,
  author       = {Amin Abdulrahman and
                  Jiun{-}Peng Chen and
                  Yu{-}Jia Chen and
                  Vincent Hwang and
                  Matthias J. Kannwischer and
                  Bo{-}Yin Yang},
  title        = {Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {127--151},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.127-151},
  doi          = {10.46586/TCHES.V2022.I1.127-151},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AbdulrahmanCCHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlkimHY22,
  author       = {Erdem Alkim and
                  Vincent Hwang and
                  Bo{-}Yin Yang},
  title        = {Multi-Parameter Support with NTTs for {NTRU} and {NTRU} Prime on Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {349--371},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.349-371},
  doi          = {10.46586/TCHES.V2022.I4.349-371},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AlkimHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzouaouiBGP22,
  author       = {Melissa Azouaoui and
                  Olivier Bronchain and
                  Vincent Grosso and
                  Kostas Papagiannopoulos and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Bitslice Masking and Improved Shuffling: How and When to Mix Them
                  in Software?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {140--165},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.140-165},
  doi          = {10.46586/TCHES.V2022.I2.140-165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AzouaouiBGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzouaouiKSV22,
  author       = {Melissa Azouaoui and
                  Yulia Kuzovkova and
                  Tobias Schneider and
                  Christine van Vredendaal},
  title        = {Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {372--396},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.372-396},
  doi          = {10.46586/TCHES.V2022.I4.372-396},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AzouaouiKSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BagheriSRBS22,
  author       = {Nasour Bagheri and
                  Sadegh Sadeghi and
                  Prasanna Ravi and
                  Shivam Bhasin and
                  Hadi Soleimany},
  title        = {{SIPFA:} Statistical Ineffective Persistent Faults Analysis on Feistel
                  Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {367--390},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.367-390},
  doi          = {10.46586/TCHES.V2022.I3.367-390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BagheriSRBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BarbuBDGHLMRX22,
  author       = {Guillaume Barbu and
                  Ward Beullens and
                  Emmanuelle Dottax and
                  Christophe Giraud and
                  Agathe Houzelot and
                  Chaoyun Li and
                  Mohammad Mahzoun and
                  Adri{\'{a}}n Ranea and
                  Jianrui Xie},
  title        = {{ECDSA} White-Box Implementations: Attacks and Designs from {CHES}
                  2021 Challenge},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {527--552},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.527-552},
  doi          = {10.46586/TCHES.V2022.I4.527-552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BarbuBDGHLMRX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BartkewitzBMMS22,
  author       = {Timo Bartkewitz and
                  Sven Bettendorf and
                  Thorben Moos and
                  Amir Moradi and
                  Falk Schellenberg},
  title        = {Beware of Insufficient Redundancy An Experimental Evaluation of Code-based
                  {FI} Countermeasures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {438--462},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.438-462},
  doi          = {10.46586/TCHES.V2022.I3.438-462},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BartkewitzBMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BaruaF22,
  author       = {Anomadarshi Barua and
                  Mohammad Abdullah Al Faruque},
  title        = {PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {438--462},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.438-462},
  doi          = {10.46586/TCHES.V2022.I4.438-462},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BaruaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BauerDGKLM22,
  author       = {Sven Bauer and
                  Hermann Drexler and
                  Max Gebhardt and
                  Dominik Klein and
                  Friederike Laus and
                  Johannes Mittmann},
  title        = {Attacks Against White-Box {ECDSA} and Discussion of Countermeasures
                  {A} Report on the WhibOx Contest 2021},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {25--55},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.25-55},
  doi          = {10.46586/TCHES.V2022.I4.25-55},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BauerDGKLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeckerHKYY22,
  author       = {Hanno Becker and
                  Vincent Hwang and
                  Matthias J. Kannwischer and
                  Bo{-}Yin Yang and
                  Shang{-}Yi Yang},
  title        = {Neon {NTT:} Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple
                  {M1}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {221--244},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.221-244},
  doi          = {10.46586/TCHES.V2022.I1.221-244},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeckerHKYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeckerMKYV22,
  author       = {Hanno Becker and
                  Jose Maria Bermudo Mera and
                  Angshuman Karmakar and
                  Joseph Yiu and
                  Ingrid Verbauwhede},
  title        = {Polynomial multiplication on embedded vector architectures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {482--505},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.482-505},
  doi          = {10.46586/TCHES.V2022.I1.482-505},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeckerMKYV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeerelGHMN22,
  author       = {Peter A. Beerel and
                  Marios Georgiou and
                  Ben Hamlin and
                  Alex J. Malozemoff and
                  Pierluigi Nuzzo},
  title        = {Towards a Formal Treatment of Logic Locking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {92--114},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.92-114},
  doi          = {10.46586/TCHES.V2022.I2.92-114},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeerelGHMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeguinotCGR22,
  author       = {Julien B{\'{e}}guinot and
                  Wei Cheng and
                  Sylvain Guilley and
                  Olivier Rioul},
  title        = {Side-Channel Expectation-Maximization Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {774--799},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.774-799},
  doi          = {10.46586/TCHES.V2022.I4.774-799},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeguinotCGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelenkyBACDKMRT22,
  author       = {Yaacov Belenky and
                  Vadim Bugaenko and
                  Leonid Azriel and
                  Hennadii Chernyshchyk and
                  Ira Dushar and
                  Oleg Karavaev and
                  Oleh Maksimenko and
                  Yulia Ruda and
                  Valery Teper and
                  Yury Kreimer},
  title        = {Redundancy {AES} Masking Basis for Attack Mitigation {(RAMBAM)}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {69--91},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.69-91},
  doi          = {10.46586/TCHES.V2022.I2.69-91},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelenkyBACDKMRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelliziaHKMS22,
  author       = {Davide Bellizia and
                  Cl{\'{e}}ment Hoffmann and
                  Dina Kamel and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {When Bad News Become Good News Towards Usable Instances of Learning
                  with Physical Errors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {1--24},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.1-24},
  doi          = {10.46586/TCHES.V2022.I4.1-24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelliziaHKMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiBBHPSU22,
  author       = {Francesco Berti and
                  Shivam Bhasin and
                  Jakub Breier and
                  Xiaolu Hou and
                  Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Balazs Udvarhelyi},
  title        = {A Finer-Grain Analysis of the Leakage (Non) Resilience of {OCB}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {461--481},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.461-481},
  doi          = {10.46586/TCHES.V2022.I1.461-481},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BertiBBHPSU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeyneDMS22,
  author       = {Tim Beyne and
                  Siemen Dhooghe and
                  Amir Moradi and
                  Aein Rezaei Shahmirzadi},
  title        = {Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {679--721},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.679-721},
  doi          = {10.46586/TCHES.V2022.I1.679-721},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeyneDMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BonnetainJ22,
  author       = {Xavier Bonnetain and
                  Samuel Jaques},
  title        = {Quantum Period Finding against Symmetric Primitives in Practice},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {1--27},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.1-27},
  doi          = {10.46586/TCHES.V2022.I1.1-27},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BonnetainJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainC22,
  author       = {Olivier Bronchain and
                  Ga{\"{e}}tan Cassiers},
  title        = {Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit
                  with Application to Lattice-Based KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {553--588},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.553-588},
  doi          = {10.46586/TCHES.V2022.I4.553-588},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CasagrandeLCPA22,
  author       = {Marco Casagrande and
                  Eleonora Losiouk and
                  Mauro Conti and
                  Mathias Payer and
                  Daniele Antonioli},
  title        = {BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking
                  Ecosystem},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {330--366},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.330-366},
  doi          = {10.46586/TCHES.V2022.I3.330-366},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CasagrandeLCPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenCDLNSW22,
  author       = {Po{-}Jen Chen and
                  Tung Chou and
                  Sanjay Deshpande and
                  Norman Lahr and
                  Ruben Niederhagen and
                  Jakub Szefer and
                  Wen Wang},
  title        = {Complete and Improved {FPGA} Implementation of Classic McEliece},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {71--113},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.71-113},
  doi          = {10.46586/TCHES.V2022.I3.71-113},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenCDLNSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenYYWL22,
  author       = {Xiangren Chen and
                  Bohan Yang and
                  Shouyi Yin and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {{CFNTT:} Scalable Radix-2/4 {NTT} Multiplication Architecture with
                  an Efficient Conflict-free Memory Mapping Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {94--126},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.94-126},
  doi          = {10.46586/TCHES.V2022.I1.94-126},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenYYWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengFGR22,
  author       = {Hao Cheng and
                  Georgios Fotiadis and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter Y. A. Ryan},
  title        = {Highly Vectorized {SIKE} for {AVX-512}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {41--68},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.41-68},
  doi          = {10.46586/TCHES.V2022.I2.41-68},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengFGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChouL22,
  author       = {Tung Chou and
                  Jin{-}Han Liou},
  title        = {A Constant-time {AVX2} Implementation of a Variant of {ROLLO}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {152--174},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.152-174},
  doi          = {10.46586/TCHES.V2022.I1.152-174},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChouL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronGMZ22,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Fran{\c{c}}ois G{\'{e}}rard and
                  Simon Montoya and
                  Rina Zeitoun},
  title        = {High-order Table-based Conversion Algorithms and Masking Lattice-based
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {1--40},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.1-40},
  doi          = {10.46586/TCHES.V2022.I2.1-40},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CoronGMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DAnversHPBV22,
  author       = {Jan{-}Pieter D'Anvers and
                  Daniel Heinz and
                  Peter Pessl and
                  Michiel Van Beirendonck and
                  Ingrid Verbauwhede},
  title        = {Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {115--139},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.115-139},
  doi          = {10.46586/TCHES.V2022.I2.115-139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DAnversHPBV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Delvaux22,
  author       = {Jeroen Delvaux},
  title        = {Roulette: {A} Diverse Family of Feasible Fault Attacks on Masked Kyber},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {637--660},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.637-660},
  doi          = {10.46586/TCHES.V2022.I4.637-660},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Delvaux22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DericH22,
  author       = {Aleksa Deric and
                  Daniel E. Holcomb},
  title        = {Know Time to Die - Integrity Checking for Zero Trust Chiplet-based
                  Systems Using Between-Die Delay PUFs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {391--412},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.391-412},
  doi          = {10.46586/TCHES.V2022.I3.391-412},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DericH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DubeyAPCA22,
  author       = {Anuj Dubey and
                  Afzal Ahmad and
                  Muhammad Adeel Pasha and
                  Rosario Cammarota and
                  Aydin Aysu},
  title        = {ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware
                  Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {506--556},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.506-556},
  doi          = {10.46586/TCHES.V2022.I1.506-556},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DubeyAPCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FeldtkellerKSMG22,
  author       = {Jakob Feldtkeller and
                  David Knichel and
                  Pascal Sasdrich and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  title        = {Randomness Optimization for Gadget Compositions in Higher-Order Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {188--227},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.188-227},
  doi          = {10.46586/TCHES.V2022.I4.188-227},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FeldtkellerKSMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FeoMGKGPT22,
  author       = {Luca De Feo and
                  Nadia El Mrabet and
                  Aymeric Gen{\^{e}}t and
                  Novak Kaluderovic and
                  Natacha Linard de Guertechin and
                  Simon Ponti{\'{e}} and
                  {\'{E}}lise Tasso},
  title        = {{SIKE} Channels Zero-Value Side-Channel Attacks on {SIKE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {264--289},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.264-289},
  doi          = {10.46586/TCHES.V2022.I3.264-289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FeoMGKGPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FouqueKPY22,
  author       = {Pierre{-}Alain Fouque and
                  Paul Kirchner and
                  Thomas Pornin and
                  Yang Yu},
  title        = {{BAT:} Small and Fast {KEM} over {NTRU} Lattices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {240--265},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.240-265},
  doi          = {10.46586/TCHES.V2022.I2.240-265},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FouqueKPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FritzmannBRKSVS22,
  author       = {Tim Fritzmann and
                  Michiel Van Beirendonck and
                  Debapriya Basu Roy and
                  Patrick Karl and
                  Thomas Schamberger and
                  Ingrid Verbauwhede and
                  Georg Sigl},
  title        = {Masked Accelerators and Instruction Set Extensions for Post-Quantum
                  Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {414--460},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.414-460},
  doi          = {10.46586/TCHES.V2022.I1.414-460},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FritzmannBRKSVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GarbXKF22,
  author       = {Kathrin Garb and
                  Marvin Xhemrishi and
                  Ludwig K{\"{u}}rzinger and
                  Christoph Frisch},
  title        = {The Wiretap Channel for Capacitive PUF-Based Security Enclosures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {165--191},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.165-191},
  doi          = {10.46586/TCHES.V2022.I3.165-191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GarbXKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GohrLS22,
  author       = {Aron Gohr and
                  Friederike Laus and
                  Werner Schindler},
  title        = {Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel
                  Analysis {A} Report on the {CHES} Challenge Side-Channel Contest 2020},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {397--437},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.397-437},
  doi          = {10.46586/TCHES.V2022.I4.397-437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GohrLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GotteS22,
  author       = {Jan Sebastian G{\"{o}}tte and
                  Bj{\"{o}}rn Scheuermann},
  title        = {Can't Touch This: Inertial HSMs Thwart Advanced Physical Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {69--93},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.69-93},
  doi          = {10.46586/TCHES.V2022.I1.69-93},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GotteS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuerreauMRR22,
  author       = {Morgane Guerreau and
                  Ange Martinelli and
                  Thomas Ricosset and
                  M{\'{e}}lissa Rossi},
  title        = {The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on
                  Falcon},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {141--164},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.141-164},
  doi          = {10.46586/TCHES.V2022.I3.141-164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuerreauMRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoHJLNS22,
  author       = {Qian Guo and
                  Clemens Hlauschek and
                  Thomas Johansson and
                  Norman Lahr and
                  Alexander Nilsson and
                  Robin Leander Schr{\"{o}}der},
  title        = {Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling
                  in {HQC} and {BIKE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {223--263},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.223-263},
  doi          = {10.46586/TCHES.V2022.I3.223-263},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GuoHJLNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoJJ22,
  author       = {Qian Guo and
                  Andreas Johansson and
                  Thomas Johansson},
  title        = {A Key-Recovery Side-Channel Attack on Classic McEliece Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {800--827},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.800-827},
  doi          = {10.46586/TCHES.V2022.I4.800-827},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuoJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangZZLCKC22,
  author       = {Junhao Huang and
                  Jipeng Zhang and
                  Haosong Zhao and
                  Zhe Liu and
                  Ray C. C. Cheung and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Donglong Chen},
  title        = {Improved Plantard Arithmetic for Lattice-based Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {614--636},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.614-636},
  doi          = {10.46586/TCHES.V2022.I4.614-636},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HuangZZLCKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HwangLSSTWY22,
  author       = {Vincent Hwang and
                  Jiaxiang Liu and
                  Gregor Seiler and
                  Xiaomu Shi and
                  Ming{-}Hsien Tsai and
                  Bow{-}Yaw Wang and
                  Bo{-}Yin Yang},
  title        = {Verified {NTT} Multiplications for {NISTPQC} {KEM} Lattice Finalists:
                  Kyber, SABER, and {NTRU}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {718--750},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.718-750},
  doi          = {10.46586/TCHES.V2022.I4.718-750},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HwangLSSTWY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ItoUH22,
  author       = {Akira Ito and
                  Rei Ueno and
                  Naofumi Homma},
  title        = {Perceived Information Revisited New Metrics to Evaluate Success Rate
                  of Side-Channel Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {228--254},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.228-254},
  doi          = {10.46586/TCHES.V2022.I4.228-254},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ItoUH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Joye22,
  author       = {Marc Joye},
  title        = {SoK: Fully Homomorphic Encryption over the [Discretized] Torus},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {661--692},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.661-692},
  doi          = {10.46586/TCHES.V2022.I4.661-692},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Joye22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KiaeiS22,
  author       = {Pantea Kiaei and
                  Patrick Schaumont},
  title        = {SoC Root Canal! Root Cause Analysis of Power Side-Channel Leakage
                  in System-on-Chip Designs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {751--773},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.751-773},
  doi          = {10.46586/TCHES.V2022.I4.751-773},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KiaeiS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KnichelM22,
  author       = {David Knichel and
                  Amir Moradi},
  title        = {Composable Gadgets with Reused Fresh Masks First-Order Probing-Secure
                  Hardware Circuits with only 6 Fresh Masks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {114--140},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.114-140},
  doi          = {10.46586/TCHES.V2022.I3.114-140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KnichelM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KnichelMMS22,
  author       = {David Knichel and
                  Amir Moradi and
                  Nicolai M{\"{u}}ller and
                  Pascal Sasdrich},
  title        = {Automated Generation of Masked Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {589--629},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.589-629},
  doi          = {10.46586/TCHES.V2022.I1.589-629},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KnichelMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KnichelSM22,
  author       = {David Knichel and
                  Pascal Sasdrich and
                  Amir Moradi},
  title        = {Generic Hardware Private Circuits Towards Automated Generation of
                  Composable Secure Gadgets},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {323--344},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.323-344},
  doi          = {10.46586/TCHES.V2022.I1.323-344},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KnichelSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KumarDBSJBB22,
  author       = {Satyam Kumar and
                  Vishnu Asutosh Dasu and
                  Anubhab Baksi and
                  Santanu Sarkar and
                  Dirmanto Jap and
                  Jakub Breier and
                  Shivam Bhasin},
  title        = {Side Channel Attack On Stream Ciphers: {A} Three-Step Approach To
                  State/Key Recovery},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {166--191},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.166-191},
  doi          = {10.46586/TCHES.V2022.I2.166-191},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/KumarDBSJBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LiZHLT22,
  author       = {Yanbin Li and
                  Jiajie Zhu and
                  Yuxin Huang and
                  Zhe Liu and
                  Ming Tang},
  title        = {Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study
                  of Saber},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {285--310},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.285-310},
  doi          = {10.46586/TCHES.V2022.I4.285-310},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LiZHLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MarshallPW22,
  author       = {Ben Marshall and
                  Dan Page and
                  James Webb},
  title        = {{MIRACLE:} MIcRo-ArChitectural Leakage Evaluation {A} study of micro-architectural
                  power leakage across many devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {175--220},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.175-220},
  doi          = {10.46586/TCHES.V2022.I1.175-220},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MarshallPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MullerKSM22,
  author       = {Nicolai M{\"{u}}ller and
                  David Knichel and
                  Pascal Sasdrich and
                  Amir Moradi},
  title        = {Transitional Leakage in Theory and Practice Unveiling Security Flaws
                  in Masked Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {266--288},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.266-288},
  doi          = {10.46586/TCHES.V2022.I2.266-288},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MullerKSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MullerM22,
  author       = {Nicolai M{\"{u}}ller and
                  Amir Moradi},
  title        = {{PROLEAD} {A} Probing-Based Hardware Leakage Detection Tool},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {311--348},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.311-348},
  doi          = {10.46586/TCHES.V2022.I4.311-348},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MullerM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NagpalGPM22,
  author       = {Rishub Nagpal and
                  Barbara Gigerl and
                  Robert Primas and
                  Stefan Mangard},
  title        = {Riding the Waves Towards Generic Single-Cycle Masking in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {693--717},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.693-717},
  doi          = {10.46586/TCHES.V2022.I4.693-717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NagpalGPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NasahlOVSTRM22,
  author       = {Pascal Nasahl and
                  Miguel Osorio and
                  Pirmin Vogel and
                  Michael Schaffner and
                  Timothy Trippel and
                  Dominic Rizzo and
                  Stefan Mangard},
  title        = {{SYNFI:} Pre-Silicon Fault Analysis of an Open-Source Secure Element},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {56--87},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.56-87},
  doi          = {10.46586/TCHES.V2022.I4.56-87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NasahlOVSTRM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NashimotoSUH22,
  author       = {Shoei Nashimoto and
                  Daisuke Suzuki and
                  Rei Ueno and
                  Naofumi Homma},
  title        = {Bypassing Isolated Execution on {RISC-V} using Side-Channel-Assisted
                  Fault-Injection and Its Countermeasure},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {28--68},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.28-68},
  doi          = {10.46586/TCHES.V2022.I1.28-68},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NashimotoSUH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PaivaT22,
  author       = {Thales Bandiera Paiva and
                  Routo Terada},
  title        = {Faster Constant-Time Decoder for {MDPC} Codes and Applications to
                  {BIKE} {KEM}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {110--134},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.110-134},
  doi          = {10.46586/TCHES.V2022.I4.110-134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PaivaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PeetermansV22,
  author       = {Adriaan Peetermans and
                  Ingrid Verbauwhede},
  title        = {An energy and area efficient, all digital entropy source compatible
                  with modern standards based on jitter pipelining},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {88--109},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.88-109},
  doi          = {10.46586/TCHES.V2022.I4.88-109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PeetermansV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PerinWP22,
  author       = {Guilherme Perin and
                  Lichao Wu and
                  Stjepan Picek},
  title        = {Exploring Feature Selection Scenarios for Deep Learning-based Side-channel
                  Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {828--861},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.828-861},
  doi          = {10.46586/TCHES.V2022.I4.828-861},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PerinWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PiedraVA22,
  author       = {Antonio de la Piedra and
                  Marloes Venema and
                  Greg Alp{\'{a}}r},
  title        = {{ABE} Squared: Accurately Benchmarking Efficiency of Attribute-Based
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {192--239},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i2.192-239},
  doi          = {10.46586/TCHES.V2022.I2.192-239},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PiedraVA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RadulescuPC22,
  author       = {Anca Radulescu and
                  Pantelimon George Popescu and
                  Marios O. Choudary},
  title        = {{GE} vs {GM:} Efficient side-channel security evaluations on full
                  cryptographic keys},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {886--905},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.886-905},
  doi          = {10.46586/TCHES.V2022.I4.886-905},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RadulescuPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RaviEBCR22,
  author       = {Prasanna Ravi and
                  Martianus Frederic Ezerman and
                  Shivam Bhasin and
                  Anupam Chattopadhyay and
                  Sujoy Sinha Roy},
  title        = {Will You Cross the Threshold for Me? Generic Side-Channel Assisted
                  Chosen-Ciphertext Attacks on NTRU-based KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {722--761},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.722-761},
  doi          = {10.46586/TCHES.V2022.I1.722-761},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RaviEBCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Ribes-GonzalezF22,
  author       = {Jordi Ribes{-}Gonz{\'{a}}lez and
                  Oriol Farr{\`{a}}s and
                  Carles Hern{\'{a}}ndez and
                  Vatistas Kostalabros and
                  Miquel Moret{\'{o}}},
  title        = {A Security Model for Randomization-based Protected Caches},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {1--25},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.1-25},
  doi          = {10.46586/TCHES.V2022.I3.1-25},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Ribes-GonzalezF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Richter-Brockmann22,
  author       = {Jan Richter{-}Brockmann and
                  Ming{-}Shing Chen and
                  Santosh Ghosh and
                  Tim G{\"{u}}neysu},
  title        = {Racing {BIKE:} Improved Polynomial Multiplication and Inversion in
                  Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {557--588},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.557-588},
  doi          = {10.46586/TCHES.V2022.I1.557-588},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Richter-Brockmann22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Richter-Brockmann22a,
  author       = {Jan Richter{-}Brockmann and
                  Jakob Feldtkeller and
                  Pascal Sasdrich and
                  Tim G{\"{u}}neysu},
  title        = {{VERICA} - Verification of Combined Attacks Automated formal verification
                  of security against simultaneous information leakage and tampering},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {255--284},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.255-284},
  doi          = {10.46586/TCHES.V2022.I4.255-284},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Richter-Brockmann22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RuchtiGP22,
  author       = {Jonas Ruchti and
                  Michael Gruber and
                  Michael Pehl},
  title        = {When the Decoder Has to Look Twice: Glitching a {PUF} Error Correction},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {26--70},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.26-70},
  doi          = {10.46586/TCHES.V2022.I3.26-70},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RuchtiGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SaitoIUH22,
  author       = {Kotaro Saito and
                  Akira Ito and
                  Rei Ueno and
                  Naofumi Homma},
  title        = {One Truth Prevails: {A} Deep-learning Based Single-Trace Power Analysis
                  on {RSA-CRT} with Windowed Exponentiation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {490--526},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.490-526},
  doi          = {10.46586/TCHES.V2022.I4.490-526},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SaitoIUH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SchneiderDPKC22,
  author       = {Moritz Schneider and
                  Aritra Dhar and
                  Ivan Puddu and
                  Kari Kostiainen and
                  Srdjan Capkun},
  title        = {Composite Enclaves: Towards Disaggregated Trusted Execution},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {630--656},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.630-656},
  doi          = {10.46586/TCHES.V2022.I1.630-656},
  timestamp    = {Fri, 13 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SchneiderDPKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SelmkePDSWMKS22,
  author       = {Bodo Selmke and
                  Maximilian Pollanka and
                  Andreas Duensing and
                  Emanuele Strieder and
                  Hayden Wen and
                  Michael Mittermair and
                  Reinhard Kienberger and
                  Georg Sigl},
  title        = {On the application of Two-Photon Absorption for Laser Fault Injection
                  attacks Pushing the physical boundaries for Laser-based Fault Injection},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {862--885},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.862-885},
  doi          = {10.46586/TCHES.V2022.I4.862-885},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SelmkePDSWMKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShenPSCV22,
  author       = {Yaobin Shen and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}tan Cassiers and
                  Corentin Verhamme},
  title        = {Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {135--162},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.135-162},
  doi          = {10.46586/TCHES.V2022.I4.135-162},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShenPSCV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShimLK22,
  author       = {Kyung{-}Ah Shim and
                  Sangyub Lee and
                  Namhun Koo},
  title        = {Efficient Implementations of Rainbow and {UOV} using {AVX2}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {245--269},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.245-269},
  doi          = {10.46586/TCHES.V2022.I1.245-269},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShimLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SoleimanyBHRBM22,
  author       = {Hadi Soleimany and
                  Nasour Bagheri and
                  Hosein Hadipour and
                  Prasanna Ravi and
                  Shivam Bhasin and
                  Sara Mansouri},
  title        = {Practical Multiple Persistent Faults Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {367--390},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.367-390},
  doi          = {10.46586/TCHES.V2022.I1.367-390},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SoleimanyBHRBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SreedharHT22,
  author       = {Kavya Sreedhar and
                  Mark Horowitz and
                  Christopher Torng},
  title        = {A Fast Large-Integer Extended {GCD} Algorithm and Hardware Design
                  for Verifiable Delay Functions and Modular Inversion},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {163--187},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.163-187},
  doi          = {10.46586/TCHES.V2022.I4.163-187},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SreedharHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SunETA22,
  author       = {Chao Sun and
                  Thomas Espitau and
                  Mehdi Tibouchi and
                  Masayuki Abe},
  title        = {Guessing Bits: Improved Lattice Attacks on {(EC)DSA} with Nonce Leakage},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {391--413},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.391-413},
  doi          = {10.46586/TCHES.V2022.I1.391-413},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SunETA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TrautmannBWWVT22,
  author       = {Jens Trautmann and
                  Arthur Beckers and
                  Lennert Wouters and
                  Stefan Wildermann and
                  Ingrid Verbauwhede and
                  J{\"{u}}rgen Teich},
  title        = {Semi-Automatic Locating of Cryptographic Operations in Side-Channel
                  Traces},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {345--366},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.345-366},
  doi          = {10.46586/TCHES.V2022.I1.345-366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TrautmannBWWVT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UdugamaJSIP22,
  author       = {Brian Udugama and
                  Darshana Jayasinghe and
                  Hassaan Saadat and
                  Aleksandar Ignjatovic and
                  Sri Parameswaran},
  title        = {{VITI:} {A} Tiny Self-Calibrating Sensor for Power-Variation Measurement
                  in FPGAs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {657--678},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.657-678},
  doi          = {10.46586/TCHES.V2022.I1.657-678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UdugamaJSIP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UdugamaJSIP22a,
  author       = {Brian Udugama and
                  Darshana Jayasinghe and
                  Hassaan Saadat and
                  Aleksandar Ignjatovic and
                  Sri Parameswaran},
  title        = {A Power to Pulse Width Modulation Sensor for Remote Power Analysis
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {589--613},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.589-613},
  doi          = {10.46586/TCHES.V2022.I4.589-613},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UdugamaJSIP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoXTITH22,
  author       = {Rei Ueno and
                  Keita Xagawa and
                  Yutaro Tanaka and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {296--322},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.296-322},
  doi          = {10.46586/TCHES.V2022.I1.296-322},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoXTITH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangGYJS22,
  author       = {Weijia Wang and
                  Chun Guo and
                  Yu Yu and
                  Fanjie Ji and
                  Yang Su},
  title        = {Side-Channel Masking with Common Shares},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {290--329},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.290-329},
  doi          = {10.46586/TCHES.V2022.I3.290-329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangGYJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WuCGZF22,
  author       = {Qianmei Wu and
                  Wei Cheng and
                  Sylvain Guilley and
                  Fan Zhang and
                  Wei Fu},
  title        = {On Efficient and Secure Code-based Masking: {A} Pragmatic Evaluation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {192--222},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.192-222},
  doi          = {10.46586/TCHES.V2022.I3.192-222},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WuCGZF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WuPP22,
  author       = {Lichao Wu and
                  Guilherme Perin and
                  Stjepan Picek},
  title        = {The Best of Two Worlds: Deep Learning-assisted Template Attack},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {3},
  pages        = {413--437},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i3.413-437},
  doi          = {10.46586/TCHES.V2022.I3.413-437},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WuPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/YamashitaCFBS22,
  author       = {Kohei Yamashita and
                  Benjamin Cyr and
                  Kevin Fu and
                  Wayne P. Burleson and
                  Takeshi Sugawara},
  title        = {Redshift: Manipulating Signal Propagation Delay via Continuous-Wave
                  Lasers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {4},
  pages        = {463--489},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i4.463-489},
  doi          = {10.46586/TCHES.V2022.I4.463-489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/YamashitaCFBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangFLRZ22,
  author       = {Fan Zhang and
                  Tianxiang Feng and
                  Zhiqi Li and
                  Kui Ren and
                  Xinjie Zhao},
  title        = {Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault
                  Analysis on Lightweight Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {2},
  pages        = {289--311},
  year         = {2022},
  url          = {https://tches.iacr.org/index.php/TCHES/article/view/9489},
  timestamp    = {Thu, 02 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangFLRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhaoZWYZLZYWL22,
  author       = {Cankun Zhao and
                  Neng Zhang and
                  Hanning Wang and
                  Bohan Yang and
                  Wenping Zhu and
                  Zhengdong Li and
                  Min Zhu and
                  Shouyi Yin and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {270--295},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.270-295},
  doi          = {10.46586/TCHES.V2022.I1.270-295},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhaoZWYZLZYWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AbidinSRBSB21,
  author       = {Aysajan Abidin and
                  Mohieddine El Soussi and
                  Jac Romme and
                  Pepijn Boer and
                  Dave Singel{\'{e}}e and
                  Christian Bachmann},
  title        = {Secure, Accurate, and Practical Narrow-Band Ranging System},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {106--135},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.106-135},
  doi          = {10.46586/TCHES.V2021.I2.106-135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AbidinSRBSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AdomnicaiP21,
  author       = {Alexandre Adomnicai and
                  Thomas Peyrin},
  title        = {Fixslicing AES-like Ciphers New bitsliced {AES} speed records on ARM-Cortex
                  {M} and {RISC-V}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {402--425},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.402-425},
  doi          = {10.46586/TCHES.V2021.I1.402-425},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AdomnicaiP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AghaieM21,
  author       = {Anita Aghaie and
                  Amir Moradi},
  title        = {Inconsistency of Simulation and Practice in Delay-based Strong PUFs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {520--551},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.520-551},
  doi          = {10.46586/TCHES.V2021.I3.520-551},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AghaieM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaB21,
  author       = {Alejandro Cabrera Aldaya and
                  Billy Bob Brumley},
  title        = {Online Template Attacks: Revisited},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {28--59},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.28-59},
  doi          = {10.46586/TCHES.V2021.I3.28-59},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AldayaB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlkimCCEHHLNSWY21,
  author       = {Erdem Alkim and
                  Dean Yun{-}Li Cheng and
                  Chi{-}Ming Marvin Chung and
                  H{\"{u}}lya Evkan and
                  Leo Wei{-}Lun Huang and
                  Vincent Hwang and
                  Ching{-}Lin Trista Li and
                  Ruben Niederhagen and
                  Cheng{-}Jhih Shih and
                  Julian W{\"{a}}lde and
                  Bo{-}Yin Yang},
  title        = {Polynomial Multiplication in {NTRU} Prime Comparison of Optimization
                  Strategies on Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {217--238},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.217-238},
  doi          = {10.46586/TCHES.V2021.I1.217-238},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AlkimCCEHHLNSWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AranhaBESTWZ21,
  author       = {Diego F. Aranha and
                  Sebastian Berndt and
                  Thomas Eisenbarth and
                  Okan Seker and
                  Akira Takahashi and
                  Luca Wilke and
                  Greg Zaverucha},
  title        = {Side-Channel Protections for Picnic Signatures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {239--282},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.239-282},
  doi          = {10.46586/TCHES.V2021.I4.239-282},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AranhaBESTWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BahadoriJMS21,
  author       = {Milad Bahadori and
                  Kimmo J{\"{a}}rvinen and
                  Tilen Marc and
                  Miha Stopar},
  title        = {Speed Reading in the Dark: Accelerating Functional Encryption for
                  Quadratic Functions with Reprogrammable Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {1--27},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.1-27},
  doi          = {10.46586/TCHES.V2021.I3.1-27},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BahadoriJMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BalliCB21,
  author       = {Fatih Balli and
                  Andrea Caforio and
                  Subhadeep Banik},
  title        = {The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {239--278},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.239-278},
  doi          = {10.46586/TCHES.V2021.I1.239-278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BalliCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanegasBCCLMSS21,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein and
                  Fabio Campos and
                  Tung Chou and
                  Tanja Lange and
                  Michael Meyer and
                  Benjamin Smith and
                  Jana Sot{\'{a}}kov{\'{a}}},
  title        = {{CTIDH:} faster constant-time {CSIDH}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {351--387},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.351-387},
  doi          = {10.46586/TCHES.V2021.I4.351-387},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BanegasBCCLMSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanegasBHL21,
  author       = {Gustavo Banegas and
                  Daniel J. Bernstein and
                  Iggy van Hoof and
                  Tanja Lange},
  title        = {Concrete quantum cryptanalysis of binary elliptic curves},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {451--472},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.451-472},
  doi          = {10.46586/TCHES.V2021.I1.451-472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BanegasBHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BartheGGOPP21,
