Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2020, Issue 3
Volume 2020, Issue 3
Published:
2020-06-19
Articles
Strengthening Sequential Side-Channel Attacks Through Change Detection
Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
1-21
PDF
Investigating Profiled Side-Channel Attacks Against the DES Key Schedule
Johann Heyszl, Katja Miller, Florian Unterstein, Marc Schink, Alexander Wagner, Horst Gieser, Sven Freud, Tobias Damm, Dominik Klein, Dennis Kügler
22-72
PDF
A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data
Jiajia Zhang, Mengce Zheng, Jiehui Nan, Honggang Hu, Nenghai Yu
73-96
PDF
Splitting the Interpose PUF: A Novel Modeling Attack Strategy
Nils Wisiol, Christopher Mühl, Niklas Pirnay, Phuong Ha Nguyen, Marian Margraf, Jean-Pierre Seifert, Marten van Dijk, Ulrich Rührmair
97-120
PDF
CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design
Jonas Krautter, Dennis Gnad, Mehdi Tahoori
121-146
PDF
Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks
Lennert Wouters, Victor Arribas, Benedikt Gierlichs, Bart Preneel
147-168
PDF
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar
169-195
PDF
The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
196-218
PDF
ISA Extensions for Finite Field Arithmetic
Accelerating Kyber and NewHope on RISC-V
Erdem Alkim, Hülya Evkan, Norman Lahr, Ruben Niederhagen, Richard Petri
219-242
PDF
Single-Trace Attacks on Keccak
Matthias J. Kannwischer, Peter Pessl, Robert Primas
243-268
PDF
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA
Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer
269-306
PDF
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs
Prasanna Ravi, Sujoy Sinha Roy, Anupam Chattopadhyay, Shivam Bhasin
307-335
PDF
Cortex-M4 optimizations for {R,M} LWE schemes
Erdem Alkim, Yusuf Alper Bilgin, Murat Cenk, François Gérard
336-357
PDF
Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks
Giovanni Camurati, Aurélien Francillon, François-Xavier Standaert
358-401
PDF
Fixslicing: A New GIFT Representation
Fast Constant-Time Implementations of GIFT and GIFT-COFB on ARM Cortex-M
Alexandre Adomnicai, Zakaria Najm, Thomas Peyrin
402-427
PDF
From A to Z: Projective coordinates leakage in the wild
Alejandro Cabrera Aldaya, Cesar Pereida García, Billy Bob Brumley
428-453
PDF
Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks
Louis Goubin, Matthieu Rivain, Junwei Wang
454-482
PDF
High-Speed Masking for Polynomial Comparison in Lattice-based KEMs
Florian Bache, Clara Paglialonga, Tobias Oder, Tobias Schneider, Tim Güneysu
483-507
PDF
Protecting against Statistical Ineffective Fault Attacks
Joan Daemen, Christoph Dobraunig, Maria Eichlseder, Hannes Gross, Florian Mendel, Robert Primas
508-543
PDF
iacr-logo