Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2021, Issue 4
Volume 2021, Issue 4
Published:
2021-08-11
Articles
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries
Sunghyun Jin, Sangyub Lee, Sung Min Cho, HeeSeok Kim, Seokhie Hong
1-26
PDF
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation
Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu
27-56
PDF
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
Claude Carlet, Sylvain Guilley, Sihem Mesnager
57-87
PDF
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber
Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal
88-113
PDF
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs
Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee
114-148
PDF
My other car is your car: compromising the Tesla Model X keyless entry system
Lennert Wouters, Benedikt Gierlichs, Bart Preneel
149-172
PDF
Masking Kyber: First- and Higher-Order Implementations
Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal
173-214
PDF
ROTed: Random Oblivious Transfer for embedded devices
P. Branco, L. Fiolhais, M. Goulão, P. Martins, P. Mateus, L. Sousa
215-238
PDF
Artifacts
Side-Channel Protections for Picnic Signatures
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
239-282
PDF
Artifacts
An Instruction Set Extension to Support Software-Based Masking
Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham, Francesco Regazzoni
283-325
PDF
Revealing the Weakness of Addition Chain Based Masked SBox Implementations
Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao
326-350
PDF
CTIDH: faster constant-time CSIDH
Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková
351-387
PDF
Artifacts
Low-Latency Keccak at any Arbitrary Order
Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziyeh Salarifard, Amir Moradi
388-411
PDF
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security
Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier
412-446
PDF
FIVER – Robust Verification of Countermeasures against Fault Injections
Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu
447-473
PDF
Artifacts
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms
Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede
474-509
PDF
The SPEEDY Family of Block Ciphers
Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures
Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh
510-545
PDF
Higher-Order Lookup Table Masking in Essentially Constant Memory
Annapurna Valiveti, Srinivas Vivek
546-586
PDF
Artifacts
Yoroi: Updatable Whitebox Cryptography
Yuji Koike, Takanori Isobe
587-617
PDF
Batching CSIDH Group Actions using AVX-512
Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan, Peter B. Rønne
618-649
PDF
Rainbow on Cortex-M4
Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang
650-675
PDF
Artifacts
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation
Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson
676-707
PDF
iacr-logo