Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2020, Issue 2
Volume 2020, Issue 2
Published:
2020-03-02
Articles
Side-Channel Countermeasures’ Dissection and the Limits of Closed Source Security Evaluations
Olivier Bronchain, François-Xavier Standaert
1-25
PDF
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery
Ziyue Zhang, A. Adam Ding, Yunsi Fei
26-48
PDF
Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT
Neng Zhang, Bohan Yang, Chen Chen, Shouyi Yin, Shaojun Wei, Leibo Liu
49-72
PDF
FENL: an ISE to mitigate analogue micro-architectural leakage
Si Gao, Ben Marshall, Dan Page, Thinh Pham
73-98
PDF
Dismantling DST80-based Immobiliser Systems
Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
99-127
PDF
Efficient and Private Computations with Code-Based Masking
Weijia Wang, Pierrick Méaux, Gaëtan Cassiers, François-Xavier Standaert
128-171
PDF
Persistent Fault Attack in Practice
Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu , Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren
172-195
PDF
When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA
Alejandro Cabrera Aldaya, Billy Bob Brumley
196-221
PDF
Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography
Jose Maria Bermudo Mera, Angshuman Karmakar, Ingrid Verbauwhede
222-244
PDF
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina
245-271
PDF
FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers
Keerthi K, Indrani Roy, Chester Rebeiro, Aritra Hazra, Swarup Bhunia
272-299
PDF
Low-Latency Hardware Masking with Application to AES
Pascal Sasdrich, Begül Bilgin, Michael Hutter, Mark E. Marson
300-326
PDF
On the Security Goals of White-Box Cryptography
Estuardo Alpirez Bock, Alessandro Amadori, Chris Brzuska, Wil Michiels
327-357
PDF
iacr-logo