  author       = {Gilles Barthe and
                  Marc Gourjon and
                  Benjamin Gr{\'{e}}goire and
                  Maximilian Orlt and
                  Clara Paglialonga and
                  Lars Porth},
  title        = {Masking in Fine-Grained Leakage Models: Construction, Implementation
                  and Verification},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {189--228},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.189-228},
  doi          = {10.46586/TCHES.V2021.I2.189-228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BartheGGOPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BeirendonckDV21,
  author       = {Michiel Van Beirendonck and
                  Jan{-}Pieter D'Anvers and
                  Ingrid Verbauwhede},
  title        = {Analysis and Comparison of Table-based Arithmetic to Boolean Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {275--297},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.275-297},
  doi          = {10.46586/TCHES.V2021.I3.275-297},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BeirendonckDV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelliziaHKLMSY21,
  author       = {Davide Bellizia and
                  Cl{\'{e}}ment Hoffmann and
                  Dina Kamel and
                  Hanlin Liu and
                  Pierrick M{\'{e}}aux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yu Yu},
  title        = {Learning Parity with Physical Noise: Imperfections, Reductions and
                  {FPGA} Prototype},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {390--417},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.390-417},
  doi          = {10.46586/TCHES.V2021.I3.390-417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelliziaHKLMSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BhasinDHPB21,
  author       = {Shivam Bhasin and
                  Jan{-}Pieter D'Anvers and
                  Daniel Heinz and
                  Thomas P{\"{o}}ppelmann and
                  Michiel Van Beirendonck},
  title        = {Attacking and Defending Masked Polynomial Comparison for Lattice-Based
                  Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {334--359},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.334-359},
  doi          = {10.46586/TCHES.V2021.I3.334-359},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BhasinDHPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BosGRSV21,
  author       = {Joppe W. Bos and
                  Marc Gourjon and
                  Joost Renes and
                  Tobias Schneider and
                  Christine van Vredendaal},
  title        = {Masking Kyber: First- and Higher-Order Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {173--214},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.173-214},
  doi          = {10.46586/TCHES.V2021.I4.173-214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BosGRSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BosHRV21,
  author       = {Joppe W. Bos and
                  Andreas H{\"{u}}lsing and
                  Joost Renes and
                  Christine van Vredendaal},
  title        = {Rapidly Verifiable {XMSS} Signatures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {137--168},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.137-168},
  doi          = {10.46586/TCHES.V2021.I1.137-168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BosHRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BrancoFGMMS21,
  author       = {Pedro Branco and
                  Lu{\'{\i}}s Fiolhais and
                  Manuel Goul{\~{a}}o and
                  Paulo Martins and
                  Paulo Mateus and
                  Leonel Sousa},
  title        = {ROTed: Random Oblivious Transfer for embedded devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {215--238},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.215-238},
  doi          = {10.46586/TCHES.V2021.I4.215-238},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BrancoFGMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainMPS21,
  author       = {Olivier Bronchain and
                  Charles Momin and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Improved Leakage-Resistant Authenticated Encryption based on Hardware
                  {AES} Coprocessors},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {641--676},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.641-676},
  doi          = {10.46586/TCHES.V2021.I3.641-676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainMPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainS21,
  author       = {Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Breaking Masked Implementations with Many Shares on 32-bit Software
                  Platforms or When the Security Order Does Not Matter},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {202--234},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.202-234},
  doi          = {10.46586/TCHES.V2021.I3.202-234},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CaoZLG21,
  author       = {Pei Cao and
                  Chi Zhang and
                  Xiangjun Lu and
                  Dawu Gu},
  title        = {Cross-Device Profiled Side-Channel Attack with Unsupervised Domain
                  Adaptation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {27--56},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.27-56},
  doi          = {10.46586/TCHES.V2021.I4.27-56},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CaoZLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarletGM21,
  author       = {Claude Carlet and
                  Sylvain Guilley and
                  Sihem Mesnager},
  title        = {Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box
                  Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {57--87},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.57-87},
  doi          = {10.46586/TCHES.V2021.I4.57-87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CarletGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersS21,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provably Secure Hardware Masking in the Transition- and Glitch-Robust
                  Probing Model: Better Safe than Sorry},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {136--158},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.136-158},
  doi          = {10.46586/TCHES.V2021.I2.136-158},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChakrabortyBAPM21,
  author       = {Anirban Chakraborty and
                  Sarani Bhattacharya and
                  Manaar Alam and
                  Sikhar Patranabis and
                  Debdeep Mukhopadhyay},
  title        = {{RASSLE:} Return Address Stack based Side-channel LEakage},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {275--303},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.275-303},
  doi          = {10.46586/TCHES.V2021.I2.275-303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChakrabortyBAPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenC21,
  author       = {Ming{-}Shing Chen and
                  Tung Chou},
  title        = {Classic McEliece on the {ARM} Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {125--148},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.125-148},
  doi          = {10.46586/TCHES.V2021.I3.125-148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChenCK21,
  author       = {Ming{-}Shing Chen and
                  Tung Chou and
                  Markus Krausz},
  title        = {Optimizing {BIKE} for the Intel Haswell and {ARM} Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {97--124},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.97-124},
  doi          = {10.46586/TCHES.V2021.I3.97-124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChenCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengFGRR21,
  author       = {Hao Cheng and
                  Georgios Fotiadis and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne},
  title        = {Batching {CSIDH} Group Actions using {AVX-512}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {618--649},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.618-649},
  doi          = {10.46586/TCHES.V2021.I4.618-649},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengFGRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChengGCDM21,
  author       = {Wei Cheng and
                  Sylvain Guilley and
                  Claude Carlet and
                  Jean{-}Luc Danger and
                  Sihem Mesnager},
  title        = {Information Leakages in Code-based Masking: {A} Unified Quantification
                  Approach},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {465--495},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.465-495},
  doi          = {10.46586/TCHES.V2021.I3.465-495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengGCDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChouKY21,
  author       = {Tung Chou and
                  Matthias J. Kannwischer and
                  Bo{-}Yin Yang},
  title        = {Rainbow on Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {650--675},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.650-675},
  doi          = {10.46586/TCHES.V2021.I4.650-675},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChouKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChungHKSSY21,
  author       = {Chi{-}Ming Marvin Chung and
                  Vincent Hwang and
                  Matthias J. Kannwischer and
                  Gregor Seiler and
                  Cheng{-}Jhih Shih and
                  Bo{-}Yin Yang},
  title        = {{NTT} Multiplication for NTT-unfriendly Rings New Speed Records for
                  Saber and {NTRU} on Cortex-M4 and {AVX2}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {159--188},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.159-188},
  doi          = {10.46586/TCHES.V2021.I2.159-188},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChungHKSSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CostesS21,
  author       = {Nicolas Costes and
                  Martijn Stam},
  title        = {Redundant Code-based Masking Revisited},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {426--450},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.426-450},
  doi          = {10.46586/TCHES.V2021.I1.426-450},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CostesS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DuvalMMS21,
  author       = {S{\'{e}}bastien Duval and
                  Pierrick M{\'{e}}aux and
                  Charles Momin and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding
                  Towards Secure and Efficient Fresh Re-Keying},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {373--401},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.373-401},
  doi          = {10.46586/TCHES.V2021.I1.373-401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DuvalMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaoGMPPR21,
  author       = {Si Gao and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Ben Marshall and
                  Dan Page and
                  Thinh Hung Pham and
                  Francesco Regazzoni},
  title        = {An Instruction Set Extension to Support Software-Based Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {283--325},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.283-325},
  doi          = {10.46586/TCHES.V2021.I4.283-325},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GaoGMPPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GoudarziPRV21,
  author       = {Dahmun Goudarzi and
                  Thomas Prest and
                  Matthieu Rivain and
                  Damien Vergnaud},
  title        = {Probing Security through Input-Output Separation and Revisited Quasilinear
                  Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {599--640},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.599-640},
  doi          = {10.46586/TCHES.V2021.I3.599-640},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GoudarziPRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GreconiciKS21,
  author       = {Denisa O. C. Greconici and
                  Matthias J. Kannwischer and
                  Amber Sprenkels},
  title        = {Compact Dilithium Implementations on Cortex-M3 and Cortex-M4},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {1--24},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.1-24},
  doi          = {10.46586/TCHES.V2021.I1.1-24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GreconiciKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuimaraesBA21,
  author       = {Antonio Guimar{\~{a}}es and
                  Edson Borin and
                  Diego F. Aranha},
  title        = {Revisiting the functional bootstrap in {TFHE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {229--253},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.229-253},
  doi          = {10.46586/TCHES.V2021.I2.229-253},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuimaraesBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HamburgHPSSSSV21,
  author       = {Mike Hamburg and
                  Julius Hermelink and
                  Robert Primas and
                  Simona Samardjiska and
                  Thomas Schamberger and
                  Silvan Streit and
                  Emanuele Strieder and
                  Christine van Vredendaal},
  title        = {Chosen Ciphertext k-Trace Attacks on Masked {CCA2} Secure Kyber},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {88--113},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.88-113},
  doi          = {10.46586/TCHES.V2021.I4.88-113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HamburgHPSSSSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HerrewegenOGT21,
  author       = {Jan Van den Herrewegen and
                  David F. Oswald and
                  Flavio D. Garcia and
                  Qais Temeiza},
  title        = {Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection
                  and Binary Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {56--81},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.56-81},
  doi          = {10.46586/TCHES.V2021.I1.56-81},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HerrewegenOGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HettwerLFGG21,
  author       = {Benjamin Hettwer and
                  Sebastien Leger and
                  Daniel Fennes and
                  Stefan Gehrer and
                  Tim G{\"{u}}neysu},
  title        = {Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {279--304},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.279-304},
  doi          = {10.46586/TCHES.V2021.I1.279-304},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HettwerLFGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoffmannP21,
  author       = {Max Hoffmann and
                  Christof Paar},
  title        = {Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects
                  of Hardware Camouflaging},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {82--108},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.82-108},
  doi          = {10.46586/TCHES.V2021.I1.82-108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HoffmannP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JinLCKH21,
  author       = {Sunghyun Jin and
                  Sangyub Lee and
                  Sung Min Cho and
                  HeeSeok Kim and
                  Seokhie Hong},
  title        = {Novel Key Recovery Attack on Secure {ECDSA} Implementation by Exploiting
                  Collisions between Unknown Entries},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {1--26},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.1-26},
  doi          = {10.46586/TCHES.V2021.I4.1-26},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JinLCKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JungKACL21,
  author       = {Wonkyung Jung and
                  Sangpyo Kim and
                  Jung Ho Ahn and
                  Jung Hee Cheon and
                  Younho Lee},
  title        = {Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through
                  Memory-centric Optimization with GPUs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {114--148},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.114-148},
  doi          = {10.46586/TCHES.V2021.I4.114-148},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/JungKACL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KoikeI21,
  author       = {Yuji Koike and
                  Takanori Isobe},
  title        = {Yoroi: Updatable Whitebox Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {587--617},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.587-617},
  doi          = {10.46586/TCHES.V2021.I4.587-617},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KoikeI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LaPPK21,
  author       = {Tuan La and
                  Khoa Dang Pham and
                  Joseph Powell and
                  Dirk Koch},
  title        = {Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and
                  Defense},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {441--464},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.441-464},
  doi          = {10.46586/TCHES.V2021.I3.441-464},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LaPPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LeanderMMR21,
  author       = {Gregor Leander and
                  Thorben Moos and
                  Amir Moradi and
                  Shahram Rasoolzadeh},
  title        = {The {SPEEDY} Family of Block Ciphers Engineering an Ultra Low-Latency
                  Cipher from Gate Level for Secure Processor Architectures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {510--545},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.510-545},
  doi          = {10.46586/TCHES.V2021.I4.510-545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LeanderMMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LisovetsKMM21,
  author       = {Oleksiy Lisovets and
                  David Knichel and
                  Thorben Moos and
                  Amir Moradi},
  title        = {Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User
                  Authentication through {SCA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {496--519},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.496-519},
  doi          = {10.46586/TCHES.V2021.I3.496-519},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LisovetsKMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LuZCGL21,
  author       = {Xiangjun Lu and
                  Chi Zhang and
                  Pei Cao and
                  Dawu Gu and
                  Haining Lu},
  title        = {Pay Attention to Raw Traces: {A} Deep Learning Architecture for End-to-End
                  Profiling Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {235--274},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.235-274},
  doi          = {10.46586/TCHES.V2021.I3.235-274},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/LuZCGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MarshallNPSW21,
  author       = {Ben Marshall and
                  G. Richard Newell and
                  Dan Page and
                  Markku{-}Juhani O. Saarinen and
                  Claire Wolf},
  title        = {The design of scalar {AES} Instruction Set Extensions for {RISC-V}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {109--136},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.109-136},
  doi          = {10.46586/TCHES.V2021.I1.109-136},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MarshallNPSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeraKKV21,
  author       = {Jose Maria Bermudo Mera and
                  Angshuman Karmakar and
                  Suparna Kundu and
                  Ingrid Verbauwhede},
  title        = {Scabbard: a suite of efficient learning with rounding key-encapsulation
                  mechanisms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {474--509},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.474-509},
  doi          = {10.46586/TCHES.V2021.I4.474-509},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeraKKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MingLZCQ21,
  author       = {Jingdian Ming and
                  Huizhong Li and
                  Yongbin Zhou and
                  Wei Cheng and
                  Zehua Qiao},
  title        = {Revealing the Weakness of Addition Chain Based Masked SBox Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {326--350},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.326-350},
  doi          = {10.46586/TCHES.V2021.I4.326-350},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MingLZCQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoosM21,
  author       = {Thorben Moos and
                  Amir Moradi},
  title        = {Countermeasures against Static Power Attacks - Comparing Exhaustive
                  Logic Balancing and Other Protection Schemes in 28 nm {CMOS} -},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {780--805},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.780-805},
  doi          = {10.46586/TCHES.V2021.I3.780-805},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MoosM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoosWM21,
  author       = {Thorben Moos and
                  Felix Wegener and
                  Amir Moradi},
  title        = {{DL-LA:} Deep Learning Leakage Assessment {A} modern roadmap for {SCA}
                  evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {552--598},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.552-598},
  doi          = {10.46586/TCHES.V2021.I3.552-598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MoosWM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NaitoSS21,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara},
  title        = {{AES-LBBB:} {AES} Mode for Lightweight and BBB-Secure Authenticated
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {298--333},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.298-333},
  doi          = {10.46586/TCHES.V2021.I3.298-333},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NaitoSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NakaiSF21,
  author       = {Tsunato Nakai and
                  Daisuke Suzuki and
                  Takeshi Fujino},
  title        = {Timing Black-Box Attacks: Crafting Adversarial Examples through Timing
                  Leaks against DNNs on Embedded Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {149--175},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.149-175},
  doi          = {10.46586/TCHES.V2021.I3.149-175},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NakaiSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NatarajanD21,
  author       = {Deepika Natarajan and
                  Wei Dai},
  title        = {SEAL-Embedded: {A} Homomorphic Encryption Library for the Internet
                  of Things},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {756--779},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.756-779},
  doi          = {10.46586/TCHES.V2021.I3.756-779},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NatarajanD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NgoDGJ21,
  author       = {Kalle Ngo and
                  Elena Dubrova and
                  Qian Guo and
                  Thomas Johansson},
  title        = {A Side-Channel Attack on a Masked {IND-CCA} Secure Saber {KEM} Implementation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {676--707},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.676-707},
  doi          = {10.46586/TCHES.V2021.I4.676-707},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/NgoDGJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PerinCBP21,
  author       = {Guilherme Perin and
                  Lukasz Chmielewski and
                  Lejla Batina and
                  Stjepan Picek},
  title        = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {343--372},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.343-372},
  doi          = {10.46586/TCHES.V2021.I1.343-372},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PerinCBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PesslP21,
  author       = {Peter Pessl and
                  Lukas Prokop},
  title        = {Fault Attacks on CCA-secure Lattice KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {37--60},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.37-60},
  doi          = {10.46586/TCHES.V2021.I2.37-60},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PesslP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Richter-Brockmann21,
  author       = {Jan Richter{-}Brockmann and
                  Aein Rezaei Shahmirzadi and
                  Pascal Sasdrich and
                  Amir Moradi and
                  Tim G{\"{u}}neysu},
  title        = {{FIVER} - Robust Verification of Countermeasures against Fault Injections},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {447--473},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.447-473},
  doi          = {10.46586/TCHES.V2021.I4.447-473},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Richter-Brockmann21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RijsdijkWPP21,
  author       = {Jorai Rijsdijk and
                  Lichao Wu and
                  Guilherme Perin and
                  Stjepan Picek},
  title        = {Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based
                  Side-channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {677--707},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.677-707},
  doi          = {10.46586/TCHES.V2021.I3.677-707},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RijsdijkWPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SchinkWUH21,
  author       = {Marc Schink and
                  Alexander Wagner and
                  Florian Unterstein and
                  Johann Heyszl},
  title        = {Security and Trust in Open Source Security Tokens},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {176--201},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.176-201},
  doi          = {10.46586/TCHES.V2021.I3.176-201},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SchinkWUH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SekerEL21,
  author       = {Okan Seker and
                  Thomas Eisenbarth and
                  Maciej Liskiewicz},
  title        = {A White-Box Masking Scheme Resisting Computational and Algebraic Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {61--105},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.61-105},
  doi          = {10.46586/TCHES.V2021.I2.61-105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SekerEL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SenguptaLS21,
  author       = {Abhrajit Sengupta and
                  Nimisha Limaye and
                  Ozgur Sinanoglu},
  title        = {Breaking CAS-Lock and Its Variants by Exploiting Structural Traces},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {418--440},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.418-440},
  doi          = {10.46586/TCHES.V2021.I3.418-440},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SenguptaLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShahmirzadiBM21,
  author       = {Aein Rezaei Shahmirzadi and
                  Dusan Bozilov and
                  Amir Moradi},
  title        = {New First-Order Secure {AES} Performance Records},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {304--327},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.304-327},
  doi          = {10.46586/TCHES.V2021.I2.304-327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShahmirzadiBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShahmirzadiM21,
  author       = {Aein Rezaei Shahmirzadi and
                  Amir Moradi},
  title        = {Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {305--342},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.305-342},
  doi          = {10.46586/TCHES.V2021.I1.305-342},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShahmirzadiM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShahmirzadiM21a,
  author       = {Aein Rezaei Shahmirzadi and
                  Amir Moradi},
  title        = {Second-Order {SCA} Security with almost no Fresh Randomness},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {708--755},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.708-755},
  doi          = {10.46586/TCHES.V2021.I3.708-755},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ShahmirzadiM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SimJB21,
  author       = {Siang Meng Sim and
                  Dirmanto Jap and
                  Shivam Bhasin},
  title        = {{DAPA:} Differential Analysis aided Power Attack on (Non-) Linear
                  Feedback Shift Registers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {169--191},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.169-191},
  doi          = {10.46586/TCHES.V2021.I1.169-191},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SimJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SpruytMC21,
  author       = {Albert Spruyt and
                  Alyssa Milburn and
                  Lukasz Chmielewski},
  title        = {Fault Injection as an Oscilloscope: Fault Correlation Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {192--216},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.192-216},
  doi          = {10.46586/TCHES.V2021.I1.192-216},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SpruytMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/StolzASKNGFPGT21,
  author       = {Florian Stolz and
                  Nils Albartus and
                  Julian Speith and
                  Simon Klix and
                  Clemens Nasenberg and
                  Aiden Gula and
                  Marc Fyrbiak and
                  Christof Paar and
                  Tim G{\"{u}}neysu and
                  Russell Tessier},
  title        = {LifeLine for {FPGA} Protection: Obfuscated Cryptography for Real-World
                  Security},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {412--446},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.412-446},
  doi          = {10.46586/TCHES.V2021.I4.412-446},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/StolzASKNGFPGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/StriederFP21,
  author       = {Emanuele Strieder and
                  Christoph Frisch and
                  Michael Pehl},
  title        = {Machine Learning of Physical Unclonable Functions using Helper Data
                  Revealing a Pitfall in the Fuzzy Commitment Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {1--36},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.1-36},
  doi          = {10.46586/TCHES.V2021.I2.1-36},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/StriederFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ThomasHVCOG21,
  author       = {Sam L. Thomas and
                  Jan Van den Herrewegen and
                  Georgios Vasilakis and
                  Zitai Chen and
                  Mihai Ordean and
                  Flavio D. Garcia},
  title        = {Cutting Through the Complexity of Reverse Engineering Embedded Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {360--389},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.360-389},
  doi          = {10.46586/TCHES.V2021.I3.360-389},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ThomasHVCOG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TobischAB21,
  author       = {Johannes Tobisch and
                  Anita Aghaie and
                  Georg T. Becker},
  title        = {Combining Optimization Objectives: New Modeling Attacks on Strong
                  PUFs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {357--389},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.357-389},
  doi          = {10.46586/TCHES.V2021.I2.357-389},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TobischAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TrimoskaID21,
  author       = {Monika Trimoska and
                  Sorina Ionica and
                  Gilles Dequen},
  title        = {Time-Memory Analysis of Parallel Collision Search Algorithms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {254--274},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.254-274},
  doi          = {10.46586/TCHES.V2021.I2.254-274},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TrimoskaID21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ValivetiV21,
  author       = {Annapurna Valiveti and
                  Srinivas Vivek},
  title        = {Higher-Order Lookup Table Masking in Essentially Constant Memory},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {546--586},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.546-586},
  doi          = {10.46586/TCHES.V2021.I4.546-586},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ValivetiV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersGP21,
  author       = {Lennert Wouters and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {My other car is your car: compromising the Tesla Model {X} keyless
                  entry system},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {149--172},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.149-172},
  doi          = {10.46586/TCHES.V2021.I4.149-172},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersGP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/XingL21,
  author       = {Yufei Xing and
                  Shuguo Li},
  title        = {A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism
                  {CRYSTALS-KYBER} on {FPGA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {2},
  pages        = {328--356},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i2.328-356},
  doi          = {10.46586/TCHES.V2021.I2.328-356},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/XingL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZaidBDHV21,
  author       = {Gabriel Zaid and
                  Lilian Bossuet and
                  Fran{\c{c}}ois Dassance and
                  Amaury Habrard and
                  Alexandre Venelli},
  title        = {Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel
                  Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {1},
  pages        = {25--55},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i1.25-55},
  doi          = {10.46586/TCHES.V2021.I1.25-55},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZaidBDHV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZaidBHV21,
  author       = {Gabriel Zaid and
                  Lilian Bossuet and
                  Amaury Habrard and
                  Alexandre Venelli},
  title        = {Efficiency through Diversity in Ensemble Models applied to Side-Channel
                  Attacks - {A} Case Study on Public-Key Algorithms -},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {3},
  pages        = {60--96},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i3.60-96},
  doi          = {10.46586/TCHES.V2021.I3.60-96},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZaidBHV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZareiSSSM21,
  author       = {Sara Zarei and
                  Aein Rezaei Shahmirzadi and
                  Hadi Soleimany and
                  Raziyeh Salarifard and
                  Amir Moradi},
  title        = {Low-Latency Keccak at any Arbitrary Order},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2021},
  number       = {4},
  pages        = {388--411},
  year         = {2021},
  url          = {https://doi.org/10.46586/tches.v2021.i4.388-411},
  doi          = {10.46586/TCHES.V2021.I4.388-411},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZareiSSSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AdomnicaiNP20,
  author       = {Alexandre Adomnicai and
                  Zakaria Najm and
                  Thomas Peyrin},
  title        = {Fixslicing: {A} New {GIFT} Representation Fast Constant-Time Implementations
                  of {GIFT} and {GIFT-COFB} on {ARM} Cortex-M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {402--427},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.402-427},
  doi          = {10.13154/TCHES.V2020.I3.402-427},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AdomnicaiNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbartusHTAP20,
  author       = {Nils Albartus and
                  Max Hoffmann and
                  Sebastian Temme and
                  Leonid Azriel and
                  Christof Paar},
  title        = {{DANA} Universal Dataflow Analysis for Gate-Level Netlist Reverse
                  Engineering},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {309--336},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.309-336},
  doi          = {10.13154/TCHES.V2020.I4.309-336},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlbartusHTAP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaB20,
  author       = {Alejandro Cabrera Aldaya and
                  Billy Bob Brumley},
  title        = {When one vulnerable primitive turns viral: Novel single-trace attacks
                  on {ECDSA} and {RSA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {196--221},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.196-221},
  doi          = {10.13154/TCHES.V2020.I2.196-221},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AldayaB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaGB20,
  author       = {Alejandro Cabrera Aldaya and
                  Cesar Pereida Garc{\'{\i}}a and
                  Billy Bob Brumley},
  title        = {From {A} to {Z:} Projective coordinates leakage in the wild},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {428--453},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.428-453},
  doi          = {10.13154/TCHES.V2020.I3.428-453},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AldayaGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlkimBCG20,
  author       = {Erdem Alkim and
                  Yusuf Alper Bilgin and
                  Murat Cenk and
                  Fran{\c{c}}ois G{\'{e}}rard},
  title        = {Cortex-M4 optimizations for \{R, M\} {LWE} schemes},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {336--357},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.336-357},
  doi          = {10.13154/TCHES.V2020.I3.336-357},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlkimBCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlkimELNP20,
  author       = {Erdem Alkim and
                  H{\"{u}}lya Evkan and
                  Norman Lahr and
                  Ruben Niederhagen and
                  Richard Petri},
  title        = {{ISA} Extensions for Finite Field Arithmetic Accelerating Kyber and
                  NewHope on {RISC-V}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {219--242},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.219-242},
  doi          = {10.13154/TCHES.V2020.I3.219-242},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AlkimELNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BachePOSG20,
  author       = {Florian Bache and
                  Clara Paglialonga and
                  Tobias Oder and
                  Tobias Schneider and
                  Tim G{\"{u}}neysu},
  title        = {High-Speed Masking for Polynomial Comparison in Lattice-based KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {483--507},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.483-507},
  doi          = {10.13154/TCHES.V2020.I3.483-507},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BachePOSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiGPPS20,
  author       = {Francesco Berti and
                  Chun Guo and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {256--320},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.256-320},
  doi          = {10.13154/TCHES.V2020.I1.256-320},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BhasinBHJPS20,
  author       = {Shivam Bhasin and
                  Jakub Breier and
                  Xiaolu Hou and
                  Dirmanto Jap and
                  Romain Poussier and
                  Siang Meng Sim},
  title        = {{SITM:} See-In-The-Middle Side-Channel Assisted Middle Round Differential
                  Cryptanalysis on {SPN} Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {95--122},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.95-122},
  doi          = {10.13154/TCHES.V2020.I1.95-122},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BhasinBHJPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BockABM20,
  author       = {Estuardo Alpirez Bock and
                  Alessandro Amadori and
                  Chris Brzuska and
                  Wil Michiels},
  title        = {On the Security Goals of White-Box Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {327--357},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.327-357},
  doi          = {10.13154/TCHES.V2020.I2.327-357},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BockABM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BragaFS20,
  author       = {Daniel De Almeida Braga and
                  Pierre{-}Alain Fouque and
                  Mohamed Sabt},
  title        = {The Long and Winding Path to Secure Implementation of GlobalPlatform
                  {SCP10}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {196--218},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.196-218},
  doi          = {10.13154/TCHES.V2020.I3.196-218},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BragaFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainS20,
  author       = {Olivier Bronchain and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-Channel Countermeasures' Dissection and the Limits of Closed
                  Source Security Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {1--25},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.1-25},
  doi          = {10.13154/TCHES.V2020.I2.1-25},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CamuratiFS20,
  author       = {Giovanni Camurati and
                  Aur{\'{e}}lien Francillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Understanding Screaming Channels: From a Detailed Analysis to Improved
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {358--401},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.358-401},
  doi          = {10.13154/TCHES.V2020.I3.358-401},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CamuratiFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaemenDEGMP20,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {508--543},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.508-543},
  doi          = {10.13154/TCHES.V2020.I3.508-543},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FrittoliBMCRFSB20,
  author       = {Luca Frittoli and
                  Matteo Bocchi and
                  Silvia Mella and
                  Diego Carrera and
                  Beatrice Rossi and
                  Pasqualina Fragneto and
                  Ruggero Susella and
                  Giacomo Boracchi},
  title        = {Strengthening Sequential Side-Channel Attacks Through Change Detection},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {1--21},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.1-21},
  doi          = {10.13154/TCHES.V2020.I3.1-21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FrittoliBMCRFSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FritzmannSS20,
  author       = {Tim Fritzmann and
                  Georg Sigl and
                  Johanna Sep{\'{u}}lveda},
  title        = {{RISQ-V:} Tightly Coupled {RISC-V} Accelerators for Post-Quantum Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {239--280},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.239-280},
  doi          = {10.13154/TCHES.V2020.I4.239-280},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/FritzmannSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaoMPO20,
  author       = {Si Gao and
                  Ben Marshall and
                  Dan Page and
                  Elisabeth Oswald},
  title        = {Share-slicing: Friend or Foe?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {152--174},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.152-174},
  doi          = {10.13154/TCHES.V2020.I1.152-174},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GaoMPO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaoMPP20,
  author       = {Si Gao and
                  Ben Marshall and
                  Dan Page and
                  Thinh Hung Pham},
  title        = {{FENL:} an {ISE} to mitigate analogue micro-architectural leakage},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {73--98},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.73-98},
  doi          = {10.13154/TCHES.V2020.I2.73-98},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GaoMPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GenkinPSYZ20,
  author       = {Daniel Genkin and
                  Romain Poussier and
                  Rui Qi Sim and
                  Yuval Yarom and
                  Yuanjing Zhao},
  title        = {Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {231--255},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.231-255},
  doi          = {10.13154/TCHES.V2020.I1.231-255},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GenkinPSYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GoubinRW20,
  author       = {Louis Goubin and
                  Matthieu Rivain and
                  Junwei Wang},
  title        = {Defeating State-of-the-Art White-Box Countermeasures with Advanced
                  Gray-Box Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {454--482},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.454-482},
  doi          = {10.13154/TCHES.V2020.I3.454-482},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GoubinRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoGSB20,
  author       = {Qian Guo and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Olivier Bronchain},
  title        = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory
                  Viewpoint},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {209--238},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.209-238},
  doi          = {10.13154/TCHES.V2020.I4.209-238},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/GuoGSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Hamburg20,
  author       = {Mike Hamburg},
  title        = {Faster Montgomery and double-add ladders for short Weierstrass curves},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {189--208},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.189-208},
  doi          = {10.13154/TCHES.V2020.I4.189-208},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Hamburg20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HeyszlMUSWGFDKK20,
  author       = {Johann Heyszl and
                  Katja Miller and
                  Florian Unterstein and
                  Marc Schink and
                  Alexander Wagner and
                  Horst A. Gieser and
                  Sven Freud and
                  Tobias Damm and
                  Dominik Klein and
                  Dennis K{\"{u}}gler},
  title        = {Investigating Profiled Side-Channel Attacks Against the {DES} Key
                  Schedule},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {22--72},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.22-72},
  doi          = {10.13154/TCHES.V2020.I3.22-72},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HeyszlMUSWGFDKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoangHO20,
  author       = {Anh{-}Tuan Hoang and
                  Neil Hanley and
                  M{\'{a}}ire O'Neill},
  title        = {Plaintext: {A} Missing Feature for Enhancing the Power of Deep Learning
                  in Side-Channel Analysis? Breaking multiple layers of side-channel
                  countermeasures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {49--85},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.49-85},
  doi          = {10.13154/TCHES.V2020.I4.49-85},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HoangHO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangCY20,
  author       = {Wei{-}Lun Huang and
                  Jiun{-}Peng Chen and
                  Bo{-}Yin Yang},
  title        = {Power Analysis on {NTRU} Prime},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {123--151},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.123-151},
  doi          = {10.13154/TCHES.V2020.I1.123-151},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HuangCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuoMWHZZL20,
  author       = {Tianlin Huo and
                  Xiaoni Meng and
                  Wenhao Wang and
                  Chunliang Hao and
                  Pei Zhao and
                  Jian Zhai and
                  Mingshu Li},
  title        = {Bluethunder: {A} 2-level Directional Predictor Based Side-Channel
                  Attack against {SGX}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {321--347},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.321-347},
  doi          = {10.13154/TCHES.V2020.I1.321-347},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HuoMWHZZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JancarSSS20,
  author       = {Jan Jancar and
                  Vladimir Sedlacek and
                  Petr Svenda and
                  Marek S{\'{y}}s},
  title        = {Minerva: The curse of {ECDSA} nonces Systematic analysis of lattice
                  attacks on noisy leakage of bit-length of {ECDSA} nonces},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {281--308},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.281-308},
  doi          = {10.13154/TCHES.V2020.I4.281-308},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JancarSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KRRHB20,
  author       = {Keerthi K. and
                  Indrani Roy and
                  Chester Rebeiro and
                  Aritra Hazra and
                  Swarup Bhunia},
  title        = {{FEDS:} Comprehensive Fault Attack Exploitability Detection for Software
                  Implementations of Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {272--299},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.272-299},
  doi          = {10.13154/TCHES.V2020.I2.272-299},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KRRHB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KalesZ20,
  author       = {Daniel Kales and
                  Greg Zaverucha},
  title        = {Improving the Performance of the Picnic Signature Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {154--188},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.154-188},
  doi          = {10.13154/TCHES.V2020.I4.154-188},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KalesZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KannwischerPP20,
  author       = {Matthias J. Kannwischer and
                  Peter Pessl and
                  Robert Primas},
  title        = {Single-Trace Attacks on Keccak},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {243--268},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.243-268},
