Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Vol. 2025 No. 2
Vol. 2025 No. 2
Published:
2025-03-04
Articles
Improving MPCitH with Preprocessing: Mask Is All You Need
Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang
1-22
PDF
MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4
Fan Huang, Xiaolin Duan, Chengcong Hu, Mengce Zheng, Honggang Hu
23-68
PDF
SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities
Jinling Tang, Haixia Xu, Huimei Liao, Yinchang Zhou
69-93
PDF
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
94-125
PDF
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic
Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
126-162
PDF
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption
Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
163-208
PDF
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales B. Paiva, Prasanna Ravi, Goutam Tamvada
209-234
PDF
Higher-Order Time Sharing Masking
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
235-267
PDF
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures
Jennifer Jackson, Minmin Jiang, David Oswald
268-292
PDF
A Code-Based ISE to Protect Boolean Masking in Software
Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weija Wang
293-332
PDF
Leading Degree: A Metric for Model Performance Evaluation and Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis
Junfan Zhu, Jiqiang Lu
333-361
PDF
Sieving with Streaming Memory Access
Ziyu Zhao, Jintai Ding, Bo-Yin Yang
362-384
PDF
Shortcut2Secrets: A Table-based Differential Fault Attack Framework
Weizhe Wang, Pierrick Méaux, Deng Tang
385-419
PDF
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao
420-459
PDF
Protection of Oscillator-Based PUFs against Side Channel Analyses by Random Interruption
Holger Mandry, Jonas Ruchti, Julius Nowakowski, Michael Pehl, Maurits Ortmanns
460-488
PDF
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, Ingrid Verbauwhede
489-510
PDF
Constant time lattice reduction in dimension 4 with application to SQIsign
Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler
511-534
PDF
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction
Daphné Trama, Aymen Boudguiga, Pierre-Emmanuel Clet, Renaud Sirdey, Nicolas Ye
535-578
PDF
A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks
Aric Fowler, Shayan Mohammed, Mustafa Shihab, Thomas Broadfoot, Peter Beerel, Carl Sechen, Yiorgos Makris
579-603
PDF
Information Theoretic Analysis of PUF-Based Tamper Protection
Georg Maringer, Matthias Hiller
604-646
PDF
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede
647-680
PDF
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs
Rui Jiang, Cong Peng, Min Luo, Rongmao Chen, Debiao He
681-704
PDF
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto
705-742
PDF
Skyscraper: Fast Hashing on Big Primes
Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger
743-780
PDF
New Quantum Cryptanalysis of Binary Elliptic Curves
Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo
781-804
PDF
iacr-logo