Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2020, Issue 4
Volume 2020, Issue 4
Published:
2020-08-26
Articles
A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords
Zhendong Zhang, Peng Liu
1-23
PDF
On the spectral features of robust probing security
Maria Chiara Molteni, Vittorio Zaccaria
24-48
PDF
Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis?
Breaking multiple layers of side-channel countermeasures
Anh-Tuan Hoang, Neil Hanley, Maire O’Neill
49-85
PDF
Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs
Rei Ueno, Kohei Kazumori, Naofumi Homma
86-128
PDF
Second-Order Masked Lookup Table Compression Scheme
Annapurna Valiveti, Srinivas Vivek
129-153
PDF
Improving the Performance of the Picnic Signature Scheme
Daniel Kales, Greg Zaverucha
154-188
PDF
Faster Montgomery and double-add ladders for short Weierstrass curves
Mike Hamburg
189-208
PDF
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Qian Guo, Vincent Grosso, François-Xavier Standaert, Olivier Bronchain
209-238
PDF
RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography
Tim Fritzmann, Georg Sigl, Johanna Sepúlveda
239-280
PDF
Minerva: The curse of ECDSA nonces
Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
Jan Jancar, Vladimir Sedlacek, Petr Svenda, Marek Sys
281-308
PDF
DANA Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering
Nils Albartus, Max Hoffmann, Sebastian Temme, Leonid Azriel, Christof Paar
309-336
PDF
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis
Guilherme Perin, Łukasz Chmielewski, Stjepan Picek
337-364
PDF
Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers
Florian Unterstein, Marc Schink, Thomas Schamberger, Lars Tebelmann, Manuel Ilg, Johann Heyszl
365-388
PDF
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders
Lichao Wu, Stjepan Picek
389-415
PDF
Unrolled Cryptography on Silicon
A Physical Security Analysis
Thorben Moos
416-442
PDF
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware
Sujoy Sinha Roy, Andrea Basso
443-466
PDF
iacr-logo