  doi          = {10.13154/TCHES.V2020.I3.243-268},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KannwischerPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KrautterGT20,
  author       = {Jonas Krautter and
                  Dennis Gnad and
                  Mehdi Baradaran Tahoori},
  title        = {CPAmap: On the Complexity of Secure {FPGA} Virtualization, Multi-Tenancy,
                  and Physical Design},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {121--146},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.121-146},
  doi          = {10.13154/TCHES.V2020.I3.121-146},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KrautterGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MassolinoLRB20,
  author       = {Pedro Maat C. Massolino and
                  Patrick Longa and
                  Joost Renes and
                  Lejla Batina},
  title        = {A Compact and Scalable Hardware/Software Co-design of {SIKE}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {245--271},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.245-271},
  doi          = {10.13154/TCHES.V2020.I2.245-271},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MassolinoLRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureDP20,
  author       = {Lo{\"{\i}}c Masure and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  title        = {A Comprehensive Study of Deep Learning for Side-Channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {348--375},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.348-375},
  doi          = {10.13154/TCHES.V2020.I1.348-375},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MasureDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeraKV20,
  author       = {Jose Maria Bermudo Mera and
                  Angshuman Karmakar and
                  Ingrid Verbauwhede},
  title        = {Time-memory trade-off in Toom-Cook multiplication: an application
                  to module-lattice based cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {222--244},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.222-244},
  doi          = {10.13154/TCHES.V2020.I2.222-244},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeraKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Meyer20,
  author       = {Lauren De Meyer},
  title        = {Recovering the CTR{\_}DRBG state in 256 traces},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {37--65},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.37-65},
  doi          = {10.13154/TCHES.V2020.I1.37-65},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Meyer20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MolteniZ20,
  author       = {Maria Chiara Molteni and
                  Vittorio Zaccaria},
  title        = {On the spectral features of robust probing security},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {24--48},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.24-48},
  doi          = {10.13154/TCHES.V2020.I4.24-48},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MolteniZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Moos20,
  author       = {Thorben Moos},
  title        = {Unrolled Cryptography on Silicon {A} Physical Security Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {416--442},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.416-442},
  doi          = {10.13154/TCHES.V2020.I4.416-442},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Moos20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NaitoS20,
  author       = {Yusuke Naito and
                  Takeshi Sugawara},
  title        = {Lightweight Authenticated Encryption Mode of Operation for Tweakable
                  Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {66--94},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.66-94},
  doi          = {10.13154/TCHES.V2020.I1.66-94},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NaitoS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PerinCP20,
  author       = {Guilherme Perin and
                  Lukasz Chmielewski and
                  Stjepan Picek},
  title        = {Strength in Numbers: Improving Generalization with Ensembles in Machine
                  Learning-based Profiled Side-channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {337--364},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.337-364},
  doi          = {10.13154/TCHES.V2020.I4.337-364},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PerinCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RaviRCB20,
  author       = {Prasanna Ravi and
                  Sujoy Sinha Roy and
                  Anupam Chattopadhyay and
                  Shivam Bhasin},
  title        = {Generic Side-channel attacks on CCA-secure lattice-based {PKE} and
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {307--335},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.307-335},
  doi          = {10.13154/TCHES.V2020.I3.307-335},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RaviRCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RoyB20,
  author       = {Sujoy Sinha Roy and
                  Andrea Basso},
  title        = {High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation
                  Mechanism: Saber in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {443--466},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.443-466},
  doi          = {10.13154/TCHES.V2020.I4.443-466},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/RoyB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SasdrichBHM20,
  author       = {Pascal Sasdrich and
                  Beg{\"{u}}l Bilgin and
                  Michael Hutter and
                  Mark E. Marson},
  title        = {Low-Latency Hardware Masking with Application to {AES}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {300--326},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.300-326},
  doi          = {10.13154/TCHES.V2020.I2.300-326},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/SasdrichBHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShakyaXTF20,
  author       = {Bicky Shakya and
                  Xiaolin Xu and
                  Mark M. Tehranipoor and
                  Domenic Forte},
  title        = {CAS-Lock: {A} Security-Corruptibility Trade-off Resilient Logic Locking
                  Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {175--202},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.175-202},
  doi          = {10.13154/TCHES.V2020.I1.175-202},
  timestamp    = {Fri, 08 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ShakyaXTF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TanP20,
  author       = {Quan Quan Tan and
                  Thomas Peyrin},
  title        = {Improved Heuristics for Short Linear Programs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {203--230},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.203-230},
  doi          = {10.13154/TCHES.V2020.I1.203-230},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/TanP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoKH20,
  author       = {Rei Ueno and
                  Kohei Kazumori and
                  Naofumi Homma},
  title        = {Rejection Sampling Schemes for Extracting Uniform Distribution from
                  Biased PUFs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {86--128},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.86-128},
  doi          = {10.13154/TCHES.V2020.I4.86-128},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UntersteinSSTIH20,
  author       = {Florian Unterstein and
                  Marc Schink and
                  Thomas Schamberger and
                  Lars Tebelmann and
                  Manuel Ilg and
                  Johann Heyszl},
  title        = {Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {365--388},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.365-388},
  doi          = {10.13154/TCHES.V2020.I4.365-388},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UntersteinSSTIH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ValivetiV20,
  author       = {Annapurna Valiveti and
                  Srinivas Vivek},
  title        = {Second-Order Masked Lookup Table Compression Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {129--153},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.129-153},
  doi          = {10.13154/TCHES.V2020.I4.129-153},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ValivetiV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangMCS20,
  author       = {Weijia Wang and
                  Pierrick M{\'{e}}aux and
                  Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Efficient and Private Computations with Code-Based Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {128--171},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.128-171},
  doi          = {10.13154/TCHES.V2020.I2.128-171},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangMCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangTJBLS20,
  author       = {Wen Wang and
                  Shanquan Tian and
                  Bernhard Jungk and
                  Nina Bindel and
                  Patrick Longa and
                  Jakub Szefer},
  title        = {Parameterized Hardware Accelerators for Lattice-Based Cryptography
                  and Their Application to the {HW/SW} Co-Design of qTESLA},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {269--306},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.269-306},
  doi          = {10.13154/TCHES.V2020.I3.269-306},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WangTJBLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WeissmanTMCES20,
  author       = {Zane Weissman and
                  Thore Tiemann and
                  Daniel Moghimi and
                  Evan Custodio and
                  Thomas Eisenbarth and
                  Berk Sunar},
  title        = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {169--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.169-195},
  doi          = {10.13154/TCHES.V2020.I3.169-195},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WeissmanTMCES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WisiolMPNMSDR20,
  author       = {Nils Wisiol and
                  Christopher M{\"{u}}hl and
                  Niklas Pirnay and
                  Phuong Ha Nguyen and
                  Marian Margraf and
                  Jean{-}Pierre Seifert and
                  Marten van Dijk and
                  Ulrich R{\"{u}}hrmair},
  title        = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {97--120},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.97-120},
  doi          = {10.13154/TCHES.V2020.I3.97-120},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WisiolMPNMSDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersAGP20,
  author       = {Lennert Wouters and
                  Victor Arribas and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {147--168},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.147-168},
  doi          = {10.13154/TCHES.V2020.I3.147-168},
  timestamp    = {Thu, 02 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersHGOGP20,
  author       = {Lennert Wouters and
                  Jan Van den Herrewegen and
                  Flavio D. Garcia and
                  David F. Oswald and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Dismantling DST80-based Immobiliser Systems},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {99--127},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.99-127},
  doi          = {10.13154/TCHES.V2020.I2.99-127},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WuP20,
  author       = {Lichao Wu and
                  Stjepan Picek},
  title        = {Remove Some Noise: On Pre-processing of Side-channel Measurements
                  with Autoencoders},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {389--415},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.389-415},
  doi          = {10.13154/TCHES.V2020.I4.389-415},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/WuP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZaidBHV20,
  author       = {Gabriel Zaid and
                  Lilian Bossuet and
                  Amaury Habrard and
                  Alexandre Venelli},
  title        = {Methodology for Efficient {CNN} Architectures in Profiling Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {1},
  pages        = {1--36},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i1.1-36},
  doi          = {10.13154/TCHES.V2020.I1.1-36},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ZaidBHV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangDF20,
  author       = {Ziyue Zhang and
                  A. Adam Ding and
                  Yunsi Fei},
  title        = {A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key
                  Recovery},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {26--48},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.26-48},
  doi          = {10.13154/TCHES.V2020.I2.26-48},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangL20,
  author       = {Zhendong Zhang and
                  Peng Liu},
  title        = {A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed
                  Passwords},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {4},
  pages        = {1--23},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i4.1-23},
  doi          = {10.13154/TCHES.V2020.I4.1-23},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangYCYWL20,
  author       = {Neng Zhang and
                  Bohan Yang and
                  Chen Chen and
                  Shouyi Yin and
                  Shaojun Wei and
                  Leibo Liu},
  title        = {Highly Efficient Architecture of NewHope-NIST on {FPGA} using Low-Complexity
                  {NTT/INTT}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {49--72},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.49-72},
  doi          = {10.13154/TCHES.V2020.I2.49-72},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangYCYWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangZJZBZLGR20,
  author       = {Fan Zhang and
                  Yiran Zhang and
                  Huilong Jiang and
                  Xiang Zhu and
                  Shivam Bhasin and
                  Xinjie Zhao and
                  Zhe Liu and
                  Dawu Gu and
                  Kui Ren},
  title        = {Persistent Fault Attack in Practice},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {2},
  pages        = {172--195},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i2.172-195},
  doi          = {10.13154/TCHES.V2020.I2.172-195},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangZJZBZLGR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangZNHY20,
  author       = {Jiajia Zhang and
                  Mengce Zheng and
                  Jiehui Nan and
                  Honggang Hu and
                  Nenghai Yu},
  title        = {A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis
                  and Its Extended Application to Imbalanced Data},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {73--96},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.73-96},
  doi          = {10.13154/TCHES.V2020.I3.73-96},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ZhangZNHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AkaviaFS19,
  author       = {Adi Akavia and
                  Dan Feldman and
                  Hayim Shaul},
  title        = {Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {80--106},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.80-106},
  doi          = {10.13154/TCHES.V2019.I2.80-106},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AkaviaFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbrechtHHPVW19,
  author       = {Martin R. Albrecht and
                  Christian Hanser and
                  Andrea H{\"{o}}ller and
                  Thomas P{\"{o}}ppelmann and
                  Fernando Virdia and
                  Andreas Wallner},
  title        = {Implementing RLWE-based Schemes Using an {RSA} Co-Processor},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {169--208},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.169-208},
  doi          = {10.13154/TCHES.V2019.I1.169-208},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlbrechtHHPVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaGTB19,
  author       = {Alejandro Cabrera Aldaya and
                  Cesar Pereida Garc{\'{\i}}a and
                  Luis Manuel Alvarez Tapia and
                  Billy Bob Brumley},
  title        = {Cache-Timing Attacks on {RSA} Key Generation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {213--242},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.213-242},
  doi          = {10.13154/TCHES.V2019.I4.213-242},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AldayaGTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzarKHS19,
  author       = {Kimia Zamiri Azar and
                  Hadi Mardani Kamali and
                  Houman Homayoun and
                  Avesta Sasan},
  title        = {{SMT} Attack: Next Generation Attack on Obfuscated Circuits with Capabilities
                  and Performance Beyond the {SAT} Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {97--122},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.97-122},
  doi          = {10.13154/TCHES.V2019.I1.97-122},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AzarKHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanerjeeUC19,
  author       = {Utsav Banerjee and
                  Tenzin S. Ukyab and
                  Anantha P. Chandrakasan},
  title        = {Sapphire: {A} Configurable Crypto-Processor for Post-Quantum Lattice-based
                  Protocols},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {17--61},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.17-61},
  doi          = {10.13154/TCHES.V2019.I4.17-61},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BanerjeeUC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BernsteinY19,
  author       = {Daniel J. Bernstein and
                  Bo{-}Yin Yang},
  title        = {Fast constant-time gcd computation and modular inversion},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {340--398},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.340-398},
  doi          = {10.13154/TCHES.V2019.I3.340-398},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BernsteinY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BozzatoFP19,
  author       = {Claudio Bozzato and
                  Riccardo Focardi and
                  Francesco Palmarini},
  title        = {Shaping the Glitch: Optimizing Voltage Fault Injection Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {199--224},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.199-224},
  doi          = {10.13154/TCHES.V2019.I2.199-224},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BozzatoFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainSS19,
  author       = {Olivier Bronchain and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Multi-Tuple Leakage Detection and the Dependent Signal Issue},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {318--345},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.318-345},
  doi          = {10.13154/TCHES.V2019.I2.318-345},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BronchainSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarboneCCDDDPV19,
  author       = {Mathieu Carbone and
                  Vincent Conin and
                  Marie{-}Angela Cornelie and
                  Fran{\c{c}}ois Dassance and
                  Guillaume Dufresne and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff and
                  Alexandre Venelli},
  title        = {Deep Learning to Evaluate Secure {RSA} Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {132--161},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.132-161},
  doi          = {10.13154/TCHES.V2019.I2.132-161},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CarboneCCDDDPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersS19,
  author       = {Ga{\"{e}}tan Cassiers and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Towards Globally Optimized Masking: From Low Randomness to Low Noise
                  Rate or Probe Isolating Multiplications with Reduced Randomness and
                  Security against Horizontal Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {162--198},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.162-198},
  doi          = {10.13154/TCHES.V2019.I2.162-198},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CassiersS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CheriseyGRP19,
  author       = {Eloi de Ch{\'{e}}risey and
                  Sylvain Guilley and
                  Olivier Rioul and
                  Pablo Piantanida},
  title        = {Best Information is Most Successful Mutual Information and Success
                  Rate in Side-Channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {49--79},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.49-79},
  doi          = {10.13154/TCHES.V2019.I2.49-79},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CheriseyGRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FaugerePR19,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret and
                  Jocelyn Ryckeghem},
  title        = {Software Toolkit for HFE-based Multivariate Schemes},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {257--304},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.257-304},
  doi          = {10.13154/TCHES.V2019.I3.257-304},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/FaugerePR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GnadKT19,
  author       = {Dennis R. E. Gnad and
                  Jonas Krautter and
                  Mehdi Baradaran Tahoori},
  title        = {Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {305--339},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.305-339},
  doi          = {10.13154/TCHES.V2019.I3.305-339},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GnadKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HaaseL19,
  author       = {Bj{\"{o}}rn Haase and
                  Beno{\^{\i}}t Labrique},
  title        = {AuCPace: Efficient verifier-based {PAKE} protocol tailored for the
                  IIoT},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {1--48},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.1-48},
  doi          = {10.13154/TCHES.V2019.I2.1-48},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HaaseL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HouBZL19,
  author       = {Xiaolu Hou and
                  Jakub Breier and
                  Fuyuan Zhang and
                  Yang Liu},
  title        = {Fully Automated Differential Fault Analysis on Software Implementations
                  of Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {1--29},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.1-29},
  doi          = {10.13154/TCHES.V2019.I3.1-29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HouBZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ImmlerONKLLOWS19,
  author       = {Vincent Immler and
                  Johannes Obermaier and
                  Kuan Kuan Ng and
                  Fei Xiang Ke and
                  JinYu Lee and
                  Yak Peng Lim and
                  Wei Koon Oh and
                  Keng Hoong Wee and
                  Georg Sigl},
  title        = {Secure Physical Enclosures from Covers with Tamper-Resistance},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {51--96},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.51-96},
  doi          = {10.13154/TCHES.V2019.I1.51-96},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ImmlerONKLLOWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ImmlerU19,
  author       = {Vincent Immler and
                  Karthik Uppund},
  title        = {New Insights to Key Derivation for Tamper-Evident Physical Unclonable
                  Functions},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {30--65},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.30-65},
  doi          = {10.13154/TCHES.V2019.I3.30-65},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ImmlerU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KarimiMM19,
  author       = {Naghmeh Karimi and
                  Thorben Moos and
                  Amir Moradi},
  title        = {Exploring the Effect of Device Aging on Static Power Analysis Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {233--256},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.233-256},
  doi          = {10.13154/TCHES.V2019.I3.233-256},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/KarimiMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KimPHBH19,
  author       = {Jaehun Kim and
                  Stjepan Picek and
                  Annelie Heuser and
                  Shivam Bhasin and
                  Alan Hanjalic},
  title        = {Make Some Noise. Unleashing the Power of Convolutional Neural Networks
                  for Profiled Side-channel Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {148--179},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.148-179},
  doi          = {10.13154/TCHES.V2019.I3.148-179},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KimPHBH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KinugawaFH19,
  author       = {Masahiro Kinugawa and
                  Daisuke Fujimoto and
                  Yu{-}ichi Hayashi},
  title        = {Electromagnetic Information Extortion from Electronic Devices Using
                  Interceptor and Its Countermeasure},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {62--90},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.62-90},
  doi          = {10.13154/TCHES.V2019.I4.62-90},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/KinugawaFH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LeviBS19,
  author       = {Itamar Levi and
                  Davide Bellizia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Reducing a Masked Implementation's Effective Security Order with Setup
                  Manipulations And an Explanation Based on Externally-Amplified Couplings},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {293--317},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.293-317},
  doi          = {10.13154/TCHES.V2019.I2.293-317},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/LeviBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LyubashevskyS19,
  author       = {Vadim Lyubashevsky and
                  Gregor Seiler},
  title        = {{NTTRU:} Truly Fast {NTRU} Using {NTT}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {180--201},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.180-201},
  doi          = {10.13154/TCHES.V2019.I3.180-201},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/LyubashevskyS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MaximovE19,
  author       = {Alexander Maximov and
                  Patrik Ekdahl},
  title        = {New Circuit Minimization Techniques for Smaller and Faster {AES} SBoxes},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {91--125},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.91-125},
  doi          = {10.13154/TCHES.V2019.I4.91-125},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MaximovE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MentensGVVSDM19,
  author       = {Nele Mentens and
                  Jan Genoe and
                  Thomas Vandenabeele and
                  Lynn Verschueren and
                  Dirk Smets and
                  Wim Dehaene and
                  Kris Myny},
  title        = {Security on Plastics: Fake or Real?},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {1--16},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.1-16},
  doi          = {10.13154/TCHES.V2019.I4.1-16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MentensGVVSDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerANNR19,
  author       = {Lauren De Meyer and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {M{\&}M: Masks and Macs against Physical Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {25--50},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.25-50},
  doi          = {10.13154/TCHES.V2019.I1.25-50},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerBR19,
  author       = {Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Oscar Reparaz},
  title        = {Consolidating Security Notions in Hardware Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {119--147},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.119-147},
  doi          = {10.13154/TCHES.V2019.I3.119-147},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeyerBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Moos19,
  author       = {Thorben Moos},
  title        = {Static Power {SCA} of Sub-100 nm {CMOS} ASICs and the Insecurity of
                  Masking Schemes in Low-Noise Environments},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {202--232},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.202-232},
  doi          = {10.13154/TCHES.V2019.I3.202-232},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Moos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoosMSS19,
  author       = {Thorben Moos and
                  Amir Moradi and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing
                  Model are Needed},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {256--292},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.256-292},
  doi          = {10.13154/TCHES.V2019.I2.256-292},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MoosMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NguyenSJMRD19,
  author       = {Phuong Ha Nguyen and
                  Durga Prasad Sahoo and
                  Chenglu Jin and
                  Kaleel Mahmood and
                  Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art
                  Machine Learning Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {243--290},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.243-290},
  doi          = {10.13154/TCHES.V2019.I4.243-290},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/NguyenSJMRD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NilssonJS19,
  author       = {Alexander Nilsson and
                  Thomas Johansson and
                  Paul Stankovski},
  title        = {Error Amplification in Code-based Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {238--258},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.238-258},
  doi          = {10.13154/TCHES.V2019.I1.238-258},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/NilssonJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/OFlynnD19,
  author       = {Colin O'Flynn and
                  Alex Dewar},
  title        = {On-Device Power Analysis Across Hardware Security Domains. Stop Hitting
                  Yourself},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {126--153},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.126-153},
  doi          = {10.13154/TCHES.V2019.I4.126-153},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/OFlynnD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Papachristodoulou19,
  author       = {Louiza Papachristodoulou and
                  Apostolos P. Fournaris and
                  Kostas Papagiannopoulos and
                  Lejla Batina},
  title        = {Practical Evaluation of Protected Residue Number System Scalar Multiplication},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {259--282},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.259-282},
  doi          = {10.13154/TCHES.V2019.I1.259-282},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Papachristodoulou19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PicekHJBR19,
  author       = {Stjepan Picek and
                  Annelie Heuser and
                  Alan Jovic and
                  Shivam Bhasin and
                  Francesco Regazzoni},
  title        = {The Curse of Class Imbalance and Conflicting Metrics with Machine
                  Learning for Side-channel Evaluations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {209--237},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.209-237},
  doi          = {10.13154/TCHES.V2019.I1.209-237},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/PicekHJBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RivainW19,
  author       = {Matthieu Rivain and
                  Junwei Wang},
  title        = {Analysis and Improvement of Differential Computation Attacks against
                  Internally-Encoded White-Box Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {225--255},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.225-255},
  doi          = {10.13154/TCHES.V2019.I2.225-255},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/RivainW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RobynsQL19,
  author       = {Pieter Robyns and
                  Peter Quax and
                  Wim Lamotte},
  title        = {Improving {CEMA} using Correlation Optimization},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {1--24},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.1-24},
  doi          = {10.13154/TCHES.V2019.I1.1-24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/RobynsQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Ryan19,
  author       = {Keegan Ryan},
  title        = {Return of the Hidden Number Problem. {A} Widespread and Novel Key
                  Extraction Attack on {ECDSA} and {DSA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {146--168},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.146-168},
  doi          = {10.13154/TCHES.V2019.I1.146-168},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Ryan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShakyaSTF19,
  author       = {Bicky Shakya and
                  Hao{-}Ting Shen and
                  Mark M. Tehranipoor and
                  Domenic Forte},
  title        = {Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {86--118},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.86-118},
  doi          = {10.13154/TCHES.V2019.I3.86-118},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ShakyaSTF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SimKCCPH19,
  author       = {Bo{-}Yeon Sim and
                  Jihoon Kwon and
                  Kyu Young Choi and
                  Jihoon Cho and
                  Aesun Park and
                  Dong{-}Guk Han},
  title        = {Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {180--212},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.180-212},
  doi          = {10.13154/TCHES.V2019.I4.180-212},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/SimKCCPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Sugawara19,
  author       = {Takeshi Sugawara},
  title        = {3-Share Threshold Implementation of {AES} S-box without Fresh Randomness},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {123--145},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.123-145},
  doi          = {10.13154/TCHES.V2019.I1.123-145},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/Sugawara19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Timon19,
  author       = {Benjamin Timon},
  title        = {Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity
                  Analysis},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {2},
  pages        = {107--131},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i2.107-131},
  doi          = {10.13154/TCHES.V2019.I2.107-131},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Timon19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WahbyB19,
  author       = {Riad S. Wahby and
                  Dan Boneh},
  title        = {Fast and simple constant-time hashing to the {BLS12-381} elliptic
                  curve},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {4},
  pages        = {154--179},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i4.154-179},
  doi          = {10.13154/TCHES.V2019.I4.154-179},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/WahbyB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersMAGP19,
  author       = {Lennert Wouters and
                  Eduard Marin and
                  Tomer Ashur and
                  Benedikt Gierlichs and
                  Bart Preneel},
  title        = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems
                  in Modern Supercars},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {3},
  pages        = {66--85},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i3.66-85},
  doi          = {10.13154/TCHES.V2019.I3.66-85},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/0001RGMV18,
  author       = {Bohan Yang and
                  Vladimir Rozic and
                  Milos Grujic and
                  Nele Mentens and
                  Ingrid Verbauwhede},
  title        = {{ES-TRNG:} {A} High-throughput, Low-area True Random Number Generator
                  based on Edge Sampling},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {267--292},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.267-292},
  doi          = {10.13154/TCHES.V2018.I3.267-292},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/0001RGMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/0010L0BHDQR18,
  author       = {Fan Zhang and
                  Xiaoxuan Lou and
                  Xinjie Zhao and
                  Shivam Bhasin and
                  Wei He and
                  Ruyi Ding and
                  Samiya Qureshi and
                  Kui Ren},
  title        = {Persistent Fault Analysis on Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {150--172},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.150-172},
  doi          = {10.13154/TCHES.V2018.I3.150-172},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/0010L0BHDQR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbrechtDP18,
  author       = {Martin R. Albrecht and
                  Amit Deo and
                  Kenneth G. Paterson},
  title        = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {173--213},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.173-213},
  doi          = {10.13154/TCHES.V2018.I3.173-213},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AlbrechtDP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlliniSPBLF18,
  author       = {Elie Noumon Allini and
                  Maciej Sk{\'{o}}rski and
                  Oto Petura and
                  Florent Bernard and
                  Marek Laban and
                  Viktor Fischer},
  title        = {Evaluation and Monitoring of Free Running Oscillators Serving as Source
                  of Randomness},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {214--242},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.214-242},
  doi          = {10.13154/TCHES.V2018.I3.214-242},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AlliniSPBLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AmietCZ18,
  author       = {Dorian Amiet and
                  Andreas Curiger and
                  Paul Zbinden},
  title        = {FPGA-based Accelerator for Post-Quantum Signature Scheme {SPHINCS-256}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {18--39},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.18-39},
  doi          = {10.13154/TCHES.V2018.I1.18-39},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AmietCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ArribasBPNR18,
  author       = {Victor Arribas and
                  Beg{\"{u}}l Bilgin and
                  George Petrides and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {269--290},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.269-290},
  doi          = {10.13154/TCHES.V2018.I1.269-290},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AvoineF18,
  author       = {Gildas Avoine and
                  Lo{\"{\i}}c Ferreira},
  title        = {Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding
                  Oracle Attack},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {149--170},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.149-170},
  doi          = {10.13154/TCHES.V2018.I2.149-170},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AvoineF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BadawiVMA18,
  author       = {Ahmad Al Badawi and
                  Bharadwaj Veeravalli and
                  Chan Fook Mun and
                  Khin Mi Mi Aung},
  title        = {High-Performance {FV} Somewhat Homomorphic Encryption on GPUs: An
                  Implementation using {CUDA}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {70--95},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.70-95},
  doi          = {10.13154/TCHES.V2018.I2.70-95},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BadawiVMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BettaleCZ18,
  author       = {Luk Bettale and
                  Jean{-}S{\'{e}}bastien Coron and
                  Rina Zeitoun},
  title        = {Improved High-Order Conversion From Boolean to Arithmetic Masking},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {22--45},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.22-45},
  doi          = {10.13154/TCHES.V2018.I2.22-45},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BettaleCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BreierHL18,
  author       = {Jakub Breier and
                  Xiaolu Hou and
                  Yang Liu},
  title        = {Fault Attacks Made Easy: Differential Fault Analysis Automation on
                  Assembly Code},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {96--122},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.96-122},
  doi          = {10.13154/TCHES.V2018.I2.96-122},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BreierHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BruinderinkP18,
  author       = {Leon Groot Bruinderink and
                  Peter Pessl},
  title        = {Differential Fault Attacks on Deterministic Lattice Signatures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {21--43},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.21-43},
  doi          = {10.13154/TCHES.V2018.I3.21-43},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/BruinderinkP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CathebrasCMSV18,
  author       = {Jo{\"{e}}l Cath{\'{e}}bras and
                  Alexandre Carbon and
                  Peter A. Milder and
                  Renaud Sirdey and
                  Nicolas Ventroux},
  title        = {Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication
                  for {SHE} Acceleration},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {69--88},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.69-88},
  doi          = {10.13154/TCHES.V2018.I3.69-88},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/CathebrasCMSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChabanneMP18,
  author       = {Herv{\'{e}} Chabanne and
                  Houssem Maghrebi and
                  Emmanuel Prouff},
  title        = {Linear Repairing Codes and Side-Channel Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {118--141},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.118-141},
  doi          = {10.13154/TCHES.V2018.I1.118-141},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChabanneMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChakrabortiDNY18,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {218--241},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.218-241},
  doi          = {10.13154/TCHES.V2018.I2.218-241},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ChakrabortiDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChuangDFGLV18,
  author       = {Kai{-}Hsin Chuang and
                  Robin Degraeve and
                  Andrea Fantini and
                  Guido Groeseneken and
                  Dimitri Linten and
                  Ingrid Verbauwhede},
  title        = {A Cautionary Note When Looking for a Truly Reconfigurable Resistive
                  {RAM} {PUF}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {98--117},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.98-117},
  doi          = {10.13154/TCHES.V2018.I1.98-117},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChuangDFGLV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CnuddeEM18,
  author       = {Thomas De Cnudde and
                  Maik Ender and
                  Amir Moradi},
  title        = {Hardware Masking, Revisited},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {123--148},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.123-148},
  doi          = {10.13154/TCHES.V2018.I2.123-148},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CnuddeEM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronRZ18,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Franck Rondepierre and
                  Rina Zeitoun},
  title        = {High Order Masking of Look-up Tables with Common Shares},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {40--72},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.40-72},
  doi          = {10.13154/TCHES.V2018.I1.40-72},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/CoronRZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DallMEGHMY18,
  author       = {Fergus Dall and
                  Gabrielle De Micheli and
                  Thomas Eisenbarth and
                  Daniel Genkin and
                  Nadia Heninger and
                  Ahmad Moghimi and
                  Yuval Yarom},
  title        = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID}
                  via Cache Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {171--191},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.171-191},
  doi          = {10.13154/TCHES.V2018.I2.171-191},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DerbezFLM18,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Baptiste Lambin and
                  Brice Minaud},
  title        = {On Recovering Affine Encodings in White-Box Implementations},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {121--149},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.121-149},
  doi          = {10.13154/TCHES.V2018.I3.121-149},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/DerbezFLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DinuK18,
  author       = {Daniel Dinu and
                  Ilya Kizhvatov},
  title        = {{EM} Analysis in the IoT Context: Lessons Learned from an Attack on
                  Thread},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {73--97},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.73-97},
  doi          = {10.13154/TCHES.V2018.I1.73-97},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DinuK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DobraunigEKMMP18,
  author       = {Christoph Dobraunig and
                  Maria Eichlseder and
                  Thomas Korak and
                  Stefan Mangard and
                  Florian Mendel and
                  Robert Primas},
  title        = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {547--572},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.547-572},
  doi          = {10.13154/TCHES.V2018.I3.547-572},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DucasKLLSSS18,
  author       = {L{\'{e}}o Ducas and
                  Eike Kiltz and
                  Tancr{\`{e}}de Lepoint and
                  Vadim Lyubashevsky and
                  Peter Schwabe and
                  Gregor Seiler and
                  Damien Stehl{\'{e}}},
  title        = {CRYSTALS-Dilithium: {A} Lattice-Based Digital Signature Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {238--268},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.238-268},
  doi          = {10.13154/TCHES.V2018.I1.238-268},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DucasKLLSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FaustGPPS18,
  author       = {Sebastian Faust and
                  Vincent Grosso and
                  Santos Merino Del Pozo and
                  Clara Paglialonga and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Composable Masking Schemes in the Presence of Physical Defaults {\&}
                  the Robust Probing Model},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {89--120},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.89-120},
  doi          = {10.13154/TCHES.V2018.I3.89-120},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FyrbiakWDABTP18,
  author       = {Marc Fyrbiak and
                  Sebastian Wallat and
                  Jonathan D{\'{e}}chelotte and
                  Nils Albartus and
                  Sinan B{\"{o}}cker and
                  Russell Tessier and
                  Christof Paar},
  title        = {On the Difficulty of FSM-based Hardware Obfuscation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {293--330},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.293-330},
  doi          = {10.13154/TCHES.V2018.I3.293-330},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/FyrbiakWDABTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GrossIB18,
  author       = {Hannes Gro{\ss} and
                  Rinat Iusupov and
                  Roderick Bloem},
  title        = {Generic Low-Latency Masking in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {1--21},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.1-21},
  doi          = {10.13154/TCHES.V2018.I2.1-21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/GrossIB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HicksGO18,
  author       = {Christopher Hicks and
                  Flavio D. Garcia and
                  David F. Oswald},
  title        = {Dismantling the {AUT64} Automotive Cipher},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {46--69},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.46-69},
  doi          = {10.13154/TCHES.V2018.I2.46-69},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HicksGO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoffmannP18,
  author       = {Max Hoffmann and
                  Christof Paar},
  title        = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions
                  at Negligible Overhead},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {277--297},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.277-297},
  doi          = {10.13154/TCHES.V2018.I2.277-297},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HoffmannP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoweOKG18,
  author       = {James Howe and
                  Tobias Oder and
                  Markus Krausz and
                  Tim G{\"{u}}neysu},
  title        = {Standard Lattice-Based Key Encapsulation on Embedded Devices},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {372--393},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.372-393},
  doi          = {10.13154/TCHES.V2018.I3.372-393},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/HoweOKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JungkPS18,
  author       = {Bernhard Jungk and
                  Richard Petri and
                  Marc St{\"{o}}ttinger},
  title        = {Efficient Side-Channel Protections of {ARX} Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {627--653},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.627-653},
