Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2021, Issue 3
Volume 2021, Issue 3
Published:
2021-07-09
Articles
Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware
Milad Bahadori, Kimmo Järvinen, Tilen Marc, Miha Stopar
1-27
PDF
Online Template Attacks: Revisited
Alejandro Cabrera Aldaya, Billy Bob Brumley
28-59
PDF
Artifacts
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks
– A Case Study on Public-Key Algorithms –
Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli
60-96
PDF
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4
Ming-Shing Chen, Tung Chou, Markus Krausz
97-124
PDF
Artifacts
Classic McEliece on the ARM Cortex-M4
Ming-Shing Chen, Tung Chou
125-148
PDF
Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices
Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino
149-175
PDF
Security and Trust in Open Source Security Tokens
Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl
176-201
PDF
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms
or When the Security Order Does Not Matter
Olivier Bronchain, François-Xavier Standaert
202-234
PDF
Artifacts
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks
Xiangjun Lu, Chi Zhang, Pei Cao, Dawu Gu, Haining Lu
235-274
PDF
Analysis and Comparison of Table-based Arithmetic to Boolean Masking
Michiel Van Beirendonck, Jan-Pieter D’Anvers, Ingrid Verbauwhede
275-297
PDF
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
298-333
PDF
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography
Shivam Bhasin, Jan-Pieter D’Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck
334-359
PDF
Cutting Through the Complexity of Reverse Engineering Embedded Devices
Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen, Mihai Ordean, Flavio D. Garcia
360-389
PDF
Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype
Davide Bellizia, Clément Hoffmann, Dina Kamel, Hanlin Liu, Pierrick Méaux, François-Xavier Standaert, Yu Yu
390-417
PDF
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces
Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu
418-440
PDF
Artifacts
Denial-of-Service on FPGA-based Cloud Infrastructures — Attack and Defense
Tuan La, Khoa Pham, Joseph Powell, Dirk Koch
441-464
PDF
Information Leakages in Code-based Masking: A Unified Quantification Approach
Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager
465-495
PDF
Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA
Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi
496-519
PDF
Inconsistency of Simulation and Practice in Delay-based Strong PUFs
Anita Aghaie, Amir Moradi
520-551
PDF
DL-LA: Deep Learning Leakage Assessment
A modern roadmap for SCA evaluations
Thorben Moos, Felix Wegener, Amir Moradi
552-598
PDF
Probing Security through Input-Output Separation and Revisited Quasilinear Masking
Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud
599-640
PDF
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors
Olivier Bronchain, Charles Momin, Thomas Peters, François-Xavier Standaert
641-676
PDF
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis
Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek
677-707
PDF
Second-Order SCA Security with almost no Fresh Randomness
Aein Rezaei Shahmirzadi, Amir Moradi
708-755
PDF
SEAL-Embedded: A Homomorphic Encryption Library for the Internet of Things
Deepika Natarajan, Wei Dai
756-779
PDF
Countermeasures against Static Power Attacks
– Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS –
Thorben Moos, Amir Moradi
780-805
PDF
iacr-logo