default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2018
Volume 2018, Number 1, 2018
- Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. 1-17 - Dorian Amiet, Andreas Curiger, Paul Zbinden:
FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256. 18-39 - Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. 40-72 - Daniel Dinu, Ilya Kizhvatov:
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread. 73-97 - Kai-Hsin Chuang, Robin Degraeve, Andrea Fantini, Guido Groeseneken, Dimitri Linten, Ingrid Verbauwhede:
A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF. 98-117 - Hervé Chabanne, Houssem Maghrebi, Emmanuel Prouff:
Linear Repairing Codes and Side-Channel Attacks. 118-141 - Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu:
Practical CCA2-Secure and Masked Ring-LWE Implementation. 142-174 - Axel Mathieu-Mahias, Michaël Quisquater:
Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods. 175-208 - Amir Moradi, Bastian Richter, Tobias Schneider, François-Xavier Standaert:
Leakage Detection with the x2-Test. 209-237 - Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. 238-268 - Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen:
Rhythmic Keccak: SCA Security and Low Latency in HW. 269-290
Volume 2018, Number 2, 2018
- Hannes Groß, Rinat Iusupov, Roderick Bloem:
Generic Low-Latency Masking in Hardware. 1-21 - Luk Bettale, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. 22-45 - Christopher Hicks, Flavio D. Garcia, David F. Oswald:
Dismantling the AUT64 Automotive Cipher. 46-69 - Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung:
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA. 70-95 - Jakub Breier, Xiaolu Hou, Yang Liu:
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code. 96-122 - Thomas De Cnudde, Maik Ender, Amir Moradi:
Hardware Masking, Revisited. 123-148 - Gildas Avoine, Loïc Ferreira:
Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack. 149-170 - Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. 171-191 - Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. 192-217 - Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda:
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. 218-241 - Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. 242-276 - Max Hoffmann, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. 277-297 - Arash Reyhani-Masoleh, Mostafa M. I. Taha, Doaa Ashmawy:
Smashing the Implementation Records of AES S-box. 298-336
Volume 2018, Number 3, 2018
- Daniel Page, Matthieu Rivain:
Preface to TCHES 2018. I-IV
- Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu:
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange. 1-20 - Leon Groot Bruinderink, Peter Pessl:
Differential Fault Attacks on Deterministic Lattice Signatures. 21-43 - Jonas Krautter, Dennis R. E. Gnad, Mehdi Baradaran Tahoori:
FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES. 44-68 - Joël Cathébras, Alexandre Carbon, Peter A. Milder, Renaud Sirdey, Nicolas Ventroux:
Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication for SHE Acceleration. 69-88 - Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. 89-120 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 121-149 - Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren:
Persistent Fault Analysis on Block Ciphers. 150-172 - Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. 173-213 - Elie Noumon Allini, Maciej Skórski, Oto Petura, Florent Bernard, Marek Laban, Viktor Fischer:
Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness. 214-242 - Angshuman Karmakar, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede:
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM. 243-266 - Bohan Yang, Vladimir Rozic, Milos Grujic, Nele Mentens, Ingrid Verbauwhede:
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling. 267-292 - Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus, Sinan Böcker, Russell Tessier, Christof Paar:
On the Difficulty of FSM-based Hardware Obfuscation. 293-330 - Akira Takahashi, Mehdi Tibouchi, Masayuki Abe:
New Bleichenbacher Records: Fault Attacks on qDSA Signatures. 331-371 - James Howe, Tobias Oder, Markus Krausz, Tim Güneysu:
Standard Lattice-Based Key Encapsulation on Embedded Devices. 372-393 - Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. 394-430 - Lauren De Meyer, Oscar Reparaz, Begül Bilgin:
Multiplicative Masking for AES in Hardware. 431-468 - Jin Hyung Park, Dong Hoon Lee:
FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data. 469-499 - Aesun Park, Kyung-Ah Shim, Namhun Koo, Dong-Guk Han:
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -. 500-523 - Kostas Papagiannopoulos:
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information. 524-546 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. 547-572 - Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs. 573-595 - Lauren De Meyer, Amir Moradi, Felix Wegener:
Spin Me Right Round Rotational Symmetry for FPGA-Specific AES. 596-626 - Bernhard Jungk, Richard Petri, Marc Stöttinger:
Efficient Side-Channel Protections of ARX Ciphers. 627-653
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.