  doi          = {10.13154/TCHES.V2018.I3.627-653},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/JungkPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KarmakarMRV18,
  author       = {Angshuman Karmakar and
                  Jose Maria Bermudo Mera and
                  Sujoy Sinha Roy and
                  Ingrid Verbauwhede},
  title        = {Saber on {ARM} CCA-secure module lattice-based key encapsulation on
                  {ARM}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {243--266},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.243-266},
  doi          = {10.13154/TCHES.V2018.I3.243-266},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/KarmakarMRV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KoppermannSHS18,
  author       = {Philipp Koppermann and
                  Fabrizio De Santis and
                  Johann Heyszl and
                  Georg Sigl},
  title        = {Fast {FPGA} Implementations of Diffie-Hellman on the Kummer Surface
                  of a Genus-2 Curve},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.1-17},
  doi          = {10.13154/TCHES.V2018.I1.1-17},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/KoppermannSHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KrautterGT18,
  author       = {Jonas Krautter and
                  Dennis R. E. Gnad and
                  Mehdi Baradaran Tahoori},
  title        = {FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable
                  for {DFA} on {AES}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {44--68},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.44-68},
  doi          = {10.13154/TCHES.V2018.I3.44-68},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/KrautterGT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LohrkeTKBS18,
  author       = {Heiko Lohrke and
                  Shahin Tajik and
                  Thilo Krachenfels and
                  Christian Boit and
                  Jean{-}Pierre Seifert},
  title        = {Key Extraction Using Thermal Laser Stimulation {A} Case Study on Xilinx
                  Ultrascale FPGAs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {573--595},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.573-595},
  doi          = {10.13154/TCHES.V2018.I3.573-595},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/LohrkeTKBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Mathieu-MahiasQ18,
  author       = {Axel Mathieu{-}Mahias and
                  Micha{\"{e}}l Quisquater},
  title        = {Mixing Additive and Multiplicative Masking for Probing Secure Polynomial
                  Evaluation Methods},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {175--208},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.175-208},
  doi          = {10.13154/TCHES.V2018.I1.175-208},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Mathieu-MahiasQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Meyer0W18,
  author       = {Lauren De Meyer and
                  Amir Moradi and
                  Felix Wegener},
  title        = {Spin Me Right Round Rotational Symmetry for FPGA-Specific {AES}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {596--626},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.596-626},
  doi          = {10.13154/TCHES.V2018.I3.596-626},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Meyer0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerRB18,
  author       = {Lauren De Meyer and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin},
  title        = {Multiplicative Masking for {AES} in Hardware},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {431--468},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.431-468},
  doi          = {10.13154/TCHES.V2018.I3.431-468},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeyerRB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoradiRSS18,
  author       = {Amir Moradi and
                  Bastian Richter and
                  Tobias Schneider and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Leakage Detection with the x2-Test},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {209--237},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.209-237},
  doi          = {10.13154/TCHES.V2018.I1.209-237},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/MoradiRSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NaitoMSS18,
  author       = {Yusuke Naito and
                  Mitsuru Matsui and
                  Takeshi Sugawara and
                  Daisuke Suzuki},
  title        = {{SAEB:} {A} Lightweight Blockcipher-Based {AEAD} Mode of Operation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {192--217},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.192-217},
  doi          = {10.13154/TCHES.V2018.I2.192-217},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/NaitoMSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/OderSPG18,
  author       = {Tobias Oder and
                  Tobias Schneider and
                  Thomas P{\"{o}}ppelmann and
                  Tim G{\"{u}}neysu},
  title        = {Practical CCA2-Secure and Masked Ring-LWE Implementation},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {142--174},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.142-174},
  doi          = {10.13154/TCHES.V2018.I1.142-174},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/OderSPG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PageR18,
  author       = {Daniel Page and
                  Matthieu Rivain},
  title        = {Preface to {TCHES} 2018},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {I--IV},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.I-IV},
  doi          = {10.13154/TCHES.V2018.I1.I-IV},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/PageR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Papagiannopoulos18,
  author       = {Kostas Papagiannopoulos},
  title        = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {524--546},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.524-546},
  doi          = {10.13154/TCHES.V2018.I3.524-546},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Papagiannopoulos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Park018,
  author       = {Jin Hyung Park and
                  Dong Hoon Lee},
  title        = {{FACE:} Fast {AES} {CTR} mode Encryption Techniques based on the Reuse
                  of Repetitive Data},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {469--499},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.469-499},
  doi          = {10.13154/TCHES.V2018.I3.469-499},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Park018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ParkSKH18,
  author       = {Aesun Park and
                  Kyung{-}Ah Shim and
                  Namhun Koo and
                  Dong{-}Guk Han},
  title        = {Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate
                  Quadratic Equations - Rainbow and {UOV} -},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {500--523},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.500-523},
  doi          = {10.13154/TCHES.V2018.I3.500-523},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ParkSKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Reyhani-Masoleh18,
  author       = {Arash Reyhani{-}Masoleh and
                  Mostafa M. I. Taha and
                  Doaa Ashmawy},
  title        = {Smashing the Implementation Records of {AES} S-box},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {298--336},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.298-336},
  doi          = {10.13154/TCHES.V2018.I2.298-336},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Reyhani-Masoleh18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SahaMD18,
  author       = {Sayandeep Saha and
                  Debdeep Mukhopadhyay and
                  Pallab Dasgupta},
  title        = {ExpFault: An Automated Framework for Exploitable Fault Characterization
                  in Block Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {242--276},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.242-276},
  doi          = {10.13154/TCHES.V2018.I2.242-276},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/SahaMD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SekerFES18,
  author       = {Okan Seker and
                  Abraham Fernandez{-}Rubio and
                  Thomas Eisenbarth and
                  Rainer Steinwandt},
  title        = {Extending Glitch-Free Multiparty Protocols to Resist Fault Injection
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {394--430},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.394-430},
  doi          = {10.13154/TCHES.V2018.I3.394-430},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/SekerFES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Seo0LH18,
  author       = {Hwajeong Seo and
                  Zhe Liu and
                  Patrick Longa and
                  Zhi Hu},
  title        = {{SIDH} on {ARM:} Faster Modular Multiplications for Faster Post-Quantum
                  Supersingular Isogeny Key Exchange},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {1--20},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.1-20},
  doi          = {10.13154/TCHES.V2018.I3.1-20},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/Seo0LH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TakahashiTA18,
  author       = {Akira Takahashi and
                  Mehdi Tibouchi and
                  Masayuki Abe},
  title        = {New Bleichenbacher Records: Fault Attacks on qDSA Signatures},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {3},
  pages        = {331--371},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i3.331-371},
  doi          = {10.13154/TCHES.V2018.I3.331-371},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/TakahashiTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/0001LPRS17,
  author       = {Zhe Liu and
                  Patrick Longa and
                  Geovandro C. C. F. Pereira and
                  Oscar Reparaz and
                  Hwajeong Seo},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Four {\textbackslash}mathbb {Q} on Embedded Devices with Strong Countermeasures
                  Against Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {665--686},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_32},
  doi          = {10.1007/978-3-319-66787-4\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/0001LPRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AnceauBCMRT17,
  author       = {St{\'{e}}phanie Anceau and
                  Pierre Bleuet and
                  Jessy Cl{\'{e}}di{\`{e}}re and
                  Laurent Maingault and
                  Jean{-}Luc Rainard and
                  R{\'{e}}mi Tucoulou},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Nanofocused X-Ray Beam to Reprogram Secure Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {175--188},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_9},
  doi          = {10.1007/978-3-319-66787-4\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AnceauBCMRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BanikPPSST17,
  author       = {Subhadeep Banik and
                  Sumit Kumar Pandey and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Siang Meng Sim and
                  Yosuke Todo},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {{GIFT:} {A} Small Present - Towards Reaching the Limit of Lightweight
                  Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {321--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_16},
  doi          = {10.1007/978-3-319-66787-4\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BanikPPSST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17,
  author       = {Daniel J. Bernstein and
                  Joachim Breitner and
                  Daniel Genkin and
                  Leon Groot Bruinderink and
                  Nadia Heninger and
                  Tanja Lange and
                  Christine van Vredendaal and
                  Yuval Yarom},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {555--576},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_27},
  doi          = {10.1007/978-3-319-66787-4\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinKLMMN017,
  author       = {Daniel J. Bernstein and
                  Stefan K{\"{o}}lbl and
                  Stefan Lucks and
                  Pedro Maat Costa Massolino and
                  Florian Mendel and
                  Kashif Nawaz and
                  Tobias Schneider and
                  Peter Schwabe and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Yosuke Todo and
                  Beno{\^{\i}}t Viguier},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Gimli : {A} Cross-Platform Permutation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {299--320},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_15},
  doi          = {10.1007/978-3-319-66787-4\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinKLMMN017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BonteBBCIV17,
  author       = {Charlotte Bonte and
                  Carl Bootland and
                  Joppe W. Bos and
                  Wouter Castryck and
                  Ilia Iliashenko and
                  Frederik Vercauteren},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Faster Homomorphic Function Evaluation Using Non-integral Base Encoding},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {579--600},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_28},
  doi          = {10.1007/978-3-319-66787-4\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BonteBBCIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CagliDP17,
  author       = {Eleonora Cagli and
                  C{\'{e}}cile Dumas and
                  Emmanuel Prouff},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Convolutional Neural Networks with Data Augmentation Against Jitter-Based
                  Countermeasures - Profiling Attacks Without Pre-processing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {45--68},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_3},
  doi          = {10.1007/978-3-319-66787-4\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CagliDP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChakrabortiIMN17,
  author       = {Avik Chakraborti and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Mridul Nandi},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Blockcipher-Based Authenticated Encryption: How Small Can We Go?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {277--298},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_14},
  doi          = {10.1007/978-3-319-66787-4\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ChakrabortiIMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chou17,
  author       = {Tung Chou},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {McBits Revisited},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {213--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_11},
  doi          = {10.1007/978-3-319-66787-4\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chou17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChoudaryP17,
  author       = {Marios O. Choudary and
                  Pantelimon George Popescu},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation
                  Tools},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {367--386},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_18},
  doi          = {10.1007/978-3-319-66787-4\_18},
  timestamp    = {Thu, 24 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChoudaryP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierR17,
  author       = {Christophe Clavier and
                  L{\'{e}}o Reynaud},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions
                  of Leakages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_2},
  doi          = {10.1007/978-3-319-66787-4\_2},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ClavierR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Coron17,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {High-Order Conversion from Boolean to Arithmetic Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {93--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_5},
  doi          = {10.1007/978-3-319-66787-4\_5},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Coron17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Daemen17,
  author       = {Joan Daemen},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Changing of the Guards: {A} Simple and Efficient Method for Achieving
                  Uniformity in Threshold Sharing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_7},
  doi          = {10.1007/978-3-319-66787-4\_7},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Daemen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoudarziRVV17,
  author       = {Dahmun Goudarzi and
                  Matthieu Rivain and
                  Damien Vergnaud and
                  Srinivas Vivek},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Generalized Polynomial Decomposition for S-boxes with Application
                  to Side-Channel Countermeasures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {154--171},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_8},
  doi          = {10.1007/978-3-319-66787-4\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GoudarziRVV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossM17,
  author       = {Hannes Gro{\ss} and
                  Stefan Mangard},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Reconciling d+1 Masking in Hardware and Software},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {115--136},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_6},
  doi          = {10.1007/978-3-319-66787-4\_6},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HaaseL17,
  author       = {Bj{\"{o}}rn Haase and
                  Beno{\^{\i}}t Labrique},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Making Password Authenticated Key Exchange Suitable for Resource-Constrained
                  Industrial Control Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {346--364},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_17},
  doi          = {10.1007/978-3-319-66787-4\_17},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HaaseL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HillerO17,
  author       = {Matthias Hiller and
                  Aysun Gurur {\"{O}}nalan},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Hiding Secrecy Leakage in Leaky Helper Data},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {601--619},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_29},
  doi          = {10.1007/978-3-319-66787-4\_29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HillerO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HulsingRSS17,
  author       = {Andreas H{\"{u}}lsing and
                  Joost Rijneveld and
                  John M. Schanck and
                  Peter Schwabe},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {High-Speed Key Encapsulation from {NTRU}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {232--252},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_12},
  doi          = {10.1007/978-3-319-66787-4\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HulsingRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ImmlerSU17,
  author       = {Vincent Immler and
                  Robert Specht and
                  Florian Unterstein},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Your Rails Cannot Hide from Localized {EM:} How Dual-Rail Logic Fails
                  on FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {403--424},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_20},
  doi          = {10.1007/978-3-319-66787-4\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ImmlerSU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JacobHZRS17,
  author       = {Nisha Jacob and
                  Johann Heyszl and
                  Andreas Zankl and
                  Carsten Rolfes and
                  Georg Sigl},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {How to Break Secure Boot on {FPGA} SoCs Through Malicious Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {425--442},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_21},
  doi          = {10.1007/978-3-319-66787-4\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JacobHZRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JeanMPS17,
  author       = {J{\'{e}}r{\'{e}}my Jean and
                  Amir Moradi and
                  Thomas Peyrin and
                  Pascal Sasdrich},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Bit-Sliding: {A} Generic Technique for Bit-Serial Implementations
                  of SPN-based Primitives - Applications to AES, {PRESENT} and {SKINNY}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {687--707},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_33},
  doi          = {10.1007/978-3-319-66787-4\_33},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JeanMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JournaultS17,
  author       = {Anthony Journault and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Very High Order Masking: Efficient Implementation and Security Evaluation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {623--643},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_30},
  doi          = {10.1007/978-3-319-66787-4\_30},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JournaultS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MalisaKKSC17,
  author       = {Luka Malisa and
                  Kari Kostiainen and
                  Thomas Knell and
                  David M. Sommer and
                  Srdjan Capkun},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {468--489},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_23},
  doi          = {10.1007/978-3-319-66787-4\_23},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MalisaKKSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoghimiIE17,
  author       = {Ahmad Moghimi and
                  Gorka Irazoqui and
                  Thomas Eisenbarth},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {CacheZoom: How {SGX} Amplifies the Power of Cache Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {69--90},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_4},
  doi          = {10.1007/978-3-319-66787-4\_4},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MoghimiIE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OlafsdottirRC17,
  author       = {Hildur {\'{O}}lafsd{\'{o}}ttir and
                  Aanjhan Ranganathan and
                  Srdjan Capkun},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {On the Security of Carrier Phase-Based Ranging},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {490--509},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_24},
  doi          = {10.1007/978-3-319-66787-4\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OlafsdottirRC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoussierZS17,
  author       = {Romain Poussier and
                  Yuanyuan Zhou and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {A Systematic Approach to the Side-Channel Analysis of {ECC} Implementations
                  with Worst-Case Horizontal Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {534--554},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_26},
  doi          = {10.1007/978-3-319-66787-4\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoussierZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PrimasPM17,
  author       = {Robert Primas and
                  Peter Pessl and
                  Stefan Mangard},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {513--533},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_25},
  doi          = {10.1007/978-3-319-66787-4\_25},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PrimasPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ReisAL17,
  author       = {Tiago B. S. Reis and
                  Diego F. Aranha and
                  Julio L{\'{o}}pez},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {{PRESENT} Runs Fast - Efficient and Secure Implementation in Software},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {644--664},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_31},
  doi          = {10.1007/978-3-319-66787-4\_31},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ReisAL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ReparazGV17,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Fast Leakage Assessment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {387--399},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_19},
  doi          = {10.1007/978-3-319-66787-4\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ReparazGV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RossiHHM17,
  author       = {Melissa Rossi and
                  Mike Hamburg and
                  Michael Hutter and
                  Mark E. Marson},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_1},
  doi          = {10.1007/978-3-319-66787-4\_1},
  timestamp    = {Mon, 18 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RossiHHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ShinKKK17,
  author       = {Hocheol Shin and
                  Dohyun Kim and
                  Yujin Kwon and
                  Yongdae Kim},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Illusion and Dazzle: Adversarial Optical Channel Exploits Against
                  Lidars for Automotive Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {445--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_22},
  doi          = {10.1007/978-3-319-66787-4\_22},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ShinKKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WangSN17,
  author       = {Wen Wang and
                  Jakub Szefer and
                  Ruben Niederhagen},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary
                  Goppa Codes},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {253--274},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_13},
  doi          = {10.1007/978-3-319-66787-4\_13},
  timestamp    = {Thu, 11 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WangSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/XuSTF17,
  author       = {Xiaolin Xu and
                  Bicky Shakya and
                  Mark M. Tehranipoor and
                  Domenic Forte},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known
                  Logic Locking Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {189--210},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_10},
  doi          = {10.1007/978-3-319-66787-4\_10},
  timestamp    = {Fri, 08 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/XuSTF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2017,
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4},
  doi          = {10.1007/978-3-319-66787-4},
  isbn         = {978-3-319-66786-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BattistelloCPZ16,
  author       = {Alberto Battistello and
                  Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Horizontal Side-Channel Attacks and Countermeasures on the {ISW} Masking
                  Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {23--39},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_2},
  doi          = {10.1007/978-3-662-53140-2\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BattistelloCPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BhattacharyaM16,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Curious Case of Rowhammer: Flipping Secret Exponent Bits Using Timing
                  Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {602--624},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_29},
  doi          = {10.1007/978-3-662-53140-2\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BhattacharyaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosHMT16,
  author       = {Joppe W. Bos and
                  Charles Hubain and
                  Wil Michiels and
                  Philippe Teuwen},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Differential Computation Analysis: Hiding Your White-Box Designs is
                  Not Enough},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {215--236},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_11},
  doi          = {10.1007/978-3-662-53140-2\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosHMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BossGGL0S16,
  author       = {Erik Boss and
                  Vincent Grosso and
                  Tim G{\"{u}}neysu and
                  Gregor Leander and
                  Amir Moradi and
                  Tobias Schneider},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Strong 8-bit Sboxes with Efficient Masking in Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {171--193},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_9},
  doi          = {10.1007/978-3-662-53140-2\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BossGGL0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruinderinkHLY16,
  author       = {Leon Groot Bruinderink and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Yuval Yarom},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Flush, Gauss, and Reload - {A} Cache Attack on the {BLISS} Lattice-Based
                  Signature Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {323--345},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_16},
  doi          = {10.1007/978-3-662-53140-2\_16},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruinderinkHLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chou16,
  author       = {Tung Chou},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {QcBits: Constant-Time Small-Key Code-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {280--300},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_14},
  doi          = {10.1007/978-3-662-53140-2\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chou16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Masking {AES} with d+1 Shares in Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {194--212},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_10},
  doi          = {10.1007/978-3-662-53140-2\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronGPZ16,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Aur{\'{e}}lien Greuet and
                  Emmanuel Prouff and
                  Rina Zeitoun},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Faster Evaluation of SBoxes via Common Shares},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {498--514},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_24},
  doi          = {10.1007/978-3-662-53140-2\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronGPZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DelvauxGVHY16,
  author       = {Jeroen Delvaux and
                  Dawu Gu and
                  Ingrid Verbauwhede and
                  Matthias Hiller and
                  Meng{-}Day (Mandel) Yu},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {412--431},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_20},
  doi          = {10.1007/978-3-662-53140-2\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DelvauxGVHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DugardinGDNR16,
  author       = {Margaux Dugardin and
                  Sylvain Guilley and
                  Jean{-}Luc Danger and
                  Zakaria Najm and
                  Olivier Rioul},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_1},
  doi          = {10.1007/978-3-662-53140-2\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DugardinGDNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DurvauxSP16,
  author       = {Fran{\c{c}}ois Durvaux and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Santos Merino Del Pozo},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Towards Easy Leakage Certification},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {40--60},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_3},
  doi          = {10.1007/978-3-662-53140-2\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DurvauxSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GanjiTFS16,
  author       = {Fatemeh Ganji and
                  Shahin Tajik and
                  Fabian F{\"{a}}{\ss}ler and
                  Jean{-}Pierre Seifert},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Strong Machine Learning Attack Against PUFs with No Mathematical Model},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {391--411},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_19},
  doi          = {10.1007/978-3-662-53140-2\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GanjiTFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GhandaliBHP16,
  author       = {Samaneh Ghandali and
                  Georg T. Becker and
                  Daniel E. Holcomb and
                  Christof Paar},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {A Design Methodology for Stealthy Parametric Trojans and Its Application
                  to Bug Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {625--647},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_30},
  doi          = {10.1007/978-3-662-53140-2\_30},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GhandaliBHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoudarziR16,
  author       = {Dahmun Goudarzi and
                  Matthieu Rivain},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {On the Multiplicative Complexity of Boolean Functions and Bitsliced
                  Higher-Order Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {457--478},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_22},
  doi          = {10.1007/978-3-662-53140-2\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoudarziR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/InciGIES16,
  author       = {Mehmet Sinan Inci and
                  Berk G{\"{u}}lmezoglu and
                  Gorka Irazoqui and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Cache Attacks Enable Bulk Key Recovery on the Cloud},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {368--388},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_18},
  doi          = {10.1007/978-3-662-53140-2\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/InciGIES16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JainG16,
  author       = {Shalabh Jain and
                  Jorge Guajardo},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Physical Layer Group Key Agreement for Automotive Controller Area
                  Networks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {85--105},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_5},
  doi          = {10.1007/978-3-662-53140-2\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JainG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JarvinenMAL16,
  author       = {Kimmo J{\"{a}}rvinen and
                  Andrea Miele and
                  Reza Azarderakhsh and
                  Patrick Longa},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Four {\(\mathbb{Q}\)} on {FPGA:} New Hardware Speed Records for Elliptic
                  Curve Cryptography over Large Prime Characteristic Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {517--537},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_25},
  doi          = {10.1007/978-3-662-53140-2\_25},
  timestamp    = {Wed, 27 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JarvinenMAL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KammerstetterMB16,
  author       = {Markus Kammerstetter and
                  Markus Muellner and
                  Daniel Burian and
                  Christian Kudera and
                  Wolfgang Kastner},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Efficient High-Speed {WPA2} Brute Force Attacks Using Scalable Low-Cost
                  {FPGA} Clustering},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {559--577},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_27},
  doi          = {10.1007/978-3-662-53140-2\_27},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KammerstetterMB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LohrkeTBS16,
  author       = {Heiko Lohrke and
                  Shahin Tajik and
                  Christian Boit and
                  Jean{-}Pierre Seifert},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {No Place to Hide: Contactless Probing of Secret Data on FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_8},
  doi          = {10.1007/978-3-662-53140-2\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LohrkeTBS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/NurnbergerR16,
  author       = {Stefan N{\"{u}}rnberger and
                  Christian Rossow},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {- vatiCAN - Vetted, Authenticated {CAN} Bus},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {106--124},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_6},
  doi          = {10.1007/978-3-662-53140-2\_6},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/NurnbergerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OliveiraLR16,
  author       = {Thomaz Oliveira and
                  Julio L{\'{o}}pez and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Software Implementation of Koblitz Curves over Quadratic Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {259--279},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_13},
  doi          = {10.1007/978-3-662-53140-2\_13},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OliveiraLR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoussierSG16,
  author       = {Romain Poussier and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Vincent Grosso},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Simple Key Enumeration (and Rank Estimation) Using Histograms: An
                  Integrated Approach},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {61--81},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_4},
  doi          = {10.1007/978-3-662-53140-2\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoussierSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PulkusV16,
  author       = {J{\"{u}}rgen Pulkus and
                  Srinivas Vivek},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Reducing the Number of Non-linear Multiplications in Masking Schemes},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {479--497},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_23},
  doi          = {10.1007/978-3-662-53140-2\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/PulkusV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenesSSB16,
  author       = {Joost Renes and
                  Peter Schwabe and
                  Benjamin Smith and
                  Lejla Batina},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {{\textbackslash}mu Kummer: Efficient Hyperelliptic Signatures and
                  Key Exchange on Microcontrollers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {301--320},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_15},
  doi          = {10.1007/978-3-662-53140-2\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RenesSSB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SahaC16,
  author       = {Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis
                  with a Case-Study on {PAEQ}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {581--601},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_28},
  doi          = {10.1007/978-3-662-53140-2\_28},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SahaC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/UenoMHA16,
  author       = {Rei Ueno and
                  Sumio Morioka and
                  Naofumi Homma and
                  Takafumi Aoki},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {A High Throughput/Gate {AES} Hardware Architecture by Compressing
                  Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {538--558},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_26},
  doi          = {10.1007/978-3-662-53140-2\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/UenoMHA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/XieS16,
  author       = {Yang Xie and
                  Ankur Srivastava},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Mitigating {SAT} Attack on Logic Locking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_7},
  doi          = {10.1007/978-3-662-53140-2\_7},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/XieS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/XiongSASG0S16,
  author       = {Wenjie Xiong and
                  Andr{\'{e}} Schaller and
                  Nikolaos A. Anagnostopoulos and
                  Muhammad Umair Saleem and
                  Sebastian Gabmeyer and
                  Stefan Katzenbeisser and
                  Jakub Szefer},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Run-Time Accessible {DRAM} PUFs in Commodity Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {432--453},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_21},
  doi          = {10.1007/978-3-662-53140-2\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/XiongSASG0S16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YaromGH16,
  author       = {Yuval Yarom and
                  Daniel Genkin and
                  Nadia Heninger},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_17},
  doi          = {10.1007/978-3-662-53140-2\_17},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YaromGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ZonenbergY16,
  author       = {Andrew D. Zonenberg and
                  B{\"{u}}lent Yener},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Antikernel: {A} Decentralized Secure Hardware-Software Operating System
                  Architecture},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {237--256},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_12},
  doi          = {10.1007/978-3-662-53140-2\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ZonenbergY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2016,
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2},
  doi          = {10.1007/978-3-662-53140-2},
  isbn         = {978-3-662-53139-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/0001SRGKV15,
  author       = {Zhe Liu and
                  Hwajeong Seo and
                  Sujoy Sinha Roy and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Howon Kim and
                  Ingrid Verbauwhede},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Efficient Ring-LWE Encryption on 8-Bit {AVR} Processors},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {663--682},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_33},
  doi          = {10.1007/978-3-662-48324-4\_33},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/0001SRGKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AysuGMSY15,
  author       = {Aydin Aysu and
                  Ege Gulcan and
                  Daisuke Moriyama and
                  Patrick Schaumont and
                  Moti Yung},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {End-To-End Design of a PUF-Based Privacy Preserving Authentication
                  Protocol},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {556--576},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_28},
  doi          = {10.1007/978-3-662-48324-4\_28},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/AysuGMSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BalaschGRV15,
  author       = {Josep Balasch and
                  Benedikt Gierlichs and
                  Oscar Reparaz and
                  Ingrid Verbauwhede},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {DPA, Bitslicing and Masking at 1 GHz},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {599--619},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_30},
  doi          = {10.1007/978-3-662-48324-4\_30},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BalaschGRV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BauerV15,
  author       = {Aur{\'{e}}lie Bauer and
                  Damien Vergnaud},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Practical Key Recovery for Discrete-Logarithm Based Authentication
                  Schemes from Random Nonce Bits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_15},
  doi          = {10.1007/978-3-662-48324-4\_15},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BauerV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Becker15,
  author       = {Georg T. Becker},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {The Gap Between Promise and Reality: On the Insecurity of {XOR} Arbiter
                  PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {535--555},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_27},
  doi          = {10.1007/978-3-662-48324-4\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Becker15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BelaidCFGKP15,
  author       = {Sonia Bela{\"{\i}}d and
                  Jean{-}S{\'{e}}bastien Coron and
                  Pierre{-}Alain Fouque and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Jean{-}Gabriel Kammerer and
                  Emmanuel Prouff},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Improved Side-Channel Analysis of Finite-Field Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {395--415},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_20},
  doi          = {10.1007/978-3-662-48324-4\_20},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BelaidCFGKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BhattacharyaM15,
  author       = {Sarani Bhattacharya and
                  Debdeep Mukhopadhyay},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Who Watches the Watchmen?: Utilizing Performance Monitors for Compromising
                  Keys of {RSA} on Intel Platforms},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_13},
  doi          = {10.1007/978-3-662-48324-4\_13},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BhattacharyaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BigouT15,
  author       = {Karim Bigou and
                  Arnaud Tisserand},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Single Base Modular Multiplication for Efficient Hardware {RNS} Implementations
                  of {ECC}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {123--140},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_7},
  doi          = {10.1007/978-3-662-48324-4\_7},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BigouT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruneauGHMR15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Damien Marion and
                  Olivier Rioul},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Less is More - Dimensionality Reduction from a Theoretical Perspective},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_2},
  doi          = {10.1007/978-3-662-48324-4\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruneauGHMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BruneauGNT15,
  author       = {Nicolas Bruneau and
                  Sylvain Guilley and
                  Zakaria Najm and
                  Yannick Teglia},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Multi-variate High-Order Attacks of Shuffled Tables Recomputation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {475--494},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_24},
  doi          = {10.1007/978-3-662-48324-4\_24},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BruneauGNT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChakrabortiCHN15,
  author       = {Avik Chakraborti and
                  Anupam Chattopadhyay and
                  Muhammad Hassan and
                  Mridul Nandi},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {TriviA: {A} Fast and Secure Authenticated Encryption Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {330--353},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_17},
  doi          = {10.1007/978-3-662-48324-4\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ChakrabortiCHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoiselS15,
  author       = {Iwen Coisel and
                  Ignacio Sanchez},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Improved Cryptanalysis of the {DECT} Standard Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {269--286},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_14},
  doi          = {10.1007/978-3-662-48324-4\_14},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/CoiselS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DorozOSS15,
  author       = {Yarkin Dor{\"{o}}z and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Erkay Savas and
                  Berk Sunar},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Accelerating {LTV} Based Homomorphic Encryption in Reconfigurable
                  Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {185--204},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_10},
  doi          = {10.1007/978-3-662-48324-4\_10},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DorozOSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GaleaMPT15,
  author       = {Jake Longo and
                  Elke De Mulder and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {SoC It to {EM:} ElectroMagnetic Side-Channel Attacks on a Complex
                  System-on-Chip},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {620--640},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_31},
  doi          = {10.1007/978-3-662-48324-4\_31},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GaleaMPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenkinPPT15,
  author       = {Daniel Genkin and
                  Lev Pachmanov and
                  Itamar Pipman and
                  Eran Tromer},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks
                  on Windowed Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {207--228},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_11},
  doi          = {10.1007/978-3-662-48324-4\_11},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GenkinPPT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HaddadFBN15,
  author       = {Patrick Haddad and
                  Viktor Fischer and
                  Florent Bernard and
                  Jean Nicolai},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {A Physical Approach for Stochastic Modeling of TERO-Based {TRNG}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {357--372},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_18},
  doi          = {10.1007/978-3-662-48324-4\_18},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HaddadFBN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterSSW15,
  author       = {Michael Hutter and
                  J{\"{u}}rgen Schilling and
                  Peter Schwabe and
                  Wolfgang Wieser},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {NaCl's Crypto{\_}box in Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_5},
  doi          = {10.1007/978-3-662-48324-4\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HutterSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KelseyMT15,
