Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2021, Issue 2
Volume 2021, Issue 2
Published:
2021-02-23
Articles
Machine Learning of Physical Unclonable Functions using Helper Data
Revealing a Pitfall in the Fuzzy Commitment Scheme
Emanuele Strieder, Christoph Frisch, Michael Pehl
1-36
PDF
Fault Attacks on CCA-secure Lattice KEMs
Peter Pessl, Lukas Prokop
37-60
PDF
Artifacts
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks
Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz
61-105
PDF
Secure, Accurate, and Practical Narrow-Band Ranging System
Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann
106-135
PDF
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry
Gaëtan Cassiers, François-Xavier Standaert
136-158
PDF
NTT Multiplication for NTT-unfriendly Rings
New Speed Records for Saber and NTRU on Cortex-M4 and AVX2
Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang
159-188
PDF
Artifacts
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification
Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth
189-228
PDF
Artifacts
Revisiting the functional bootstrap in TFHE
Antonio Guimarães, Edson Borin, Diego F. Aranha
229-253
PDF
Time-Memory Analysis of Parallel Collision Search Algorithms
Monika Trimoska, Sorina Ionica, Gilles Dequen
254-274
PDF
Artifacts
RASSLE: Return Address Stack based Side-channel LEakage
Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay
275-303
PDF
New First-Order Secure AES Performance Records
Aein Rezaei Shahmirzadi, Dušan Božilov, Amir Moradi
304-327
PDF
A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA
Yufei Xing, Shuguo Li
328-356
PDF
Combining Optimization Objectives: New Modeling Attacks on Strong PUFs
Johannes Tobisch, Anita Aghaie, Georg T. Becker
357-389
PDF
iacr-logo