  author       = {John Kelsey and
                  Kerry A. McKay and
                  Meltem S{\"{o}}nmez Turan},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Predictive Models for Min-entropy Estimation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {373--392},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_19},
  doi          = {10.1007/978-3-662-48324-4\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KelseyMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KisonFP15,
  author       = {Christian Kison and
                  J{\"{u}}rgen Frinken and
                  Christof Paar},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Finding the {AES} Bits in the Haystack: Reverse Engineering and {SCA}
                  Using Voltage Contrast},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {641--660},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_32},
  doi          = {10.1007/978-3-662-48324-4\_32},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KisonFP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaesLSW15,
  author       = {Roel Maes and
                  Vincent van der Leest and
                  Erik van der Sluis and
                  Frans M. J. Willems},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Secure Key Generation from Biased PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {517--534},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_26},
  doi          = {10.1007/978-3-662-48324-4\_26},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MaesLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiW15,
  author       = {Amir Moradi and
                  Alexander Wild},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Assessment of Hiding the Higher-Order Leakages in Hardware - What
                  Are the Achievements Versus Overheads?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {453--474},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_23},
  doi          = {10.1007/978-3-662-48324-4\_23},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppelmannNPM15,
  author       = {Thomas P{\"{o}}ppelmann and
                  Michael Naehrig and
                  Andrew Putnam and
                  Adri{\'{a}}n Mac{\'{\i}}as},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Accelerating Homomorphic Evaluation on Reconfigurable Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_8},
  doi          = {10.1007/978-3-662-48324-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppelmannNPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PozoS15,
  author       = {Santos Merino Del Pozo and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Blind Source Separation from Single Measurements Using Singular Spectrum
                  Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {42--59},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_3},
  doi          = {10.1007/978-3-662-48324-4\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PozoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenWW15,
  author       = {Yanting Ren and
                  An Wang and
                  Liji Wu},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Transient-Steady Effect Attack on Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_22},
  doi          = {10.1007/978-3-662-48324-4\_22},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RenWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ReparazRVV15,
  author       = {Oscar Reparaz and
                  Sujoy Sinha Roy and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {A Masked Ring-LWE Implementation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {683--702},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_34},
  doi          = {10.1007/978-3-662-48324-4\_34},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ReparazRVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RoyJV15,
  author       = {Sujoy Sinha Roy and
                  Kimmo J{\"{a}}rvinen and
                  Ingrid Verbauwhede},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Lightweight Coprocessor for Koblitz Curves: 283-Bit {ECC} Including
                  Scalar Conversion with only 4300 Gates},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {102--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_6},
  doi          = {10.1007/978-3-662-48324-4\_6},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RoyJV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RoyJVDV15,
  author       = {Sujoy Sinha Roy and
                  Kimmo J{\"{a}}rvinen and
                  Frederik Vercauteren and
                  Vassil S. Dimitrov and
                  Ingrid Verbauwhede},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {164--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_9},
  doi          = {10.1007/978-3-662-48324-4\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RoyJVDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SahaCNAM15,
  author       = {Sayandeep Saha and
                  Rajat Subhra Chakraborty and
                  Srinivasa Shashank Nuthakki and
                  Anshul and
                  Debdeep Mukhopadhyay},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Improved Test Pattern Generation for Hardware Trojan Detection Using
                  Genetic Algorithm and Boolean Satisfiability},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {577--596},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_29},
  doi          = {10.1007/978-3-662-48324-4\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SahaCNAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Schindler15,
  author       = {Werner Schindler},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks
                  on {RSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {229--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_12},
  doi          = {10.1007/978-3-662-48324-4\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Schindler15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchneiderM15,
  author       = {Tobias Schneider and
                  Amir Moradi},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Leakage Assessment Methodology - {A} Clear Roadmap for Side-Channel
                  Evaluations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {495--513},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_25},
  doi          = {10.1007/978-3-662-48324-4\_25},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SchneiderM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/UenoHSNA15,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Yukihiro Sugawara and
                  Yasuyuki Nogami and
                  Takafumi Aoki},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Highly Efficient GF(2\({}^{\mbox{8}}\)) Inversion Circuit Based on
                  Redundant {GF} Arithmetic and Its Application to {AES} Design},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_4},
  doi          = {10.1007/978-3-662-48324-4\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/UenoHSNA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WangYLGSGXF15,
  author       = {Weijia Wang and
                  Yu Yu and
                  Junrong Liu and
                  Zheng Guo and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Dawu Gu and
                  Sen Xu and
                  Rong Fu},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Evaluation and Improvement of Generic-Emulating {DPA} Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {416--432},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_21},
  doi          = {10.1007/978-3-662-48324-4\_21},
  timestamp    = {Mon, 19 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WangYLGSGXF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WhitnallO15,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Robust Profiling for DPA-Style Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_1},
  doi          = {10.1007/978-3-662-48324-4\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WhitnallO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YangZSAG15,
  author       = {Gangqiang Yang and
                  Bo Zhu and
                  Valentin Suder and
                  Mark D. Aagaard and
                  Guang Gong},
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {The Simeck Family of Lightweight Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  pages        = {307--329},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4\_16},
  doi          = {10.1007/978-3-662-48324-4\_16},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YangZSAG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2015,
  editor       = {Tim G{\"{u}}neysu and
                  Helena Handschuh},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International
                  Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9293},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48324-4},
  doi          = {10.1007/978-3-662-48324-4},
  isbn         = {978-3-662-48323-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BartheDFGTZ14,
  author       = {Gilles Barthe and
                  Fran{\c{c}}ois Dupressoir and
                  Pierre{-}Alain Fouque and
                  Benjamin Gr{\'{e}}goire and
                  Mehdi Tibouchi and
                  Jean{-}Christophe Zapalowicz},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Making {RSA-PSS} Provably Secure against Non-random Faults},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_12},
  doi          = {10.1007/978-3-662-44709-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BartheDFGTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BauerJLPR14,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Side-Channel Attack against {RSA} Key Generation Algorithms},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {223--241},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_13},
  doi          = {10.1007/978-3-662-44709-3\_13},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BauerJLPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BengerPSY14,
  author       = {Naomi Benger and
                  Joop van de Pol and
                  Nigel P. Smart and
                  Yuval Yarom},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {"Ooh Aah... Just a Little Bit" : {A} Small Amount of Side Channel
                  Can Go a Long Way},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_5},
  doi          = {10.1007/978-3-662-44709-3\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BengerPSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinCL14,
  author       = {Daniel J. Bernstein and
                  Chitchanok Chuengsatiansup and
                  Tanja Lange},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Curve41417: Karatsuba Revisited},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {316--334},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_18},
  doi          = {10.1007/978-3-662-44709-3\_18},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrennerGLRS14,
  author       = {Hai Brenner and
                  Lubos Gaspar and
                  Ga{\"{e}}tan Leurent and
                  Alon Rosen and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{FPGA} Implementations of {SPRING} - And Their Countermeasures against
                  Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {414--432},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_23},
  doi          = {10.1007/978-3-662-44709-3\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrennerGLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierMW14,
  author       = {Christophe Clavier and
                  Damien Marion and
                  Antoine Wurcker},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Simple Power Analysis on {AES} Key Expansion Revisited},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {279--297},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_16},
  doi          = {10.1007/978-3-662-44709-3\_16},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ClavierMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Coron0V14,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Arnab Roy and
                  Srinivas Vivek},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Fast Evaluation of Polynomials over Binary Finite Fields and Application
                  to Side-Channel Countermeasures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {170--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_10},
  doi          = {10.1007/978-3-662-44709-3\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Coron0V14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronGV14,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Praveen Kumar Vadnala},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Secure Conversion between Boolean and Arithmetic Masking of Any Order},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {188--205},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_11},
  doi          = {10.1007/978-3-662-44709-3\_11},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/CoronGV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DelvauxGSV14,
  author       = {Jeroen Delvaux and
                  Dawu Gu and
                  Dries Schellekens and
                  Ingrid Verbauwhede},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Secure Lightweight Entity Authentication with Strong PUFs: Mission
                  Impossible?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {451--475},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_25},
  doi          = {10.1007/978-3-662-44709-3\_25},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DelvauxGSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DingZFL14,
  author       = {A. Adam Ding and
                  Liwei Zhang and
                  Yunsi Fei and
                  Pei Luo},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {A Statistical Model for Higher Order {DPA} on Masked Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {147--169},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_9},
  doi          = {10.1007/978-3-662-44709-3\_9},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DingZFL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FischerL14,
  author       = {Viktor Fischer and
                  David Lubicz},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Embedded Evaluation of Randomness in Oscillator Based Elementary {TRNG}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {527--543},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_29},
  doi          = {10.1007/978-3-662-44709-3\_29},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/FischerL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenkinPT14,
  author       = {Daniel Genkin and
                  Itamar Pipman and
                  Eran Tromer},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction
                  Attacks on PCs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {242--260},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_14},
  doi          = {10.1007/978-3-662-44709-3\_14},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GenkinPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HeuserRG14,
  author       = {Annelie Heuser and
                  Olivier Rioul and
                  Sylvain Guilley},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Good Is Not Good Enough - Deriving Optimal Distinguishers from Communication
                  Theory},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_4},
  doi          = {10.1007/978-3-662-44709-3\_4},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HeuserRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HolcombF14,
  author       = {Daniel E. Holcomb and
                  Kevin Fu},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Bitline {PUF:} Building Native Challenge-Response {PUF} Capability
                  into Any {SRAM}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {510--526},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_28},
  doi          = {10.1007/978-3-662-44709-3\_28},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HolcombF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HommaHMFTNA14,
  author       = {Naofumi Homma and
                  Yu{-}ichi Hayashi and
                  Noriyuki Miura and
                  Daisuke Fujimoto and
                  Daichi Tanaka and
                  Makoto Nagata and
                  Takafumi Aoki},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{EM} Attack Is Non-invasive? - Design Methodology and Validity Verification
                  of {EM} Attack Sensor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_1},
  doi          = {10.1007/978-3-662-44709-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HommaHMFTNA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KhooPPY14,
  author       = {Khoongming Khoo and
                  Thomas Peyrin and
                  Axel York Poschmann and
                  Huihui Yap},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{FOAM:} Searching for Hardware-Optimal {SPN} Structures and Components
                  with a Fair Comparison},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_24},
  doi          = {10.1007/978-3-662-44709-3\_24},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KhooPPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KunihiroH14,
  author       = {Noboru Kunihiro and
                  Junya Honda},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{RSA} Meets {DPA:} Recovering {RSA} Secret Keys from Noisy Analog
                  Data},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_15},
  doi          = {10.1007/978-3-662-44709-3\_15},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KunihiroH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeisersonMW14,
  author       = {Andrew J. Leiserson and
                  Mark E. Marson and
                  Megan A. Wachs},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Gate-Level Masking under a Path-Based Leakage Metric},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {580--597},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_32},
  doi          = {10.1007/978-3-662-44709-3\_32},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/LeisersonMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiW14,
  author       = {Yongqiang Li and
                  Mingsheng Wang},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Constructing S-boxes for Lightweight Cryptography with Feistel Structure},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_8},
  doi          = {10.1007/978-3-662-44709-3\_8},
  timestamp    = {Mon, 31 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LomnePRRT14,
  author       = {Victor Lomn{\'{e}} and
                  Emmanuel Prouff and
                  Matthieu Rivain and
                  Thomas Roche and
                  Adrian Thillard},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {35--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_3},
  doi          = {10.1007/978-3-662-44709-3\_3},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/LomnePRRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaLCXLJ14,
  author       = {Yuan Ma and
                  Jingqiang Lin and
                  Tianyu Chen and
                  Changwei Xu and
                  Zongbin Liu and
                  Jiwu Jing},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Entropy Evaluation for Oscillator-Based True Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {544--561},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_30},
  doi          = {10.1007/978-3-662-44709-3\_30},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MaLCXLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MieleBKL14,
  author       = {Andrea Miele and
                  Joppe W. Bos and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Cofactorization on Graphics Processing Units},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {335--352},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_19},
  doi          = {10.1007/978-3-662-44709-3\_19},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MieleBKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Moradi14,
  author       = {Amir Moradi},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Side-Channel Leakage through Static Power - Should We Care about in
                  Practice?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {562--579},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_31},
  doi          = {10.1007/978-3-662-44709-3\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Moradi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiI14,
  author       = {Amir Moradi and
                  Vincent Immler},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Early Propagation and Imbalanced Routing, How to Diminish in FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {598--615},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_33},
  doi          = {10.1007/978-3-662-44709-3\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MorawieckiGHMPRSW14,
  author       = {Pawel Morawiecki and
                  Kris Gaj and
                  Ekawat Homsirikamol and
                  Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Marcin Rogawski and
                  Marian Srebrny and
                  Marcin W{\'{o}}jcik},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{ICEPOLE:} High-Speed, Hardware-Oriented Authenticated Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {392--413},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_22},
  doi          = {10.1007/978-3-662-44709-3\_22},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MorawieckiGHMPRSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenWW14,
  author       = {Yossef Oren and
                  Ofir Weisse and
                  Avishai Wool},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {A New Framework for Constraint-Based Probabilistic Template Side Channel
                  Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_2},
  doi          = {10.1007/978-3-662-44709-3\_2},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppelmannDG14,
  author       = {Thomas P{\"{o}}ppelmann and
                  L{\'{e}}o Ducas and
                  Tim G{\"{u}}neysu},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Enhanced Lattice-Based Signatures on Reconfigurable Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {353--370},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_20},
  doi          = {10.1007/978-3-662-44709-3\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppelmannDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RoyVMCV14,
  author       = {Sujoy Sinha Roy and
                  Frederik Vercauteren and
                  Nele Mentens and
                  Donald Donglong Chen and
                  Ingrid Verbauwhede},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Compact Ring-LWE Cryptoprocessor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {371--391},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_21},
  doi          = {10.1007/978-3-662-44709-3\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RoyVMCV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RuhrmairXSMMKB14,
  author       = {Ulrich R{\"{u}}hrmair and
                  Xiaolin Xu and
                  Jan S{\"{o}}lter and
                  Ahmed Mahmoud and
                  Mehrdad Majzoobi and
                  Farinaz Koushanfar and
                  Wayne P. Burleson},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Efficient Power and Timing Side Channels for Physical Unclonable Functions},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {476--492},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_26},
  doi          = {10.1007/978-3-662-44709-3\_26},
  timestamp    = {Fri, 08 Nov 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RuhrmairXSMMKB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SugawaraSFTHSF14,
  author       = {Takeshi Sugawara and
                  Daisuke Suzuki and
                  Ryoichi Fujii and
                  Shigeaki Tawa and
                  Ryohei Hori and
                  Mitsuru Shiozaki and
                  Takeshi Fujino},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Reversing Stealthy Dopant-Level Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {112--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_7},
  doi          = {10.1007/978-3-662-44709-3\_7},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SugawaraSFTHSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TajikDFSNHBD14,
  author       = {Shahin Tajik and
                  Enrico Dietz and
                  Sven Frohmann and
                  Jean{-}Pierre Seifert and
                  Dmitry Nedospasov and
                  Clemens Helfmeier and
                  Christian Boit and
                  Helmar Dittrich},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Physical Characterization of Arbiter PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {493--509},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_27},
  doi          = {10.1007/978-3-662-44709-3\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TajikDFSNHBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TupsamudreBM14,
  author       = {Harshal Tupsamudre and
                  Shikha Bisht and
                  Debdeep Mukhopadhyay},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Destroying Fault Invariant with Randomization - {A} Countermeasure
                  for {AES} Against Differential Fault Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {93--111},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_6},
  doi          = {10.1007/978-3-662-44709-3\_6},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/TupsamudreBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/UnterluggauerW14,
  author       = {Thomas Unterluggauer and
                  Erich Wenger},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Efficient Pairings and {ECC} for Embedded Systems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {298--315},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_17},
  doi          = {10.1007/978-3-662-44709-3\_17},
  timestamp    = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/UnterluggauerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2014,
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3},
  doi          = {10.1007/978-3-662-44709-3},
  isbn         = {978-3-662-44708-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AbdallaBF13,
  author       = {Michel Abdalla and
                  Sonia Bela{\"{\i}}d and
                  Pierre{-}Alain Fouque},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Leakage-Resilient Symmetric Encryption via Re-keying},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {471--488},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_27},
  doi          = {10.1007/978-3-642-40349-1\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/AbdallaBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BanikM13,
  author       = {Subhadeep Banik and
                  Subhamoy Maitra},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {A Differential Fault Attack on {MICKEY} 2.0},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {215--232},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_13},
  doi          = {10.1007/978-3-642-40349-1\_13},
  timestamp    = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BanikM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BayrakRNI13,
  author       = {Ali Galip Bayrak and
                  Francesco Regazzoni and
                  David Novo and
                  Paolo Ienne},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Sleuth: Automated Verification of Software Power Analysis Countermeasures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {293--310},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_17},
  doi          = {10.1007/978-3-642-40349-1\_17},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BayrakRNI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BeckerRPB13,
  author       = {Georg T. Becker and
                  Francesco Regazzoni and
                  Christof Paar and
                  Wayne P. Burleson},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Stealthy Dopant-Level Hardware Trojans},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {197--214},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_12},
  doi          = {10.1007/978-3-642-40349-1\_12},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BeckerRPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinCS13,
  author       = {Daniel J. Bernstein and
                  Tung Chou and
                  Peter Schwabe},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {McBits: Fast Constant-Time Code-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {250--272},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_15},
  doi          = {10.1007/978-3-642-40349-1\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BhargavaM13,
  author       = {Mudit Bhargava and
                  Ken Mai},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {A High Reliability {PUF} Using Hot Carrier Injection Based Response
                  Reinforcement},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {90--106},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_6},
  doi          = {10.1007/978-3-642-40349-1\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BhargavaM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BigouT13,
  author       = {Karim Bigou and
                  Arnaud Tisserand},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Improving Modular Inversion in {RNS} Using the Plus-Minus Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {233--249},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_14},
  doi          = {10.1007/978-3-642-40349-1\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BigouT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BilginBKMW13,
  author       = {Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Miroslav Knezevic and
                  Florian Mendel and
                  Qingju Wang},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Fides: Lightweight Authenticated Cipher with Side-Channel Resistance
                  for Constrained Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {142--158},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_9},
  doi          = {10.1007/978-3-642-40349-1\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BilginBKMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosCHL13,
  author       = {Joppe W. Bos and
                  Craig Costello and
                  H{\"{u}}seyin Hisil and
                  Kristin E. Lauter},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {High-Performance Scalar Multiplication Using 8-Dimensional {GLV/GLS}
                  Decomposition},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {331--348},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_19},
  doi          = {10.1007/978-3-642-40349-1\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BosCHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CherkaouiFFA13,
  author       = {Abdelkarim Cherkaoui and
                  Viktor Fischer and
                  Laurent Fesquet and
                  Alain Aubert},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {A Very High Speed True Random Number Generator with Entropy Assessment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {179--196},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_11},
  doi          = {10.1007/978-3-642-40349-1\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CherkaouiFFA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GerardGNS13,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Vincent Grosso and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Block Ciphers That Are Easier to Mask: How Far Can We Go?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {383--399},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_22},
  doi          = {10.1007/978-3-642-40349-1\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GerardGNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GhoshKDV13,
  author       = {Santosh Ghosh and
                  Amit Kumar and
                  Amitabh Das and
                  Ingrid Verbauwhede},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Implementation of Unified Arithmetic on Binary Huff Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_20},
  doi          = {10.1007/978-3-642-40349-1\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GhoshKDV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossoSF13,
  author       = {Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Sebastian Faust},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Masking vs. Multiparty Computation: How Large Is the Gap for AES?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {400--416},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_23},
  doi          = {10.1007/978-3-642-40349-1\_23},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GrossoSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HeyseMG13,
  author       = {Stefan Heyse and
                  Ingo von Maurich and
                  Tim G{\"{u}}neysu},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Smaller Keys for Code-Based Cryptography: {QC-MDPC} McEliece Implementations
                  on Embedded Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {273--292},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_16},
  doi          = {10.1007/978-3-642-40349-1\_16},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HeyseMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LashermesFG13,
  author       = {Ronan Lashermes and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Inverting the Final Exponentiation of Tate Pairings on Ordinary Elliptic
                  Curves Using Faults},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {365--382},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_21},
  doi          = {10.1007/978-3-642-40349-1\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LashermesFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiZFV13,
  author       = {Zhenqi Li and
                  Bin Zhang and
                  Junfeng Fan and
                  Ingrid Verbauwhede},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {A New Model for Error-Tolerant Side-Channel Cube Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {453--470},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_26},
  doi          = {10.1007/978-3-642-40349-1\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiZFV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Maes13,
  author       = {Roel Maes},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {An Accurate Probabilistic Reliability Model for Silicon PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {73--89},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_5},
  doi          = {10.1007/978-3-642-40349-1\_5},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Maes13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiM13,
  author       = {Amir Moradi and
                  Oliver Mischke},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Simplicity of Converting Leakages from Multivariate to Univariate
                  - (Case Study of a Glitch-Resistant Masking Scheme)},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_1},
  doi          = {10.1007/978-3-642-40349-1\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MulderHMP13,
  author       = {Elke De Mulder and
                  Michael Hutter and
                  Mark E. Marson and
                  Peter Pearson},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Using Bleichenbacher"s Solution to the Hidden Number Problem to Attack
                  Nonce Leaks in 384-Bit {ECDSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {435--452},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_25},
  doi          = {10.1007/978-3-642-40349-1\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MulderHMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OliveiraLAR13,
  author       = {Thomaz Oliveira and
                  Julio L{\'{o}}pez and
                  Diego F. Aranha and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Lambda Coordinates for Binary Elliptic Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {311--330},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_18},
  doi          = {10.1007/978-3-642-40349-1\_18},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OliveiraLAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenSW13,
  author       = {Yossef Oren and
                  Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Effectiveness of the Remanence Decay Side-Channel to Clone
                  Memory-Based PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_7},
  doi          = {10.1007/978-3-642-40349-1\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PesslH13,
  author       = {Peter Pessl and
                  Michael Hutter},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Pushing the Limits of {SHA-3} Hardware Implementations to Fit on {RFID}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_8},
  doi          = {10.1007/978-3-642-40349-1\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PesslH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RoyV13,
  author       = {Arnab Roy and
                  Srinivas Vivek},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Analysis and Improvement of the Generic Higher-Order Masking Scheme
                  of {FSE} 2012},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_24},
  doi          = {10.1007/978-3-642-40349-1\_24},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RoyV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ShoukryMTS13,
  author       = {Yasser Shoukry and
                  Paul D. Martin and
                  Paulo Tabuada and
                  Mani B. Srivastava},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Non-invasive Spoofing Attacks for Anti-lock Braking Systems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_4},
  doi          = {10.1007/978-3-642-40349-1\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ShoukryMTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SugawaraSSSF13,
  author       = {Takeshi Sugawara and
                  Daisuke Suzuki and
                  Minoru Saeki and
                  Mitsuru Shiozaki and
                  Takeshi Fujino},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On Measurable Side-Channel Leaks Inside {ASIC} Design Primitives},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_10},
  doi          = {10.1007/978-3-642-40349-1\_10},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SugawaraSSSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ThillardPR13,
  author       = {Adrian Thillard and
                  Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Success through Confidence: Evaluating the Effectiveness of a Side-Channel
                  Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_2},
  doi          = {10.1007/978-3-642-40349-1\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ThillardPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WhitnallO13,
  author       = {Carolyn Whitnall and
                  Elisabeth Oswald},
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Profiling {DPA:} Efficacy and Efficiency Trade-Offs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1\_3},
  doi          = {10.1007/978-3-642-40349-1\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WhitnallO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2013,
  editor       = {Guido Bertoni and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2013 - 15th International
                  Workshop, Santa Barbara, CA, USA, August 20-23, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8086},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40349-1},
  doi          = {10.1007/978-3-642-40349-1},
  isbn         = {978-3-642-40348-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BanikMS12,
  author       = {Subhadeep Banik and
                  Subhamoy Maitra and
                  Santanu Sarkar},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {A Differential Fault Attack on the Grain Family of Stream Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_8},
  doi          = {10.1007/978-3-642-33027-8\_8},
  timestamp    = {Mon, 15 Jun 2020 17:09:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BanikMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinS12,
  author       = {Daniel J. Bernstein and
                  Peter Schwabe},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {{NEON} Crypto},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {320--339},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_19},
  doi          = {10.1007/978-3-642-33027-8\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BilginNNRS12,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Georg St{\"{u}}tz},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Threshold Implementations of All 3 {\texttimes}3 and 4 {\texttimes}4
                  S-Boxes},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_5},
  doi          = {10.1007/978-3-642-33027-8\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BilginNNRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BriaisCCDGJMNP12,
  author       = {S{\'{e}}bastien Briais and
                  St{\'{e}}phane Caron and
                  Jean{-}Michel Cioranesco and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Jacques{-}Henri Jourdan and
                  Arthur Milchior and
                  David Naccache and
                  Thibault Porteboeuf},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {3D Hardware Canaries},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_1},
  doi          = {10.1007/978-3-642-33027-8\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BriaisCCDGJMNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChengCNY12,
  author       = {Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Bo{-}Yin Yang},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Solving Quadratic Equations with {XL} on Parallel Architectures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {356--373},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_21},
  doi          = {10.1007/978-3-642-33027-8\_21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChengCNY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CzypekHT12,
  author       = {Peter Czypek and
                  Stefan Heyse and
                  Enrico Thomae},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Efficient Implementations of {MQPKS} on Constrained Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {374--389},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_22},
  doi          = {10.1007/978-3-642-33027-8\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CzypekHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Debraize12,
  author       = {Blandine Debraize},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Efficient and Provably Secure Methods for Switching from Arithmetic
                  to Boolean Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_7},
  doi          = {10.1007/978-3-642-33027-8\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Debraize12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FaustPS12,
  author       = {Sebastian Faust and
                  Krzysztof Pietrzak and
                  Joachim Schipper},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Practical Leakage-Resilient Symmetric Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_13},
  doi          = {10.1007/978-3-642-33027-8\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FaustPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FeiLD12,
  author       = {Yunsi Fei and
                  Qiasi Luo and
                  A. Adam Ding},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {A Statistical Model for {DPA} with Novel Algorithmic Confusion Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {233--250},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_14},
  doi          = {10.1007/978-3-642-33027-8\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FeiLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueGLTZ12,
  author       = {Pierre{-}Alain Fouque and
                  Nicolas Guillermin and
                  Delphine Leresteux and
                  Mehdi Tibouchi and
                  Jean{-}Christophe Zapalowicz},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Attacking {RSA-CRT} Signatures with Faults on Montgomery Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {447--462},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_26},
  doi          = {10.1007/978-3-642-33027-8\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueGLTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GerardS12,
  author       = {Beno{\^{\i}}t G{\'{e}}rard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Unified and Optimized Linear Collision Attacks and Their Application
                  in a Non-profiled Setting},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_11},
  doi          = {10.1007/978-3-642-33027-8\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GerardS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GottertFSBH12,
  author       = {Norman G{\"{o}}ttert and
                  Thomas Feller and
                  Michael Schneider and
                  Johannes Buchmann and
                  Sorin A. Huss},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {On the Design of Hardware Building Blocks for Modern Lattice-Based
                  Encryption Schemes},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {512--529},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_30},
  doi          = {10.1007/978-3-642-33027-8\_30},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GottertFSBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuneysuLP12,
  author       = {Tim G{\"{u}}neysu and
                  Vadim Lyubashevsky and
                  Thomas P{\"{o}}ppelmann},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Practical Lattice-Based Cryptography: {A} Signature Scheme for Embedded
                  Systems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {530--547},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_31},
  doi          = {10.1007/978-3-642-33027-8\_31},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GuneysuLP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HeyseG12,
  author       = {Stefan Heyse and
                  Tim G{\"{u}}neysu},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Towards One Cycle per Bit Asymmetric Encryption: Code-Based Cryptography
                  on Reconfigurable Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {340--355},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_20},
  doi          = {10.1007/978-3-642-33027-8\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HeyseG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KatzenbeisserKRSVW12,
  author       = {Stefan Katzenbeisser and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Vladimir Rozic and
                  Ahmad{-}Reza Sadeghi and
                  Ingrid Verbauwhede and
                  Christian Wachsmann},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {PUFs: Myth, Fact or Busted? {A} Security Evaluation of Physically
                  Unclonable Functions (PUFs) Cast in Silicon},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {283--301},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_17},
  doi          = {10.1007/978-3-642-33027-8\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KatzenbeisserKRSVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KerckhofDHBS12,
  author       = {St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Durvaux and
                  C{\'{e}}dric Hocquet and
                  David Bol and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Towards Green Cryptography: {A} Comparison of Lightweight Ciphers
                  from the Energy Viewpoint},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {390--407},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_23},
  doi          = {10.1007/978-3-642-33027-8\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KerckhofDHBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KnezevicNR12,
  author       = {Miroslav Knezevic and
                  Ventzislav Nikov and
                  Peter Rombouts},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Low-Latency Encryption - Is "Lightweight = Light + Wait"?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {426--446},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_25},
  doi          = {10.1007/978-3-642-33027-8\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KnezevicNR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeeCCL12,
  author       = {Jen{-}Wei Lee and
                  Szu{-}Chi Chung and
                  Hsie{-}Chia Chang and
                  Chen{-}Yi Lee},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {An Efficient Countermeasure against Correlation Power-Analysis Attacks
                  with Randomized Montgomery Operations for {DF-ECC} Processor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {548--564},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_32},
  doi          = {10.1007/978-3-642-33027-8\_32},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeeCCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeestPS12,
  author       = {Vincent van der Leest and
                  Bart Preneel and
                  Erik van der Sluis},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Soft Decision Error Correction for Compact Memory-Based PUFs Using
                  a Single Enrollment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {268--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_16},
  doi          = {10.1007/978-3-642-33027-8\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeestPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaesHV12,
  author       = {Roel Maes and
                  Anthony Van Herrewege and
                  Ingrid Verbauwhede},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {{PUFKY:} {A} Fully Functional PUF-Based Cryptographic Key Generator},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {302--319},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_18},
  doi          = {10.1007/978-3-642-33027-8\_18},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MaesHV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MatsudaM12,
  author       = {Seiichi Matsuda and
                  Shiho Moriai},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice
                  Implementation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_24},
  doi          = {10.1007/978-3-642-33027-8\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MatsudaM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MedwedSJ12,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Antoine Joux},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Towards Super-Exponential Side-Channel Security with Efficient Leakage-Resilient
                  PRFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {193--212},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_12},
  doi          = {10.1007/978-3-642-33027-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MedwedSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiM12,
  author       = {Amir Moradi and
                  Oliver Mischke},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {How Far Should Theory Be from Practice? - Evaluation of a Countermeasure},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_6},
  doi          = {10.1007/978-3-642-33027-8\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MossOPT12,
  author       = {Andrew Moss and
                  Elisabeth Oswald and
                  Dan Page and
                  Michael Tunstall},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Compiler Assisted Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {58--75},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_4},
  doi          = {10.1007/978-3-642-33027-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MossOPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenRSW12,
  author       = {Yossef Oren and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Avishai Wool},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_9},
  doi          = {10.1007/978-3-642-33027-8\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenRSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RebeiroRM12,
  author       = {Chester Rebeiro and
                  Sujoy Sinha Roy and
                  Debdeep Mukhopadhyay},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Pushing the Limits of High-Speed {GF(2} m {)} Elliptic Curve Scalar
                  Multiplication on FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {494--511},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_29},
  doi          = {10.1007/978-3-642-33027-8\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RebeiroRM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ReparazGV12,
  author       = {Oscar Reparaz and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Selecting Time Samples for Multivariate {DPA} Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_10},
  doi          = {10.1007/978-3-642-33027-8\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ReparazGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RuhrmairD12,
  author       = {Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Practical Security Analysis of PUF-Based Two-Player Protocols},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {251--267},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_15},
  doi          = {10.1007/978-3-642-33027-8\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RuhrmairD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SarkarM12,
  author       = {Santanu Sarkar and
                  Subhamoy Maitra},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Side Channel Attack to Actual Cryptanalysis: Breaking {CRT-RSA} with
                  Low Weight Decryption Exponents},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {476--493},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_28},
  doi          = {10.1007/978-3-642-33027-8\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SarkarM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchlosserNKOS12,
  author       = {Alexander Schl{\"{o}}sser and
                  Dmitry Nedospasov and
                  Juliane Kr{\"{a}}mer and
                  Susanna Orlic and
                  Jean{-}Pierre Seifert},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Simple Photonic Emission Analysis of {AES} - Photonic Side Channel
                  Analysis for the Rest of Us},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {41--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_3},
  doi          = {10.1007/978-3-642-33027-8\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchlosserNKOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SkorobogatovW12,
  author       = {Sergei Skorobogatov and
                  Christopher Woods},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Breakthrough Silicon Scanning Discovers Backdoor in Military Chip},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_2},
  doi          = {10.1007/978-3-642-33027-8\_2},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SkorobogatovW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Vielhaber12,
  author       = {Michael Vielhaber},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Reduce-by-Feedback: Timing Resistant and DPA-Aware Modular Multiplication
                  Plus: How to Break {RSA} by {DPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {463--475},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_27},
  doi          = {10.1007/978-3-642-33027-8\_27},
  timestamp    = {Fri, 15 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Vielhaber12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2012,
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8},
  doi          = {10.1007/978-3-642-33027-8},
  isbn         = {978-3-642-33026-1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinDLSY11,
  author       = {Daniel J. Bernstein and
                  Niels Duif and
                  Tanja Lange and
                  Peter Schwabe and
                  Bo{-}Yin Yang},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {High-Speed High-Security Signatures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {124--142},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_9},
  doi          = {10.1007/978-3-642-23951-9\_9},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinDLSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovKLTVV11,
  author       = {Andrey Bogdanov and
                  Miroslav Knezevic and
                  Gregor Leander and
                  Deniz Toz and
                  Kerem Varici and
                  Ingrid Verbauwhede},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {spongent: {A} Lightweight Hash Function},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {312--325},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_21},
  doi          = {10.1007/978-3-642-23951-9\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovKLTVV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosOS11,
  author       = {Joppe W. Bos and
                  Onur {\"{O}}zen and
                  Martijn Stam},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Efficient Hashing Using the {AES} Instruction Set},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {507--522},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_33},
  doi          = {10.1007/978-3-642-23951-9\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrierNNT11,
  author       = {Eric Brier and
                  David Naccache and
                  Phong Q. Nguyen and
                  Mehdi Tibouchi},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Modulus Fault Attacks against {RSA-CRT} Signatures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_13},
  doi          = {10.1007/978-3-642-23951-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrierNNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CheungDFGVY11,
  author       = {Ray C. C. Cheung and
                  Sylvain Duquesne and
                  Junfeng Fan and
                  Nicolas Guillermin and
                  Ingrid Verbauwhede and
                  Gavin Xiaoxu Yao},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {{FPGA} Implementation of Pairings Using Residue Number System and
                  Lazy Reduction},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {421--441},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_28},
  doi          = {10.1007/978-3-642-23951-9\_28},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CheungDFGVY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierFGRV11,
  author       = {Christophe Clavier and
                  Benoit Feix and
                  Georges Gagnerot and
                  Myl{\`{e}}ne Roussellet and
                  Vincent Verneuil},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Improved Collision-Correlation Power Analysis on First Order Protected
                  {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {49--62},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_4},
  doi          = {10.1007/978-3-642-23951-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ClavierFGRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DerbezFL11,
  author       = {Patrick Derbez and
                  Pierre{-}Alain Fouque and
                  Delphine Leresteux},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Meet-in-the-Middle and Impossible Differential Fault Analysis on {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_19},
  doi          = {10.1007/978-3-642-23951-9\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DerbezFL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FanGV11,
  author       = {Junfeng Fan and
                  Benedikt Gierlichs and
                  Frederik Vercauteren},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {To Infinity and Beyond: Combined Attack on {ECC} Using Points of Low
                  Order},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {143--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_10},
  doi          = {10.1007/978-3-642-23951-9\_10},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FanGV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GenellePQ11,
  author       = {Laurie Genelle and
                  Emmanuel Prouff and
                  Micha{\"{e}}l Quisquater},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative
                  Maskings},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {240--255},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_16},
  doi          = {10.1007/978-3-642-23951-9\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GenellePQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GhoshCD11,
  author       = {Santosh Ghosh and
                  Dipanwita Roy Chowdhury and
                  Abhijit Das},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {High Speed Cryptoprocessor for {\(\eta\)} {T} Pairing on 128-bit Secure
                  Supersingular Elliptic Curves over Characteristic Two Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {442--458},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_29},
  doi          = {10.1007/978-3-642-23951-9\_29},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GhoshCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoubinM11,
  author       = {Louis Goubin and
                  Ange Martinelli},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Protecting {AES} with Shamir's Secret Sharing Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {79--94},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_6},
  doi          = {10.1007/978-3-642-23951-9\_6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GoubinM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrabherGHJPTW11,
  author       = {Philipp Grabher and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Simon Hoerder and
                  Kimmo J{\"{a}}rvinen and
                  Dan Page and
                  Stefan Tillich and
                  Marcin W{\'{o}}jcik},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {An Exploration of Mechanisms for Dynamic Cryptographic Instruction
                  Set Extension},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_1},
  doi          = {10.1007/978-3-642-23951-9\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrabherGHJPTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuneysuM11,
  author       = {Tim G{\"{u}}neysu and
                  Amir Moradi},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Generic Side-Channel Countermeasures for Reconfigurable Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_3},
  doi          = {10.1007/978-3-642-23951-9\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuneysuM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuoPPR11,
  author       = {Jian Guo and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {The {LED} Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {326--341},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_22},
  doi          = {10.1007/978-3-642-23951-9\_22},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GuoPPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HomsirikamolRG11,
  author       = {Ekawat Homsirikamol and
                  Marcin Rogawski and
                  Kris Gaj},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Throughput vs. Area Trade-offs in High-Speed Architectures of Five
                  Round 3 {SHA-3} Candidates Implemented Using Xilinx and Altera FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {491--506},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_32},
  doi          = {10.1007/978-3-642-23951-9\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HomsirikamolRG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterW11,
  author       = {Michael Hutter and
                  Erich Wenger},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Fast Multi-precision Multiplication for Public-Key Cryptography on
                  Embedded Microprocessors},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {459--474},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_30},
  doi          = {10.1007/978-3-642-23951-9\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KatzenbeisserKLSSSW11,
  author       = {Stefan Katzenbeisser and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Vincent van der Leest and
                  Ahmad{-}Reza Sadeghi and
                  Geert Jan Schrijen and
                  Heike Schr{\"{o}}der and
                  Christian Wachsmann},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Recyclable PUFs: Logically Reconfigurable PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {374--389},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_25},
  doi          = {10.1007/978-3-642-23951-9\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KatzenbeisserKLSSSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KimHL11,
  author       = {HeeSeok Kim and
                  Seokhie Hong and
                  Jongin Lim},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {A Fast and Provably Secure Higher-Order Masking of {AES} S-Box},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_7},
  doi          = {10.1007/978-3-642-23951-9\_7},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KimHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KrishnaNWB11,
  author       = {Aswin Raghav Krishna and
                  Seetharam Narasimhan and
                  Xinmu Wang and
                  Swarup Bhunia},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {{MECCA:} {A} Robust Low-Overhead {PUF} Using Embedded Memory Array},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_27},
  doi          = {10.1007/978-3-642-23951-9\_27},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KrishnaNWB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KuoSDRBCY11,
  author       = {Po{-}Chun Kuo and
                  Michael Schneider and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Jan Reichelt and
                  Johannes Buchmann and
                  Chen{-}Mou Cheng and
                  Bo{-}Yin Yang},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Extreme Enumeration on {GPU} and in Clouds - - How Many Dollars You
                  Need to Break {SVP} Challenges -},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {176--191},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_12},
  doi          = {10.1007/978-3-642-23951-9\_12},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KuoSDRBCY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MajzoobiKD11,
  author       = {Mehrdad Majzoobi and
                  Farinaz Koushanfar and
                  Srinivas Devadas},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {FPGA-Based True Random Number Generation Using Circuit Metastability
                  with Adaptive Feedback Control},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_2},
  doi          = {10.1007/978-3-642-23951-9\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MajzoobiKD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MedwedS11,
  author       = {Marcel Medwed and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Extractors against Side-Channel Attacks: Weak or Strong?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {256--272},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_17},
  doi          = {10.1007/978-3-642-23951-9\_17},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MedwedS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiMPLOS11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar and
                  Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel
                  Attacks in a Combined Setting},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_20},
  doi          = {10.1007/978-3-642-23951-9\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OswaldP11,
  author       = {David F. Oswald and
                  Christof Paar},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Breaking Mifare DESFire {MF3ICD40:} Power Analysis and Templates in
                  the Real World},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_14},
  doi          = {10.1007/978-3-642-23951-9\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OswaldP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PetzoldtTBW11,
  author       = {Albrecht Petzoldt and
                  Enrico Thomae and
                  Stanislav Bulygin and
                  Christopher Wolf},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Small Public Keys and Fast Verification for {\textdollar}{\textbackslash}mathcal\{M\}{\textdollar}
                  ultivariate {\textdollar}{\textbackslash}mathcal\{Q\}{\textdollar}
                  uadratic Public Key Systems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {475--490},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_31},
  doi          = {10.1007/978-3-642-23951-9\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PetzoldtTBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ProuffR11,
  author       = {Emmanuel Prouff and
                  Thomas Roche},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Higher-Order Glitches Free Implementation of the {AES} Using Secure
                  Multi-party Computation Protocols},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_5},
  doi          = {10.1007/978-3-642-23951-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ProuffR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenauldKSF11,
  author       = {Mathieu Renauld and
                  Dina Kamel and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Denis Flandre},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Information Theoretic and Security Analysis of a 65-Nanometer {DDSLL}
                  {AES} S-Box},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_15},
  doi          = {10.1007/978-3-642-23951-9\_15},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RenauldKSF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchneiderG11,
  author       = {Michael Schneider and
                  Norman G{\"{o}}ttert},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Random Sampling for Short Lattice Vectors on Graphics Cards},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_11},
  doi          = {10.1007/978-3-642-23951-9\_11},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchneiderG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ShibutaniIHMAS11,
  author       = {Kyoji Shibutani and
                  Takanori Isobe and
                  Harunaga Hiwatari and
                  Atsushi Mitsuda and
                  Toru Akishita and
                  Taizo Shirai},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Piccolo: An Ultra-Lightweight Blockcipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {342--357},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_23},
  doi          = {10.1007/978-3-642-23951-9\_23},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ShibutaniIHMAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TaverneFARHL11,
  author       = {Jonathan Taverne and
                  Armando Faz{-}Hern{\'{a}}ndez and
                  Diego F. Aranha and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Darrel Hankerson and
                  Julio L{\'{o}}pez},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less
                  Multiplier on Scalar Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_8},
  doi          = {10.1007/978-3-642-23951-9\_8},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TaverneFARHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Tominaga11,
  author       = {Tetsuya Tominaga},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Standardization Works for Security Regarding the Electromagnetic Environment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {273},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_18},
  doi          = {10.1007/978-3-642-23951-9\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Tominaga11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YamamotoSIOOTI11,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Takao Ochiai and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Uniqueness Enhancement of {PUF} Responses Based on the Locations of
                  Random Outputting {RS} Latches},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_26},
  doi          = {10.1007/978-3-642-23951-9\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YamamotoSIOOTI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YuMSD11,
  author       = {Meng{-}Day (Mandel) Yu and
                  David M'Ra{\"{\i}}hi and
                  Richard Sowell and
                  Srinivas Devadas},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Lightweight and Secure {PUF} Key Storage Using Limits of Machine Learning},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {358--373},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_24},
  doi          = {10.1007/978-3-642-23951-9\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YuMSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2011,
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9},
  doi          = {10.1007/978-3-642-23951-9},
  isbn         = {978-3-642-23950-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AciicmezBG10,
  author       = {Onur Acii{\c{c}}mez and
                  Billy Bob Brumley and
                  Philipp Grabher},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {New Results on Instruction Cache Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {110--124},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_8},
  doi          = {10.1007/978-3-642-15031-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AciicmezBG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AumassonHMN10,
  author       = {Jean{-}Philippe Aumasson and
                  Luca Henzen and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Quark: {A} Lightweight Hash},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_1},
  doi          = {10.1007/978-3-642-15031-9\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AumassonHMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BadelDNORSSV10,
  author       = {St{\'{e}}phane Badel and
                  Nilay Dagtekin and
                  Jorge Nakahara Jr. and
                  Khaled Ouafi and
                  Nicolas Reff{\'{e}} and
                  Pouyan Sepehrdad and
                  Petr Susil and
                  Serge Vaudenay},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {{ARMADILLO:} {A} Multi-purpose Cryptographic Primitive Dedicated to
                  Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {398--412},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_27},
  doi          = {10.1007/978-3-642-15031-9\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BadelDNORSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BenoitP10,
  author       = {Olivier Beno{\^{\i}}t and
                  Thomas Peyrin},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Side-Channel Analysis of Six {SHA-3} Candidates},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_10},
  doi          = {10.1007/978-3-642-15031-9\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BenoitP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BertoniDPA10,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Sponge-Based Pseudo-Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_3},
  doi          = {10.1007/978-3-642-15031-9\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BertoniDPA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BerzatiCG10,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas{-}Dumas and
                  Louis Goubin},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Public Key Perturbation of Randomized {RSA} Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {306--319},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_21},
  doi          = {10.1007/978-3-642-15031-9\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BerzatiCG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BosS10,
  author       = {Joppe W. Bos and
                  Deian Stefan},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Performance Analysis of the {SHA-3} Candidates on Exotic Multi-core
                  Architectures},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {279--293},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_19},
  doi          = {10.1007/978-3-642-15031-9\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BosS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BouillaguetCCCNSY10,
  author       = {Charles Bouillaguet and
                  Hsieh{-}Chung Chen and
                  Chen{-}Mou Cheng and
                  Tung Chou and
                  Ruben Niederhagen and
                  Adi Shamir and
                  Bo{-}Yin Yang},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fast Exhaustive Search for Polynomial Systems in \emph{F}\({}_{\mbox{2}}\)},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_14},
  doi          = {10.1007/978-3-642-15031-9\_14},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BouillaguetCCCNSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronK10,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Ilya Kizhvatov},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Analysis and Improvement of the Random Delay Countermeasure of {CHES}
                  2009},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_7},
  doi          = {10.1007/978-3-642-15031-9\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Di-BattistaCRTP10,
  author       = {Jerome Di{-}Battista and
                  Jean{-}Christophe Courr{\`{e}}ge and
                  Bruno Rouzeyre and
                  Lionel Torres and
                  Philippe Perdu},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {When Failure Analysis Meets Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_13},
  doi          = {10.1007/978-3-642-15031-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Di-BattistaCRTP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DuNCB10,
  author       = {Dongdong Du and
                  Seetharam Narasimhan and
                  Rajat Subhra Chakraborty and
                  Swarup Bhunia},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Self-referencing: {A} Scalable Side-Channel Approach for Hardware
                  Trojan Detection},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_12},
  doi          = {10.1007/978-3-642-15031-9\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DuNCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GajHR10,
  author       = {Kris Gaj and
                  Ekawat Homsirikamol and
                  Marcin Rogawski},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fair and Comprehensive Methodology for Comparing Hardware Performance
                  of Fourteen Round Two {SHA-3} Candidates Using FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {264--278},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_18},
  doi          = {10.1007/978-3-642-15031-9\_18},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GajHR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoundarJM10,
  author       = {Raveen R. Goundar and
                  Marc Joye and
                  Atsuko Miyaji},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Co-\emph{Z} Addition Formul{\ae} and Binary Ladders on Elliptic Curves
                  - (Extended Abstract)},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_5},
  doi          = {10.1007/978-3-642-15031-9\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoundarJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Guillermin10,
  author       = {Nicolas Guillermin},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {A High Speed Coprocessor for Elliptic Curve Scalar Multiplications
                  over {\textbackslash}mathbb\emph{F}\({}_{\mbox{\emph{p}}}\){\textbackslash}mathbb\{F\}{\_}p},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {48--64},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_4},
  doi          = {10.1007/978-3-642-15031-9\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Guillermin10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HenzenGGPZG10,
  author       = {Luca Henzen and
                  Pietro Gendotti and
                  Patrice Guillet and
                  Enrico Pargaetzi and
                  Martin Zoller and
                  Frank K. G{\"{u}}rkaynak},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Developing a Hardware Evaluation Method for {SHA-3} Candidates},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_17},
  doi          = {10.1007/978-3-642-15031-9\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HenzenGGPZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HoferB10,
  author       = {Maximilian Hofer and
                  Christoph B{\"{o}}hm},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {An Alternative to Error Correction for SRAM-Like PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {335--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_23},
  doi          = {10.1007/978-3-642-15031-9\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HoferB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JarvinenKSS10,
  author       = {Kimmo J{\"{a}}rvinen and
                  Vladimir Kolesnikov and
                  Ahmad{-}Reza Sadeghi and
                  Thomas Schneider},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and
                  Evaluation of One-Time Programs - (Full Version)},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_26},
  doi          = {10.1007/978-3-642-15031-9\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/JarvinenKSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KnudsenLPR10,
  author       = {Lars R. Knudsen and
                  Gregor Leander and
                  Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {PRINTcipher: {A} Block Cipher for IC-Printing},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_2},
  doi          = {10.1007/978-3-642-15031-9\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KnudsenLPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiSGFTO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shigeto Gomisawa and
                  Toshinori Fukunaga and
                  Junko Takahashi and
                  Kazuo Ohta},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fault Sensitivity Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {320--334},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_22},
  doi          = {10.1007/978-3-642-15031-9\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LongaG10,
  author       = {Patrick Longa and
                  Catherine H. Gebotys},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Efficient Techniques for High-Speed Elliptic Curve Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {80--94},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_6},
  doi          = {10.1007/978-3-642-15031-9\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LongaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiME10,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Thomas Eisenbarth},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Correlation-Enhanced Power Analysis Collision Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {125--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_9},
  doi          = {10.1007/978-3-642-15031-9\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiME10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/NogamiNTHM10,
  author       = {Yasuyuki Nogami and
                  Kenta Nekado and
                  Tetsumi Toyota and
                  Naoto Hongo and
                  Yoshitaka Morikawa},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Mixed Bases for Efficient Inversion in {\textbackslash}mathbb \emph{F}((2\({}^{\mbox{2}}\))\({}^{\mbox{2}}\))
                  and Conversion Matrices of SubBytes of {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {234--247},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_16},
  doi          = {10.1007/978-3-642-15031-9\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/NogamiNTHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenKPW10,
  author       = {Yossef Oren and
                  Mario Kirschbaum and
                  Thomas Popp and
                  Avishai Wool},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Algebraic Side-Channel Analysis in the Presence of Errors},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {428--442},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_29},
  doi          = {10.1007/978-3-642-15031-9\_29},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenKPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoschmannLW10,
  author       = {Axel Poschmann and
                  San Ling and
                  Huaxiong Wang},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {256 Bit Standardized Crypto for 650 {GE} - {GOST} Revisited},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_15},
  doi          = {10.1007/978-3-642-15031-9\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoschmannLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RivainP10,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provably Secure Higher-Order Masking of {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {413--427},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_28},
  doi          = {10.1007/978-3-642-15031-9\_28},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RivainP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Skorobogatov10,
  author       = {Sergei Skorobogatov},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Flash Memory 'Bumping' Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_11},
  doi          = {10.1007/978-3-642-15031-9\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Skorobogatov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SuzukiS10,
  author       = {Daisuke Suzuki and
                  Koichi Shimizu},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The Glitch {PUF:} {A} New Delay-PUF Architecture Exploiting Glitch
                  Shapes},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {366--382},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_25},
  doi          = {10.1007/978-3-642-15031-9\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SuzukiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TunstallJ10,
  author       = {Michael Tunstall and
                  Marc Joye},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Coordinate Blinding over Large Prime Fields},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {443--455},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_30},
  doi          = {10.1007/978-3-642-15031-9\_30},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/TunstallJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/VarcholaD10,
  author       = {Michal Varchola and
                  Milos Drutarovsk{\'{y}}},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {New High Entropy Element for {FPGA} Based True Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {351--365},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_24},
  doi          = {10.1007/978-3-642-15031-9\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/VarcholaD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Wenzel-BennerG10,
  author       = {Christian Wenzel{-}Benner and
                  Jens Gr{\"{a}}f},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {{XBX:} eXternal Benchmarking eXtension for the {SUPERCOP} Crypto Benchmarking
                  Framework},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {294--305},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_20},
  doi          = {10.1007/978-3-642-15031-9\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Wenzel-BennerG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2010,
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9},
  doi          = {10.1007/978-3-642-15031-9},
  isbn         = {978-3-642-15030-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaGL09,
  author       = {Lejla Batina and
                  Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Differential Cluster Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {112--127},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_9},
  doi          = {10.1007/978-3-642-04138-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BeuchatDEOR09,
  author       = {Jean{-}Luc Beuchat and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Nicolas Estibals and
                  Eiji Okamoto and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Hardware Accelerator for the Tate Pairing in Characteristic Three
                  Based on Karatsuba-Ofman Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_17},
  doi          = {10.1007/978-3-642-04138-9\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BeuchatDEOR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CanniereDK09,
  author       = {Christophe De Canni{\`{e}}re and
                  Orr Dunkelman and
                  Miroslav Knezevic},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {{KATAN} and {KTANTAN} - {A} Family of Small and Efficient Hardware-Oriented
                  Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {272--288},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_20},
  doi          = {10.1007/978-3-642-04138-9\_20},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CanniereDK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChakrabortyWPPB09,
  author       = {Rajat Subhra Chakraborty and
                  Francis G. Wolff and
                  Somnath Paul and
                  Christos A. Papachristou and
                  Swarup Bhunia},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {{MERO:} {A} Statistical Approach for Hardware Trojan Detection},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {396--410},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_28},
  doi          = {10.1007/978-3-642-04138-9\_28},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChakrabortyWPPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChenCCCDKLY09,
  author       = {Anna Inn{-}Tung Chen and
                  Ming{-}Shing Chen and
                  Tien{-}Ren Chen and
                  Chen{-}Mou Cheng and
                  Jintai Ding and
                  Eric Li{-}Hsiang Kuo and
                  Frost Yu{-}Shuang Lee and
                  Bo{-}Yin Yang},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {{SSE} Implementation of Multivariate PKCs on Modern x86 CPUs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_3},
  doi          = {10.1007/978-3-642-04138-9\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChenCCCDKLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronJKNP09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Antoine Joux and
                  Ilya Kizhvatov and
                  David Naccache and
                  Pascal Paillier},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Fault Attacks on {RSA} Signatures with Partially Unknown Messages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {444--456},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_31},
  doi          = {10.1007/978-3-642-04138-9\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronJKNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronK09,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Ilya Kizhvatov},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {An Efficient Method for Random Delay Generation in Embedded Software},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {156--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_12},
  doi          = {10.1007/978-3-642-04138-9\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Devadas09,
  author       = {Srini Devadas},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Physical Unclonable Functions and Secure Processors},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {65},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_5},
  doi          = {10.1007/978-3-642-04138-9\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Devadas09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/EisenbarthGHP09,
  author       = {Thomas Eisenbarth and
                  Tim G{\"{u}}neysu and
                  Stefan Heyse and
                  Christof Paar},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {MicroEliece: McEliece for Embedded Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_4},
  doi          = {10.1007/978-3-642-04138-9\_4},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/EisenbarthGHP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FanVV09,
  author       = {Junfeng Fan and
                  Frederik Vercauteren and
                  Ingrid Verbauwhede},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_18},
  doi          = {10.1007/978-3-642-04138-9\_18},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FanVV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FinkeGS09,
  author       = {Thomas Finke and
                  Max Gebhardt and
                  Werner Schindler},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {A New Side-Channel Attack on {RSA} Prime Generation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_11},
  doi          = {10.1007/978-3-642-04138-9\_11},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FinkeGS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueLRV09,
  author       = {Pierre{-}Alain Fouque and
                  Ga{\"{e}}tan Leurent and
                  Denis R{\'{e}}al and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Practical Electromagnetic Template Attack on {HMAC}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {66--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_6},
  doi          = {10.1007/978-3-642-04138-9\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueLRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuoFSV09,
  author       = {Xu Guo and
                  Junfeng Fan and
                  Patrick Schaumont and
                  Ingrid Verbauwhede},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Programmable and Parallel {ECC} Coprocessor Architecture: Tradeoffs
                  between Area, Speed and Security},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {289--303},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_21},
  doi          = {10.1007/978-3-642-04138-9\_21},
  timestamp    = {Fri, 04 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/GuoFSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hamburg09,
  author       = {Mike Hamburg},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Accelerating {AES} with Vector Permute Instructions},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_2},
  doi          = {10.1007/978-3-642-04138-9\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hamburg09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HammouriDS09,
  author       = {Ghaith Hammouri and
                  Aykutlu Dana and
                  Berk Sunar},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {CDs Have Fingerprints Too},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {348--362},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_25},
  doi          = {10.1007/978-3-642-04138-9\_25},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HammouriDS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hlavac09,
  author       = {Martin Hlav{\'{a}}c},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Known-Plaintext-Only Attack on {RSA-CRT} with Montgomery Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_10},
  doi          = {10.1007/978-3-642-04138-9\_10},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hlavac09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KammlerZSSLAAM09,
  author       = {David Kammler and
                  Diandian Zhang and
                  Peter Schwabe and
                  Hanno Scharw{\"{a}}chter and
                  Markus Langenberg and
                  Dominik Auras and
                  Gerd Ascheid and
                  Rudolf Mathar},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Designing an {ASIP} for Cryptographic Pairings over Barreto-Naehrig
                  Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {254--271},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_19},
  doi          = {10.1007/978-3-642-04138-9\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KammlerZSSLAAM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KasperS09,
  author       = {Emilia K{\"{a}}sper and
                  Peter Schwabe},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Faster and Timing-Attack Resistant {AES-GCM}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_1},
  doi          = {10.1007/978-3-642-04138-9\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KasperS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LinKGPB09,
  author       = {Lang Lin and
                  Markus Kasper and
                  Tim G{\"{u}}neysu and
                  Christof Paar and
                  Wayne P. Burleson},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel
                  Engineering},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {382--395},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_27},
  doi          = {10.1007/978-3-642-04138-9\_27},
  timestamp    = {Mon, 06 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LinKGPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaesTV09,
  author       = {Roel Maes and
                  Pim Tuyls and
                  Ingrid Verbauwhede},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Low-Overhead Implementation of a Soft Decision Helper Data Algorithm
                  for {SRAM} PUFs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {332--347},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_24},
  doi          = {10.1007/978-3-642-04138-9\_24},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MaesTV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MarkettosM09,
  author       = {A. Theodore Markettos and
                  Simon W. Moore},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {The Frequency Injection Attack on Ring-Oscillator-Based True Random
                  Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {317--331},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_23},
  doi          = {10.1007/978-3-642-04138-9\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MarkettosM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MateusV09,
  author       = {Paulo Mateus and
                  Serge Vaudenay},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {On Tamper-Resistance from a Theoretical Viewpoint},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {411--428},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_29},
  doi          = {10.1007/978-3-642-04138-9\_29},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MateusV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MeloniH09,
  author       = {Nicolas M{\'{e}}loni and
                  M. Anwar Hasan},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and
                  Double Bases},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {304--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_22},
  doi          = {10.1007/978-3-642-04138-9\_22},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MeloniH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Paar09,
  author       = {Christof Paar},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Crypto Engineering: Some History and Some Case Studies},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {220--224},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_16},
  doi          = {10.1007/978-3-642-04138-9\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Paar09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ProuffM09,
  author       = {Emmanuel Prouff and
                  Robert P. McEvoy},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_7},
  doi          = {10.1007/978-3-642-04138-9\_7},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ProuffM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RegazzoniCSBKBLI09,
  author       = {Francesco Regazzoni and
                  Alessandro Cevrero and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  St{\'{e}}phane Badel and
                  Theo Kluter and
                  Philip Brisk and
                  Yusuf Leblebici and
                  Paolo Ienne},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {A Design Flow and Evaluation Framework for DPA-Resistant Instruction
                  Set Extensions},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_15},
  doi          = {10.1007/978-3-642-04138-9\_15},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RegazzoniCSBKBLI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RenauldSV09,
  author       = {Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Veyrat{-}Charvillon},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Algebraic Side-Channel Attacks on the {AES:} Why Time also Matters
                  in {DPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_8},
  doi          = {10.1007/978-3-642-04138-9\_8},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/RenauldSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Rivain09,
  author       = {Matthieu Rivain},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Differential Fault Analysis on {DES} Middle Rounds},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_32},
  doi          = {10.1007/978-3-642-04138-9\_32},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Rivain09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RivainPD09,
  author       = {Matthieu Rivain and
                  Emmanuel Prouff and
                  Julien Doget},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Higher-Order Masking and Shuffling for Software Implementations of
                  Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_13},
  doi          = {10.1007/978-3-642-04138-9\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RivainPD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SaekiSSS09,
  author       = {Minoru Saeki and
                  Daisuke Suzuki and
                  Koichi Shimizu and
                  Akashi Satoh},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {A Design Methodology for a DPA-Resistant Cryptographic {LSI} with
                  {RSL} Techniques},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_14},
  doi          = {10.1007/978-3-642-04138-9\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SaekiSSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TorranceJ09,
  author       = {Randy Torrance and
                  Dick James},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {The State-of-the-Art in {IC} Reverse Engineering},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {363--381},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_26},
  doi          = {10.1007/978-3-642-04138-9\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TorranceJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Veyrat-CharvillonS09,
  author       = {Nicolas Veyrat{-}Charvillon and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Mutual Information Analysis: How, When and Why?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9\_30},
  doi          = {10.1007/978-3-642-04138-9\_30},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Veyrat-CharvillonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2009,
  editor       = {Christophe Clavier and
                  Kris Gaj},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2009, 11th International
                  Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5747},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04138-9},
  doi          = {10.1007/978-3-642-04138-9},
  isbn         = {978-3-642-04137-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BaddamZ08,
  author       = {Karthik Baddam and
                  Mark Zwolinski},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Divided Backend Duplication Methodology for Balanced Dual Rail Routing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {396--410},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_25},
  doi          = {10.1007/978-3-540-85053-3\_25},
  timestamp    = {Thu, 14 Oct 2021 10:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BaddamZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BernsteinLF08,
  author       = {Daniel J. Bernstein and
                  Tanja Lange and
                  Reza Rezaeian Farashahi},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Binary Edwards Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {244--265},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_16},
  doi          = {10.1007/978-3-540-85053-3\_16},
  timestamp    = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BernsteinLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BerzatiCG08,
  author       = {Alexandre Berzati and
                  C{\'{e}}cile Canovas and
                  Louis Goubin},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Perturbating {RSA} Public Keys: An Improved Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {380--395},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_24},
  doi          = {10.1007/978-3-540-85053-3\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BerzatiCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Bogdanov08,
  author       = {Andrey Bogdanov},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Multiple-Differential Side-Channel Collision Attacks on {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_3},
  doi          = {10.1007/978-3-540-85053-3\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Bogdanov08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovERW08,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Andy Rupp and
                  Christopher Wolf},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement
                  for Elliptic Curves?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {45--61},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_4},
  doi          = {10.1007/978-3-540-85053-3\_4},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovERW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08,
  author       = {Andrey Bogdanov and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Hash Functions and {RFID} Tags: Mind the Gap},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {283--299},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_18},
  doi          = {10.1007/978-3-540-85053-3\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BoschGSST08,
  author       = {Christoph B{\"{o}}sch and
                  Jorge Guajardo and
                  Ahmad{-}Reza Sadeghi and
                  Jamshid Shokrollahi and
                  Pim Tuyls},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Efficient Helper Data Key Extractor on FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_12},
  doi          = {10.1007/978-3-540-85053-3\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BoschGSST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Brickell08,
  author       = {Ernie Brickell},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Vision for Platform Security},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {444},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_29},
  doi          = {10.1007/978-3-540-85053-3\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Brickell08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronGPR08,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Christophe Giraud and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Attack and Improvement of a Secure S-Box Calculation Based on the
                  Fourier Transform},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_1},
  doi          = {10.1007/978-3-540-85053-3\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronGPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueRVD08,
  author       = {Pierre{-}Alain Fouque and
                  Denis R{\'{e}}al and
                  Fr{\'{e}}d{\'{e}}ric Valette and
                  M'hamed Drissi},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {The Carry Leakage on the Randomized Exponent Countermeasure},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {198--213},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_13},
  doi          = {10.1007/978-3-540-85053-3\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueRVD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GendrullisNR08,
  author       = {Timo Gendrullis and
                  Martin Novotn{\'{y}} and
                  Andy Rupp},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Real-World Attack Breaking {A5/1} within Hours},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {266--282},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_17},
  doi          = {10.1007/978-3-540-85053-3\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GendrullisNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsBTP08,
  author       = {Benedikt Gierlichs and
                  Lejla Batina and
                  Pim Tuyls and
                  Bart Preneel},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Mutual Information Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {426--442},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_27},
  doi          = {10.1007/978-3-540-85053-3\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsBTP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrabherGP08,
  author       = {Philipp Grabher and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Dan Page},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {331--345},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_21},
  doi          = {10.1007/978-3-540-85053-3\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrabherGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuneysuP08,
  author       = {Tim G{\"{u}}neysu and
                  Christof Paar},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Ultra High Performance {ECC} over {NIST} Primes on Commercial FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {62--78},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_5},
  doi          = {10.1007/978-3-540-85053-3\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuneysuP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HommaMASS08,
  author       = {Naofumi Homma and
                  Atsushi Miyamoto and
                  Takafumi Aoki and
                  Akashi Satoh and
                  Adi Shamir},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Collision-Based Power Analysis of Modular Exponentiation Using Chosen-Message
                  Pairs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_2},
  doi          = {10.1007/978-3-540-85053-3\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HommaMASS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterSP08,
  author       = {Michael Hutter and
                  J{\"{o}}rn{-}Marc Schmidt and
                  Thomas Plos},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {{RFID} and Its Vulnerability to Faults},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {363--379},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_23},
  doi          = {10.1007/978-3-540-85053-3\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterSP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KermaniR08,
  author       = {Mehran Mozaffari Kermani and
                  Arash Reyhani{-}Masoleh},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Lightweight Concurrent Fault Detection Scheme for the {AES} S-Boxes
                  Using Normal Basis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {113--129},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_8},
  doi          = {10.1007/978-3-540-85053-3\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KermaniR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KillmannS08,
  author       = {Wolfgang Killmann and
                  Werner Schindler},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Design for a Physical {RNG} with Robust Entropy Estimators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_10},
  doi          = {10.1007/978-3-540-85053-3\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KillmannS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MentensGV08,
  author       = {Nele Mentens and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {346--362},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_22},
  doi          = {10.1007/978-3-540-85053-3\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MentensGV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Reyhani-Masoleh08,
  author       = {Arash Reyhani{-}Masoleh},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A New Bit-Serial Architecture for Field Multiplication Using Polynomial
                  Bases},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {300--314},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_19},
  doi          = {10.1007/978-3-540-85053-3\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Reyhani-Masoleh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SatohSHA08,
  author       = {Akashi Satoh and
                  Takeshi Sugawara and
                  Naofumi Homma and
                  Takafumi Aoki},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {High-Performance Concurrent Error Detection Scheme for {AES} Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_7},
  doi          = {10.1007/978-3-540-85053-3\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SatohSHA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Shamir08,
  author       = {Adi Shamir},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {RSA-Past, Present, Future},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {443},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_28},
  doi          = {10.1007/978-3-540-85053-3\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Shamir08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertA08,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  C{\'{e}}dric Archambeau},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Using Subspace-Based Template Attacks to Compare and Combine Power
                  and Electromagnetic Information Leakages},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {411--425},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_26},
  doi          = {10.1007/978-3-540-85053-3\_26},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SzerwinskiG08,
  author       = {Robert Szerwinski and
                  Tim G{\"{u}}neysu},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Exploiting the Power of GPUs for Asymmetric Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {79--99},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_6},
  doi          = {10.1007/978-3-540-85053-3\_6},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SzerwinskiG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TillichH08,
  author       = {Stefan Tillich and
                  Christoph Herbst},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Attacking State-of-the-Art Software Countermeasures-A Case Study for
                  {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_15},
  doi          = {10.1007/978-3-540-85053-3\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TillichH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/VasyltsovHKK08,
  author       = {Ihor V. Vasyltsov and
                  Eduard Hambardzumyan and
                  Young{-}Sik Kim and
                  Bohdan Karpinskyy},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Fast Digital {TRNG} Based on Metastable Ring Oscillator},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_11},
  doi          = {10.1007/978-3-540-85053-3\_11},
  timestamp    = {Fri, 12 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/VasyltsovHKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Vigilant08,
  author       = {David Vigilant},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {{RSA} with {CRT:} {A} New Cost-Effective Solution to Thwart Fault
                  Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_9},
  doi          = {10.1007/978-3-540-85053-3\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Vigilant08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter08,
  author       = {Colin D. Walter},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Recovering Secret Keys from Weak Side Channel Traces of Differing
                  Lengths},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_14},
  doi          = {10.1007/978-3-540-85053-3\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YamamotoYI08,
  author       = {Dai Yamamoto and
                  Jun Yajima and
                  Kouichi Itoh},
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {A Very Compact Hardware Implementation of the {MISTY1} Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  pages        = {315--330},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3\_20},
  doi          = {10.1007/978-3-540-85053-3\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YamamotoYI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2008,
  editor       = {Elisabeth Oswald and
                  Pankaj Rohatgi},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International
                  Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85053-3},
  doi          = {10.1007/978-3-540-85053-3},
  isbn         = {978-3-540-85052-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BeuchatBDO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Arithmetic Operators for Pairing-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {239--255},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_17},
  doi          = {10.1007/978-3-540-74735-2\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BeuchatBDO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BiryukovBKK07,
  author       = {Alex Biryukov and
                  Andrey Bogdanov and
                  Dmitry Khovratovich and
                  Timo Kasper},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Collision Attacks on AES-Based {MAC:} Alpha-MAC},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_12},
  doi          = {10.1007/978-3-540-74735-2\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BiryukovBKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BiryukovK07,
  author       = {Alex Biryukov and
                  Dmitry Khovratovich},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Two New Techniques of Side-Channel Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {195--208},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_14},
  doi          = {10.1007/978-3-540-74735-2\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BiryukovK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovER07,
  author       = {Andrey Bogdanov and
                  Thomas Eisenbarth and
                  Andy Rupp},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {A Hardware-Assisted Realtime Attack on {A5/2} Without Precomputations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {394--412},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_27},
  doi          = {10.1007/978-3-540-74735-2\_27},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovER07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07,
  author       = {Andrey Bogdanov and
                  Lars R. Knudsen and
                  Gregor Leander and
                  Christof Paar and
                  Axel Poschmann and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  C. Vikkelsoe},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{PRESENT:} An Ultra-Lightweight Block Cipher},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {450--466},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_31},
  doi          = {10.1007/978-3-540-74735-2\_31},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Clavier07,
  author       = {Christophe Clavier},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Secret External Encodings Do Not Prevent Transient Fault Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {181--194},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_13},
  doi          = {10.1007/978-3-540-74735-2\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Clavier07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClavierC07,
  author       = {Christophe Clavier and
                  Jean{-}S{\'{e}}bastien Coron},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {On the Implementation of a Fast Prime Generation Algorithm},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {443--449},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_30},
  doi          = {10.1007/978-3-540-74735-2\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ClavierC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronPR07,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Side Channel Cryptanalysis of a Higher Order Masking Scheme},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {28--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_3},
  doi          = {10.1007/978-3-540-74735-2\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DeJeanK07,
  author       = {Gerald DeJean and
                  Darko Kirovski},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{RF-DNA:} Radio-Frequency Certificates of Authenticity},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {346--363},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_24},
  doi          = {10.1007/978-3-540-74735-2\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DeJeanK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DichtlG07,
  author       = {Markus Dichtl and
                  Jovan Dj. Golic},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {High-Speed True Random Number Generation with Logic Gates Only},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {45--62},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_4},
  doi          = {10.1007/978-3-540-74735-2\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DichtlG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DormaleBQ07,
  author       = {Guerric Meurice de Dormale and
                  Philippe Bulens and
                  Jean{-}Jacques Quisquater},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Collision Search for Elliptic Curve Discrete Logarithm over GF(2\({}^{\mbox{
                  \emph{m} }}\)) with {FPGA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {378--393},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_26},
  doi          = {10.1007/978-3-540-74735-2\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DormaleBQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ElbazCLTSG07,
  author       = {Reouven Elbaz and
                  David Champagne and
                  Ruby B. Lee and
                  Lionel Torres and
                  Gilles Sassatelli and
                  Pierre Guillemin},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {TEC-Tree: {A} Low-Cost, Parallelizable Tree for Efficient Defense
                  Against Memory Replay Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {289--302},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_20},
  doi          = {10.1007/978-3-540-74735-2\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ElbazCLTSG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Gierlichs07,
  author       = {Benedikt Gierlichs},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {DPA-Resistance Without Routing Constraints?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {107--120},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_8},
  doi          = {10.1007/978-3-540-74735-2\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Gierlichs07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuajardoKST07,
  author       = {Jorge Guajardo and
                  Sandeep S. Kumar and
                  Geert Jan Schrijen and
                  Pim Tuyls},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{FPGA} Intrinsic PUFs and Their Use for {IP} Protection},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_5},
  doi          = {10.1007/978-3-540-74735-2\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuajardoKST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HarrisonW07,
  author       = {Owen Harrison and
                  John Waldron},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{AES} Encryption Implementation and Analysis on Commodity Graphics
                  Processing Units},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {209--226},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_15},
  doi          = {10.1007/978-3-540-74735-2\_15},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/HarrisonW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HutterMF07,
  author       = {Michael Hutter and
                  Stefan Mangard and
                  Martin Feldhofer},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Power and {EM} Attacks on Passive 13.56 MHz {RFID} Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_22},
  doi          = {10.1007/978-3-540-74735-2\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HutterMF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/IzuKS07,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Shimoyama},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{CAIRN} 2: An {FPGA} Implementation of the Sieving Step in the Number
                  Field Sieve Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {364--377},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_25},
  doi          = {10.1007/978-3-540-74735-2\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/IzuKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Jaffe07,
  author       = {Joshua Jaffe},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {A First-Order {DPA} Attack Against {AES} in Counter Mode with Unknown
                  Initial Counter},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_1},
  doi          = {10.1007/978-3-540-74735-2\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Jaffe07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JarvinenFS07,
  author       = {Kimmo U. J{\"{a}}rvinen and
                  Juha Forsten and
                  Jorma Skytt{\"{a}}},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{FPGA} Design of Self-certified Signature Verification on Koblitz
                  Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {256--271},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_18},
  doi          = {10.1007/978-3-540-74735-2\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JarvinenFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Joye07,
  author       = {Marc Joye},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Highly Regular Right-to-Left Algorithms for Scalar Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {135--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_10},
  doi          = {10.1007/978-3-540-74735-2\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Joye07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Lemke-RustP07,
  author       = {Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Gaussian Mixture Models for Higher-Order Side Channel Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_2},
  doi          = {10.1007/978-3-540-74735-2\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Lemke-RustP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LemsitzerWFB07,
  author       = {Stefan Lemsitzer and
                  Johannes Wolkerstorfer and
                  Norbert Felber and
                  Matthias Braendli},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Multi-gigabit {GCM-AES} Architecture Optimized for FPGAs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {227--238},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_16},
  doi          = {10.1007/978-3-540-74735-2\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LemsitzerWFB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MaceSQ07,
  author       = {Fran{\c{c}}ois Mac{\'{e}} and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_29},
  doi          = {10.1007/978-3-540-74735-2\_29},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MaceSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MatsuiN07,
  author       = {Mitsuru Matsui and
                  Junko Nakajima},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {On the Power of Bitslice Implementation on Intel Core2 Processor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {121--134},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_9},
  doi          = {10.1007/978-3-540-74735-2\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MatsuiN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppKZM07,
  author       = {Thomas Popp and
                  Mario Kirschbaum and
                  Thomas Zefferer and
                  Stefan Mangard},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Evaluation of the Masked Logic Style {MDPL} on a Prototype Chip},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_6},
  doi          = {10.1007/978-3-540-74735-2\_6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppKZM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/RobissonM07,
  author       = {Bruno Robisson and
                  Pascal Manet},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Differential Behavioral Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {413--426},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_28},
  doi          = {10.1007/978-3-540-74735-2\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/RobissonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SavryPDRR07,
  author       = {Olivier Savry and
                  Florian Pebay{-}Peyroula and
                  Fran{\c{c}}ois Dehmas and
                  G{\'{e}}rard Robert and
                  Jacques Reverdy},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{RFID} Noisy Reader How to Prevent from Eavesdropping on the Communication?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {334--345},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_23},
  doi          = {10.1007/978-3-540-74735-2\_23},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SavryPDRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchaumontT07,
  author       = {Patrick Schaumont and
                  Kris Tiri},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Masking and Dual-Rail Logic Don't Add Up},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_7},
  doi          = {10.1007/978-3-540-74735-2\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchaumontT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Suzuki07,
  author       = {Daisuke Suzuki},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {How to Maximize the Potential of {FPGA} Resources for Modular Exponentiation},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {272--288},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_19},
  doi          = {10.1007/978-3-540-74735-2\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Suzuki07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TillichG07,
  author       = {Stefan Tillich and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Power Analysis Resistant {AES} Implementation with Instruction Set
                  Extensions},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {303--319},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_21},
  doi          = {10.1007/978-3-540-74735-2\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TillichG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YoshidaWOKWKP07,
  author       = {Hirotaka Yoshida and
                  Dai Watanabe and
                  Katsuyuki Okeya and
                  Jun Kitahara and
                  Hongjun Wu and
                  {\"{O}}zg{\"{u}}l K{\"{u}}{\c{c}}{\"{u}}k and
                  Bart Preneel},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{MAME:} {A} Compression Function with Reduced Hardware Requirements},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {148--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_11},
  doi          = {10.1007/978-3-540-74735-2\_11},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/YoshidaWOKWKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2007,
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2},
  doi          = {10.1007/978-3-540-74735-2},
  isbn         = {978-3-540-74734-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AkishitaKK06,
  author       = {Toru Akishita and
                  Masanobu Katagi and
                  Izuru Kitamura},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {SPA-Resistant Scalar Multiplication on Hyperelliptic Curve Cryptosystems
                  Combining Divisor Decomposition Technique and Joint Regular Form},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_12},
  doi          = {10.1007/11894063\_12},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AkishitaKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Aoki06,
  author       = {Kazumaro Aoki},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Integer Factoring Utilizing {PC} Cluster},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {60},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_5},
  doi          = {10.1007/11894063\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Aoki06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ArchambeauPSQ06,
  author       = {C{\'{e}}dric Archambeau and
                  Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Template Attacks in Principal Subspaces},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_1},
  doi          = {10.1007/11894063\_1},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ArchambeauPSQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BonneauM06,
  author       = {Joseph Bonneau and
                  Ilya Mironov},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Cache-Collision Timing Attacks Against {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_16},
  doi          = {10.1007/11894063\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BonneauM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BouesseSR06,
  author       = {G. Fraidy Bouesse and
                  Gilles Sicard and
                  Marc Renaudin},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Path Swapping Method to Improve {DPA} Resistance of Quasi Delay Insensitive
                  Asynchronous Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {384--398},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_30},
  doi          = {10.1007/11894063\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BouesseSR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrierCCC06,
  author       = {Eric Brier and
                  Beno{\^{\i}}t Chevallier{-}Mames and
                  Mathieu Ciet and
                  Christophe Clavier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Why One Should Also Secure {RSA} Public Key Elements},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_26},
  doi          = {10.1007/11894063\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrierCCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BucciGLT06,
  author       = {Marco Bucci and
                  Luca Giancane and
                  Raimondo Luzzi and
                  Alessandro Trifiletti},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Three-Phase Dual-Rail Pre-charge Logic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {232--241},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_19},
  doi          = {10.1007/11894063\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BucciGLT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChavesKSV06,
  author       = {Ricardo Chaves and
                  Georgi Kuzmanov and
                  Leonel Sousa and
                  Stamatis Vassiliadis},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Improving {SHA-2} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {298--310},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_24},
  doi          = {10.1007/11894063\_24},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ChavesKSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChenZ06,
  author       = {Zhimin Chen and
                  Yujie Zhou},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Dual-Rail Random Switching Logic: {A} Countermeasure to Reduce Side
                  Channel Leakage},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {242--254},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_20},
  doi          = {10.1007/11894063\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChenZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DimitrovJJCH06,
  author       = {Vassil S. Dimitrov and
                  Kimmo U. J{\"{a}}rvinen and
                  Michael J. Jacobson Jr. and
                  W. F. Chan and
                  Zhun Huang},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {{FPGA} Implementation of Point Multiplication on Koblitz Curves Using
                  Kleinian Integers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {445--459},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_35},
  doi          = {10.1007/11894063\_35},
  timestamp    = {Tue, 28 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/DimitrovJJCH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueKMMV06,
  author       = {Pierre{-}Alain Fouque and
                  S{\'{e}}bastien Kunz{-}Jacques and
                  Gwena{\"{e}}lle Martinet and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Power Attack on Small {RSA} Public Exponent},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_27},
  doi          = {10.1007/11894063\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueKMMV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GajKBKLKB06,
  author       = {Kris Gaj and
                  Soonhak Kwon and
                  Patrick Baier and
                  Paul Kohlbrenner and
                  Hoang Le and
                  Mohammed Khaleeluddin and
                  Ramakrishna Bachimanchi},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Implementing the Elliptic Curve Method of Factoring in Reconfigurable
                  Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_10},
  doi          = {10.1007/11894063\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GajKBKLKB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GierlichsLP06,
  author       = {Benedikt Gierlichs and
                  Kerstin Lemke{-}Rust and
                  Christof Paar},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Templates vs. Stochastic Methods},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_2},
  doi          = {10.1007/11894063\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GierlichsLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HommaNIAS06,
  author       = {Naofumi Homma and
                  Sei Nagashima and
                  Yuichi Imai and
                  Takafumi Aoki and
                  Akashi Satoh},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {High-Resolution Side-Channel Attack Using Phase-Based Waveform Matching},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_15},
  doi          = {10.1007/11894063\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HommaNIAS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HongSHLLKLCLJKKC06,
  author       = {Deukjo Hong and
                  Jaechul Sung and
                  Seokhie Hong and
                  Jongin Lim and
                  Sangjin Lee and
                  Bonseok Koo and
                  Changhoon Lee and
                  Donghoon Chang and
                  Jesang Lee and
                  Kitae Jeong and
                  Hyun Kim and
                  Jongsung Kim and
                  Seongtaek Chee},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {{HIGHT:} {A} New Block Cipher Suitable for Low-Resource Device},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_4},
  doi          = {10.1007/11894063\_4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HongSHLLKLCLJKKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP06,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Fast Generation of Prime Numbers on Portable Devices: An Update},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_13},
  doi          = {10.1007/11894063\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Juels06,
  author       = {Ari Juels},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {The Outer Limits of {RFID} Security},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {231},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_18},
  doi          = {10.1007/11894063\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Juels06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KoschuchLWGSTW06,
  author       = {Manuel Koschuch and
                  Joachim Lechner and
                  Andreas Weitzer and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Alexander Szekely and
                  Stefan Tillich and
                  Johannes Wolkerstorfer},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051
                  Microcontroller},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {430--444},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_34},
  doi          = {10.1007/11894063\_34},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KoschuchLWGSTW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KulikowskiST06,
  author       = {Konrad J. Kulikowski and
                  Alexander B. Smirnov and
                  Alexander Taubin},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel
                  Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {399--413},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_31},
  doi          = {10.1007/11894063\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KulikowskiST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KumarPPPS06,
  author       = {Sandeep S. Kumar and
                  Christof Paar and
                  Jan Pelzl and
                  Gerd Pfeiffer and
                  Manfred Schimmler},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Breaking Ciphers with {COPACOBANA} - {A} Cost-Optimized Parallel Code
                  Breaker},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {101--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_9},
  doi          = {10.1007/11894063\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KumarPPPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeCCRSL06,
  author       = {Thanh{-}Ha Le and
                  Jessy Cl{\'{e}}di{\`{e}}re and
                  C{\'{e}}cile Canovas and
                  Bruno Robisson and
                  Christine Servi{\`{e}}re and
                  Jean{-}Louis Lacoume},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {A Proposition for Correlation Power Analysis Enhancement},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_14},
  doi          = {10.1007/11894063\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeCCRSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MangardS06,
  author       = {Stefan Mangard and
                  Kai Schramm},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Pinpointing the Side-Channel Leakage of Masked {AES} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {76--90},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_7},
  doi          = {10.1007/11894063\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MangardS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MasoumiRA06,
  author       = {Massoud Masoumi and
                  Farshid Raissi and
                  Mahmoud Ahmadian},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {NanoCMOS-Molecular Realization of Rijndael},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_23},
  doi          = {10.1007/11894063\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MasoumiRA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiSS06,
  author       = {Amir Moradi and
                  Mohammad T. Manzuri Shalmani and
                  Mahmoud Salmasizadeh},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {A Generalized Method of Differential Fault Attack Against {AES} Cryptosystem},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {91--100},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_8},
  doi          = {10.1007/11894063\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ProuffGA06,
  author       = {Emmanuel Prouff and
                  Christophe Giraud and
                  S{\'{e}}bastien Aum{\^{o}}nier},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Provably Secure S-Box Implementation Based on Fourier Transform},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {216--230},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_17},
  doi          = {10.1007/11894063\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ProuffGA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Sadeghi06,
  author       = {Ahmad{-}Reza Sadeghi},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Challenges for Trusted Computing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {414},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_32},
  doi          = {10.1007/11894063\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Sadeghi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SakiyamaBPV06,
  author       = {Kazuo Sakiyama and
                  Lejla Batina and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Superscalar Coprocessor for High-Speed Curve-Based Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {415--429},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_33},
  doi          = {10.1007/11894063\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SakiyamaBPV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ScottCA06,
  author       = {Michael Scott and
                  Neil Costigan and
                  Wesam Abdulwahab},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Implementing Cryptographic Pairings on Smartcards},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_11},
  doi          = {10.1007/11894063\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ScottCA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SimpsonS06,
  author       = {Eric Simpson and
                  Patrick Schaumont},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Offline Hardware/Software Authentication for Reconfigurable Platforms},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {311--323},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_25},
  doi          = {10.1007/11894063\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SimpsonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Skorobogatov06,
  author       = {Sergei P. Skorobogatov},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Optically Enhanced Position-Locked Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_6},
  doi          = {10.1007/11894063\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Skorobogatov06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertPAQ06,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Eric Peeters and
                  C{\'{e}}dric Archambeau and
                  Jean{-}Jacques Quisquater},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Towards Security Limits in Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {30--45},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_3},
  doi          = {10.1007/11894063\_3},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertPAQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StebilaT06,
  author       = {Douglas Stebila and
                  Nicolas Th{\'{e}}riault},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Unified Point Addition Formul{\ae} and Side-Channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {354--368},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_28},
  doi          = {10.1007/11894063\_28},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/StebilaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SuzukiS06,
  author       = {Daisuke Suzuki and
                  Minoru Saeki},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Security Evaluation of {DPA} Countermeasures Using Dual-Rail Pre-charge
                  Logic Style},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_21},
  doi          = {10.1007/11894063\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SuzukiS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TillichG06,
  author       = {Stefan Tillich and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Instruction Set Extensions for Efficient {AES} Implementation on 32-bit
                  Processors},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {270--284},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_22},
  doi          = {10.1007/11894063\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TillichG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TuylsSSGVW06,
  author       = {Pim Tuyls and
                  Geert Jan Schrijen and
                  Boris Skoric and
                  Jan van Geloven and
                  Nynke Verhaegh and
                  Rob Wolters},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Read-Proof Hardware from Protective Coatings},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {369--383},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_29},
  doi          = {10.1007/11894063\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TuylsSSGVW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2006,
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063},
  doi          = {10.1007/11894063},
  isbn         = {3-540-46559-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AgrawalRRS05,
  author       = {Dakshi Agrawal and
                  Josyula R. Rao and
                  Pankaj Rohatgi and
                  Kai Schramm},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Templates as Master Keys},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_2},
  doi          = {10.1007/11545262\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalRRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BatinaHHPV05,
  author       = {Lejla Batina and
                  David Hwang and
                  Alireza Hodjat and
                  Bart Preneel and
                  Ingrid Verbauwhede},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Hardware/Software Co-design for Hyperelliptic Curve Cryptography {(HECC)}
                  on the 8051{\(\mathrm{\mu}\)}P},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_8},
  doi          = {10.1007/11545262\_8},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BatinaHHPV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BucciL05,
  author       = {Marco Bucci and
                  Raimondo Luzzi},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Design of Testable Random Bit Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {147--156},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_11},
  doi          = {10.1007/11545262\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BucciL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Canright05,
  author       = {David Canright},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A Very Compact S-Box for {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {441--455},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_32},
  doi          = {10.1007/11545262\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Canright05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronLP05,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Lefranc and
                  Guillaume Poupard},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_4},
  doi          = {10.1007/11545262\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/DupuyK05,
  author       = {William Dupuy and
                  S{\'{e}}bastien Kunz{-}Jacques},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Resistance of Randomized Projective Coordinates Against Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_1},
  doi          = {10.1007/11545262\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/DupuyK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FischerG05,
  author       = {Wieland Fischer and
                  Berndt M. Gammel},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Masking at Gate Level in the Presence of Glitches},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_14},
  doi          = {10.1007/11545262\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FischerG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FrankeKPPPS05,
  author       = {Jens Franke and
                  Thorsten Kleinjung and
                  Christof Paar and
                  Jan Pelzl and
                  Christine Priplata and
                  Colin Stahlke},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{SHARK:} {A} Realizable Special Hardware Sieving Device for Factoring
                  1024-Bit Integers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_9},
  doi          = {10.1007/11545262\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FrankeKPPPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GebotysHT05,
  author       = {Catherine H. Gebotys and
                  Simon Ho and
                  C. C. Tiu},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{EM} Analysis of Rijndael and {ECC} on a Wireless Java-Based {PDA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {250--264},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_19},
  doi          = {10.1007/11545262\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GebotysHT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GeiselmannSST05,
  author       = {Willi Geiselmann and
                  Adi Shamir and
                  Rainer Steinwandt and
                  Eran Tromer},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Scalable Hardware for Sparse Systems of Linear Equations, with Applications
                  to Integer Factorization},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {131--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_10},
  doi          = {10.1007/11545262\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GeiselmannSST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GoodB05,
  author       = {Tim Good and
                  Mohammed Benaissa},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{AES} on {FPGA} from the Fastest to the Smallest},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {427--440},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_31},
  doi          = {10.1007/11545262\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GoodB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrabherP05,
  author       = {Philipp Grabher and
                  Dan Page},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Hardware Acceleration of the Tate Pairing in Characteristic Three},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_29},
  doi          = {10.1007/11545262\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrabherP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GreenNS05,
  author       = {P. J. Green and
                  Richard Noad and
                  Nigel P. Smart},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Further Hidden Markov Model Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_5},
  doi          = {10.1007/11545262\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GreenNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossschadlAST05,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Roberto Maria Avanzi and
                  Erkay Savas and
                  Stefan Tillich},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Energy-Efficient Software Implementation of Long Integer Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_6},
  doi          = {10.1007/11545262\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossschadlAST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuilleyHMP05,
  author       = {Sylvain Guilley and
                  Philippe Hoogvorst and
                  Yves Mathieu and
                  Renaud Pacalet},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {The "Backend Duplication" Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_28},
  doi          = {10.1007/11545262\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuilleyHMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hars05,
  author       = {Laszlo Hars},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Fast Truncated Multiplication for Cryptographic Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_16},
  doi          = {10.1007/11545262\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hars05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyePS05,
  author       = {Marc Joye and
                  Pascal Paillier and
                  Berry Schoenmakers},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {On Second-Order Differential Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_22},
  doi          = {10.1007/11545262\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyePS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KaiharaT05,
  author       = {Marcelo E. Kaihara and
                  Naofumi Takagi},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Bipartite Modular Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {201--210},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_15},
  doi          = {10.1007/11545262\_15},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KaiharaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KerinsMPB05,
  author       = {Tim Kerins and
                  William P. Marnane and
                  Emanuel M. Popovici and
                  Paulo S. L. M. Barreto},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Efficient Hardware for the Tate Pairing Calculation in Characteristic
                  Three},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_30},
  doi          = {10.1007/11545262\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KerinsMPB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Kuhn05,
  author       = {Markus G. Kuhn},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Security Limits for Compromising Emanations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {265--279},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_20},
  doi          = {10.1007/11545262\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Kuhn05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KuhnKLSS05,
  author       = {Ulrich K{\"{u}}hn and
                  Klaus Kursawe and
                  Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Secure Data Management in Trusted Computing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_24},
  doi          = {10.1007/11545262\_24},
  timestamp    = {Mon, 05 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/KuhnKLSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiMM05,
  author       = {Huiyun Li and
                  A. Theodore Markettos and
                  Simon W. Moore},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Security Evaluation Against Electromagnetic Analysis at Design Time},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_21},
  doi          = {10.1007/11545262\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MangardPO05,
  author       = {Stefan Mangard and
                  Norbert Pramstaller and
                  Elisabeth Oswald},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Successfully Attacking Masked {AES} Hardware Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_12},
  doi          = {10.1007/11545262\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MangardPO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OkeyaTV05,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Short Memory Scalar Multiplication on Koblitz Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_7},
  doi          = {10.1007/11545262\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OkeyaTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PeetersSDQ05,
  author       = {Eric Peeters and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Nicolas Donckers and
                  Jean{-}Jacques Quisquater},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Improved Higher-Order Side-Channel Attacks with {FPGA} Experiments},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_23},
  doi          = {10.1007/11545262\_23},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/PeetersSDQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PoppM05,
  author       = {Thomas Popp and
                  Stefan Mangard},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Masked Dual-Rail Pre-charge Logic: DPA-Resistance Without Routing
                  Constraints},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_13},
  doi          = {10.1007/11545262\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PoppM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchindlerLP05,
  author       = {Werner Schindler and
                  Kerstin Lemke and
                  Christof Paar},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {A Stochastic Model for Differential Side Channel Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {30--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_3},
  doi          = {10.1007/11545262\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SchindlerLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Seysen05,
  author       = {Martin Seysen},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Using an {RSA} Accelerator for Modular Inversion},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {226--236},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_17},
  doi          = {10.1007/11545262\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Seysen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Skorobogatov05,
  author       = {Sergei P. Skorobogatov},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Data Remanence in Flash Memory Devices},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_25},
  doi          = {10.1007/11545262\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Skorobogatov05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SunarC05,
  author       = {Berk Sunar and
                  David Cyganski},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Comparison of Bit and Word Level Algorithms for Evaluating Unstructured
                  Functions over Finite Rings},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {237--249},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_18},
  doi          = {10.1007/11545262\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SunarC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SuzukiSI05,
  author       = {Daisuke Suzuki and
                  Minoru Saeki and
                  Tetsuya Ichikawa},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {{DPA} Leakage Models for {CMOS} Logic Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {366--382},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_27},
  doi          = {10.1007/11545262\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SuzukiSI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TiriHHLYSV05,
  author       = {Kris Tiri and
                  David D. Hwang and
                  Alireza Hodjat and
                  Bo{-}Cheng Lai and
                  Shenglin Yang and
                  Patrick Schaumont and
                  Ingrid Verbauwhede},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Prototype {IC} with {WDDL} and Differential Routing - {DPA} Resistance
                  Assessment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {354--365},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_26},
  doi          = {10.1007/11545262\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TiriHHLYSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2005,
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262},
  doi          = {10.1007/11545262},
  isbn         = {3-540-28474-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AignerBHW04,
  author       = {Harald Aigner and
                  Holger Bock and
                  Markus H{\"{u}}tter and
                  Johannes Wolkerstorfer},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {A Low-Cost {ECC} Coprocessor for Smartcards},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_8},
  doi          = {10.1007/978-3-540-28632-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AignerBHW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Avanzi04,
  author       = {Roberto Maria Avanzi},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Aspects of Hyperelliptic Curves over Large Prime Fields in Software
                  Implementations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_11},
  doi          = {10.1007/978-3-540-28632-5\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Avanzi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BajardILT04,
  author       = {Jean{-}Claude Bajard and
                  Laurent Imbert and
                  Pierre{-}Yvan Liardet and
                  Yannick Teglia},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Leak Resistant Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {62--75},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_5},
  doi          = {10.1007/978-3-540-28632-5\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BajardILT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BockBL04,
  author       = {Holger Bock and
                  Marco Bucci and
                  Raimondo Luzzi},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {An Offset-Compensated Oscillator-Based Random Bit Source for Security
                  Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {268--281},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_20},
  doi          = {10.1007/978-3-540-28632-5\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BockBL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BrierCO04,
  author       = {Eric Brier and
                  Christophe Clavier and
                  Francis Olivier},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Correlation Power Analysis with a Leakage Model},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_2},
  doi          = {10.1007/978-3-540-28632-5\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BrierCO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesNPP04,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  David Naccache and
                  Pascal Paillier and
                  David Pointcheval},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {How to Disembed a Program?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {441--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_32},
  doi          = {10.1007/978-3-540-28632-5\_32},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesNPP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FeldhoferDW04,
  author       = {Martin Feldhofer and
                  Sandra Dominikus and
                  Johannes Wolkerstorfer},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Strong Authentication for {RFID} Systems Using the {AES} Algorithm},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {357--370},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_26},
  doi          = {10.1007/978-3-540-28632-5\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FeldhoferDW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueMPV04,
  author       = {Pierre{-}Alain Fouque and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Guillaume Poupard and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Defeating Countermeasures Based on Randomized {BSD} Representations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {312--327},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_23},
  doi          = {10.1007/978-3-540-28632-5\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueMPV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GiraultL04,
  author       = {Marc Girault and
                  David Lefranc},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Public Key Authentication with One (Online) Single Addition},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {413--427},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_30},
  doi          = {10.1007/978-3-540-28632-5\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GiraultL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GrossschadlS04,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Erkay Savas},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Instruction Set Extensions for Fast Arithmetic in Finite Fields {GF(}
                  p) and GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_10},
  doi          = {10.1007/978-3-540-28632-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GrossschadlS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuraPWES04,
  author       = {Nils Gura and
                  Arun Patel and
                  Arvinderpal Wander and
                  Hans Eberle and
                  Sheueling Chang Shantz},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Comparing Elliptic Curve Cryptography and {RSA} on 8-bit CPUs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_9},
  doi          = {10.1007/978-3-540-28632-5\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuraPWES04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hars04,
  author       = {Laszlo Hars},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Long Modular Multiplication for Cryptographic Applications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {45--61},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_4},
  doi          = {10.1007/978-3-540-28632-5\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hars04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Hemme04,
  author       = {Ludger Hemme},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {A Differential Fault Attack Against Early Rounds of (Triple-)DES},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {254--267},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_19},
  doi          = {10.1007/978-3-540-28632-5\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Hemme04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HochS04,
  author       = {Jonathan J. Hoch and
                  Adi Shamir},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Fault Analysis of Stream Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_18},
  doi          = {10.1007/978-3-540-28632-5\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HochS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoshiWK04,
  author       = {Nikhil Joshi and
                  Kaijie Wu and
                  Ramesh Karri},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Concurrent Error Detection Schemes for Involution Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {400--412},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_29},
  doi          = {10.1007/978-3-540-28632-5\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoshiWK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KwonGKH04,
  author       = {Soonhak Kwon and
                  Kris Gaj and
                  Chang Hoon Kim and
                  Chun Pyo Hong},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Linear Array for Multiplication in GF(2\({}^{\mbox{m}}\))
                  Using a Normal Basis for Elliptic Curve Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_6},
  doi          = {10.1007/978-3-540-28632-5\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KwonGKH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LeadbitterPS04,
  author       = {Peter James Leadbitter and
                  Dan Page and
                  Nigel P. Smart},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Attacking {DSA} Under a Repeated Bits Assumption},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {428--440},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_31},
  doi          = {10.1007/978-3-540-28632-5\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LeadbitterPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LedigMV04,
  author       = {Herv{\'{e}} Ledig and
                  Fr{\'{e}}d{\'{e}}ric Muller and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Enhancing Collision Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_13},
  doi          = {10.1007/978-3-540-28632-5\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LedigMV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LemkeSP04,
  author       = {Kerstin Lemke and
                  Kai Schramm and
                  Christof Paar},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {{DPA} on n-Bit Sized Boolean and Arithmetic Operations and Its Application
                  to IDEA, RC6, and the HMAC-Construction},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_15},
  doi          = {10.1007/978-3-540-28632-5\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LemkeSP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MamiyaMM04,
  author       = {Hideyo Mamiya and
                  Atsuko Miyaji and
                  Hiroaki Morimoto},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Efficient Countermeasures against RPA, DPA, and {SPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {343--356},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_25},
  doi          = {10.1007/978-3-540-28632-5\_25},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MamiyaMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Mishra04,
  author       = {Pradeep Kumar Mishra},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {328--342},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_24},
  doi          = {10.1007/978-3-540-28632-5\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Mishra04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/NeisseP04,
  author       = {Olaf Nei{\ss}e and
                  J{\"{u}}rgen Pulkus},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Switching Blindings with a View Towards {IDEA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {230--239},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_17},
  doi          = {10.1007/978-3-540-28632-5\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/NeisseP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Olson04,
  author       = {Loren D. Olson},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Side-Channel Attacks in {ECC:} {A} General Technique for Varying the
                  Parametrization of the Elliptic Curve},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {220--229},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_16},
  doi          = {10.1007/978-3-540-28632-5\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Olson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OzturkSS04,
  author       = {Erdin{\c{c}} {\"{O}}zt{\"{u}}rk and
                  Berk Sunar and
                  Erkay Savas},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_7},
  doi          = {10.1007/978-3-540-28632-5\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OzturkSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PeetersNC04,
  author       = {Eric Peeters and
                  Michael Neve and
                  Mathieu Ciet},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {{XTR} Implementation on Reconfigurable Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {386--399},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_28},
  doi          = {10.1007/978-3-540-28632-5\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PeetersNC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SakaiS04,
  author       = {Yasuyuki Sakai and
                  Kouichi Sakurai},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {A New Attack with Side Channel Leakage During Exponent Recoding Computations},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {298--311},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_22},
  doi          = {10.1007/978-3-540-28632-5\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SakaiS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SchrammLFP04,
  author       = {Kai Schramm and
                  Gregor Leander and
                  Patrick Felke and
                  Christof Paar},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {A Collision-Attack on {AES:} Combining Side Channel- and Differential-Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {163--175},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_12},
  doi          = {10.1007/978-3-540-28632-5\_12},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/SchrammLFP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SokolovMBY04,
  author       = {Danil Sokolov and
                  Julian P. Murphy and
                  Alexandre V. Bystrov and
                  Alexandre Yakovlev},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Improving the Security of Dual-Rail Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {282--297},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_21},
  doi          = {10.1007/978-3-540-28632-5\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SokolovMBY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertOP04,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Siddika Berna {\"{O}}rs and
                  Bart Preneel},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Power Analysis of an {FPGA:} Implementation of Rijndael: Is Pipelining
                  a {DPA} Countermeasure?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_3},
  doi          = {10.1007/978-3-540-28632-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertOP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/WaddleW04,
  author       = {Jason Waddle and
                  David A. Wagner},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Towards Efficient Second-Order Power Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_1},
  doi          = {10.1007/978-3-540-28632-5\_1},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/WaddleW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Walter04,
  author       = {Colin D. Walter},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Simple Power Analysis of Unified Code for {ECC} Double and Add},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_14},
  doi          = {10.1007/978-3-540-28632-5\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Walter04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YangCC04,
  author       = {Bo{-}Yin Yang and
                  Jiun{-}Ming Chen and
                  Yen{-}Hung Chen},
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {{TTS:} High-Speed Signatures on a Low-Cost Smart Card},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  pages        = {371--385},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28632-5\_27},
  doi          = {10.1007/978-3-540-28632-5\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YangCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2004,
  editor       = {Marc Joye and
                  Jean{-}Jacques Quisquater},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2004: 6th International
                  Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3156},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99451},
  doi          = {10.1007/B99451},
  isbn         = {3-540-22666-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AgrawalRR03,
  author       = {Dakshi Agrawal and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Multi-channel Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {2--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_2},
  doi          = {10.1007/978-3-540-45238-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalRR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Avanzi03,
  author       = {Roberto Maria Avanzi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Countermeasures against Differential Power Analysis for Hyperelliptic
                  Curve Cryptosystems},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {366--381},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_29},
  doi          = {10.1007/978-3-540-45238-6\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Avanzi03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BarakST03,
  author       = {Boaz Barak and
                  Ronen Shaltiel and
                  Eran Tromer},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {True Random Number Generators Secure in a Changing Environment},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_14},
  doi          = {10.1007/978-3-540-45238-6\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BarakST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CathaloKQ03,
  author       = {Julien Cathalo and
                  Fran{\c{c}}ois Koeune and
                  Jean{-}Jacques Quisquater},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A New Type of Timing Attack: Application to {GPS}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_24},
  doi          = {10.1007/978-3-540-45238-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CathaloKQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Chevallier-MamesJP03,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Faster Double-Size Modular Multiplication from Euclidean Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10931455\_18},
  doi          = {10.1007/10931455\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Chevallier-MamesJP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChodowiecG03,
  author       = {Pawel Chodowiec and
                  Kris Gaj},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Very Compact {FPGA} Implementation of the {AES} Algorithm},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {319--333},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_26},
  doi          = {10.1007/978-3-540-45238-6\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChodowiecG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Clulow03,
  author       = {Jolyon Clulow},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {On the Security of PKCS{\#}11},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {411--425},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_32},
  doi          = {10.1007/978-3-540-45238-6\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Clulow03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CoronT03,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  Alexei Tchulkine},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A New Algorithm for Switching from Arithmetic to Boolean Masking},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {89--97},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_8},
  doi          = {10.1007/978-3-540-45238-6\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CoronT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Dhem03,
  author       = {Jean{-}Fran{\c{c}}ois Dhem},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Modular Reduction Algorithm in IF\({}_{\mbox{q}}\)[x] and
                  Its Application to "Left to Right" Modular Multiplication in IF\({}_{\mbox{2}}\)[x]},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_17},
  doi          = {10.1007/978-3-540-45238-6\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Dhem03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Dichtl03,
  author       = {Markus Dichtl},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {How to Predict the Output of a Hardware Random Number Generator},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {181--188},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_15},
  doi          = {10.1007/978-3-540-45238-6\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Dichtl03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/EpsteinHKRZ03,
  author       = {Michael Epstein and
                  Laszlo Hars and
                  Raymond Krasinski and
                  Martin Rosner and
                  Hao Zheng},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Design and Implementation of a True Random Number Generator Based
                  on Digital Circuit Artifacts},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_13},
  doi          = {10.1007/978-3-540-45238-6\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/EpsteinHKRZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueMP03,
  author       = {Pierre{-}Alain Fouque and
                  Gwena{\"{e}}lle Martinet and
                  Guillaume Poupard},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Attacking Unbalanced {RSA-CRT} Using {SPA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {254--268},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_21},
  doi          = {10.1007/978-3-540-45238-6\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FouqueV03,
  author       = {Pierre{-}Alain Fouque and
                  Fr{\'{e}}d{\'{e}}ric Valette},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {The Doubling Attack - \emph{Why Upwards Is Better than Downwards}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {269--280},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_22},
  doi          = {10.1007/978-3-540-45238-6\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/FouqueV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FournierMLMT03,
  author       = {Jacques J. A. Fournier and
                  Simon W. Moore and
                  Huiyun Li and
                  Robert D. Mullins and
                  George S. Taylor},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Security Evaluation of Asynchronous Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_12},
  doi          = {10.1007/978-3-540-45238-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FournierMLMT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GeiselmannS03,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Hardware to Solve Sparse Systems of Linear Equations over {GF(2)}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {51--61},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_5},
  doi          = {10.1007/978-3-540-45238-6\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GeiselmannS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Golic03,
  author       = {Jovan Dj. Golic},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {DeKaRT: {A} New Paradigm for Key-Dependent Reversible Circuits},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_9},
  doi          = {10.1007/978-3-540-45238-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Golic03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItohIT03,
  author       = {Kouichi Itoh and
                  Tetsuya Izu and
                  Masahiko Takenaka},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Practical Countermeasure against Address-Bit Differential Power
                  Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {382--396},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_30},
  doi          = {10.1007/978-3-540-45238-6\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ItohIT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/JoyeP03,
  author       = {Marc Joye and
                  Pascal Paillier},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {GCD-Free Algorithms for Computing Modular Inverses},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {243--253},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_20},
  doi          = {10.1007/978-3-540-45238-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/JoyeP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KarlofW03,
  author       = {Chris Karlof and
                  David A. Wagner},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Hidden Markov Model Cryptanalysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_3},
  doi          = {10.1007/978-3-540-45238-6\_3},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KarlofW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KarriKG03,
  author       = {Ramesh Karri and
                  Grigori Kuznetsov and
                  Michael G{\"{o}}ssel},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Parity-Based Concurrent Error Detection of Substitution-Permutation
                  Network Block Ciphers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {113--124},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_10},
  doi          = {10.1007/978-3-540-45238-6\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KarriKG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KlimaPR03,
  author       = {Vlastimil Kl{\'{\i}}ma and
                  Ondrej Pokorn{\'{y}} and
                  Tom{\'{a}}s Rosa},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Attacking RSA-Based Sessions in {SSL/TLS}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {426--440},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_33},
  doi          = {10.1007/978-3-540-45238-6\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KlimaPR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KwonKH03,
  author       = {Soonhak Kwon and
                  Chang Hoon Kim and
                  Chun Pyo Hong},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Exponentiation for a Class of Finite Fields {GF(2} \({}^{\mbox{n}}\))
                  Determined by Gauss Periods},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {228--242},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_19},
  doi          = {10.1007/978-3-540-45238-6\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KwonKH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OkeyaT03,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A More Flexible Countermeasure against Side Channel Attacks Using
                  Window Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {397--410},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_31},
  doi          = {10.1007/978-3-540-45238-6\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OkeyaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrsOP03,
  author       = {Siddika Berna {\"{O}}rs and
                  Elisabeth Oswald and
                  Bart Preneel},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Power-Analysis Attacks on an {FPGA} - First Experimental Results},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_4},
  doi          = {10.1007/978-3-540-45238-6\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrsOP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PelzlWGP03,
  author       = {Jan Pelzl and
                  Thomas J. Wollinger and
                  Jorge Guajardo and
                  Christof Paar},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to
                  Elliptic Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {351--365},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_28},
  doi          = {10.1007/978-3-540-45238-6\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PelzlWGP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/PiretQ03,
  author       = {Gilles Piret and
                  Jean{-}Jacques Quisquater},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Differential Fault Attack Technique against {SPN} Structures, with
                  Application to the {AES} and {KHAZAD}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_7},
  doi          = {10.1007/978-3-540-45238-6\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/PiretQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Reyhani-MasolehH03,
  author       = {Arash Reyhani{-}Masoleh and
                  M. Anwarul Hasan},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {On Low Complexity Bit Parallel Polynomial Basis Multipliers},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {189--202},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_16},
  doi          = {10.1007/978-3-540-45238-6\_16},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/Reyhani-MasolehH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SatohM03,
  author       = {Akashi Satoh and
                  Sumio Morioka},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Unified Hardware Architecture for 128-Bit Block Ciphers {AES} and
                  Camellia},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {304--318},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_25},
  doi          = {10.1007/978-3-540-45238-6\_25},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SatohM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Smart03,
  author       = {Nigel P. Smart},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {An Analysis of Goubin's Refined Power Analysis Attack},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {281--290},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_23},
  doi          = {10.1007/978-3-540-45238-6\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Smart03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Stajano03,
  author       = {Frank Stajano},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {The Security Challenges of Ubiquitous Computing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {1},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_1},
  doi          = {10.1007/978-3-540-45238-6\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Stajano03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/StandaertRQL03,
  author       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Ga{\"{e}}l Rouvroy and
                  Jean{-}Jacques Quisquater and
                  Jean{-}Didier Legat},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Implementation of Rijndael Encryption in Reconfigurable
                  Hardware: Improvements and Design Tradeoffs},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {334--350},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_27},
  doi          = {10.1007/978-3-540-45238-6\_27},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/StandaertRQL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TiriV03,
  author       = {Kris Tiri and
                  Ingrid Verbauwhede},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Securing Encryption Algorithms against {DPA} at the Logic Level: Next
                  Generation Smart Card Technology},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {125--136},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_11},
  doi          = {10.1007/978-3-540-45238-6\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/TiriV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/TsunooSSSM03,
  author       = {Yukiyasu Tsunoo and
                  Teruo Saito and
                  Tomoyasu Suzaki and
                  Maki Shigeri and
                  Hiroshi Miyauchi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptanalysis of {DES} Implemented on Computers with Cache},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {62--76},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_6},
  doi          = {10.1007/978-3-540-45238-6\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/TsunooSSSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2002,
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36400-5},
  doi          = {10.1007/3-540-36400-5},
  isbn         = {3-540-00409-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2003,
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6},
  doi          = {10.1007/978-3-540-45238-6},
  isbn         = {3-540-40833-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AgrawalARR02,
  author       = {Dakshi Agrawal and
                  Bruce Archambeault and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {The {EM} Side-Channel(s)},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_4},
  doi          = {10.1007/3-540-36400-5\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AgrawalARR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/AumullerBFHS02,
  author       = {Christian Aum{\"{u}}ller and
                  Peter Bier and
                  Wieland Fischer and
                  Peter Hofreiter and
                  Jean{-}Pierre Seifert},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Fault Attacks on {RSA} with {CRT:} Concrete Results and Practical
                  Countermeasures},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_20},
  doi          = {10.1007/3-540-36400-5\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/AumullerBFHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BertoniBFMM02,
  author       = {Guido Bertoni and
                  Luca Breveglieri and
                  Pasqualina Fragneto and
                  Marco Macchetti and
                  Stefano Marchesin},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Efficient Software Implementation of {AES} on 32-Bit Platforms},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_13},
  doi          = {10.1007/3-540-36400-5\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BertoniBFMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BoerLW02,
  author       = {Bert den Boer and
                  Kerstin Lemke and
                  Guntram Wicke},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A {DPA} Attack against the Modular Reduction within a {CRT} Implementation
                  of {RSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_18},
  doi          = {10.1007/3-540-36400-5\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BoerLW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BostonCLW02,
  author       = {Nigel Boston and
                  T. Charles Clancy and
                  Y. Liow and
                  Jonathan E. Webster},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Genus Two Hyperelliptic Curve Coprocessor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {400--414},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_29},
  doi          = {10.1007/3-540-36400-5\_29},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BostonCLW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChariRR02,
  author       = {Suresh Chari and
                  Josyula R. Rao and
                  Pankaj Rohatgi},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Template Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {13--28},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_3},
  doi          = {10.1007/3-540-36400-5\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ChariRR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CietQS02,
  author       = {Mathieu Ciet and
                  Jean{-}Jacques Quisquater and
                  Francesco Sica},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Preventing Differential Analysis in {GLV} Elliptic Curve Scalar Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {540--550},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_39},
  doi          = {10.1007/3-540-36400-5\_39},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CietQS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ClaytonB02,
  author       = {Richard Clayton and
                  Mike Bond},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Experience Using a Low-Cost {FPGA} Design to Crack {DES} Keys},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {579--592},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_42},
  doi          = {10.1007/3-540-36400-5\_42},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ClaytonB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ErnstJMHB02,
  author       = {M. Ernst and
                  Michael Jung and
                  Felix Madlener and
                  Sorin A. Huss and
                  Rainer Bl{\"{u}}mel},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A Reconfigurable System on Chip Implementation for Elliptic Curve
                  Cryptography over GF(2\({}^{\mbox{n}}\))},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {381--399},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_28},
  doi          = {10.1007/3-540-36400-5\_28},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ErnstJMHB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FischerD02,
  author       = {Viktor Fischer and
                  Milos Drutarovsk{\'{y}}},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {True Random Number Generator Embedded in Reconfigurable Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {415--430},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_30},
  doi          = {10.1007/3-540-36400-5\_30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FischerD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/FischerS02,
  author       = {Wieland Fischer and
                  Jean{-}Pierre Seifert},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Increasing the Bitlength of a Crypto-Coprocessor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {71--81},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_7},
  doi          = {10.1007/3-540-36400-5\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/FischerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GebotysG02,
  author       = {Catherine H. Gebotys and
                  Robert J. Gebotys},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Secure Elliptic Curve Implementations: An Analysis of Resistance to
                  Power-Attacks in a {DSP} Processor},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {114--128},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_10},
  doi          = {10.1007/3-540-36400-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GebotysG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GolicT02,
  author       = {Jovan Dj. Golic and
                  Christophe Tymen},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Multiplicative Masking and Power Analysis of {AES}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {198--212},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_16},
  doi          = {10.1007/3-540-36400-5\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GolicT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Gueron02,
  author       = {Shay Gueron},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Enhanced Montgomery Multiplication},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {46--56},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_5},
  doi          = {10.1007/3-540-36400-5\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Gueron02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GuraSEGGFGS02,
  author       = {Nils Gura and
                  Sheueling Chang Shantz and
                  Hans Eberle and
                  Sumit Gupta and
                  Vipul Gupta and
                  Daniel F. Finchelstein and
                  Edouard Goupy and
                  Douglas Stebila},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {An End-to-End Systems Approach to Elliptic Curve Cryptography},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {349--365},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_26},
  doi          = {10.1007/3-540-36400-5\_26},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GuraSEGGFGS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/GutubTSK02,
  author       = {Adnan Abdul{-}Aziz Gutub and
                  Alexandre F. Tenca and
                  Erkay Savas and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p)
                  and {GF(2)}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {484--499},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_35},
  doi          = {10.1007/3-540-36400-5\_35},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/GutubTSK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HaM02,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Randomized Signed-Scalar Multiplication of {ECC} to Resist Power Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {551--563},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_40},
  doi          = {10.1007/3-540-36400-5\_40},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HaM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Huang02,
  author       = {Andrew Shane Huang},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Keeping Secrets in Hardware: The Microsoft Xbox{\texttrademark} Case
                  Study},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_17},
  doi          = {10.1007/3-540-36400-5\_17},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Huang02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItohIT02,
  author       = {Kouichi Itoh and
                  Tetsuya Izu and
                  Masahiko Takenaka},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Address-Bit Differential Power Analysis of Cryptographic Schemes {OK-ECDH}
                  and {OK-ECDSA}},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_11},
  doi          = {10.1007/3-540-36400-5\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ItohIT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ItohYTT02,
  author       = {Kouichi Itoh and
                  Jun Yajima and
                  Masahiko Takenaka and
                  Naoya Torii},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {{DPA} Countermeasures by Improving the Window Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {303--317},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_23},
  doi          = {10.1007/3-540-36400-5\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/ItohYTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}