Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2022, Issue 1
Volume 2022, Issue 1
Published:
2021-11-19
Articles
Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain, Samuel Jaques
1-27
PDF
Artifacts
Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure
Shoei Nashimoto, Daisuke Suzuki, Rei Ueno, Naofumi Homma
28-68
PDF
Can’t Touch This: Inertial HSMs Thwart Advanced Physical Attacks
Jan Sebastian Götte, Björn Scheuermann
69-93
PDF
CFNTT: Scalable Radix-2/4 NTT Multiplication Architecture with an Efficient Conflict-free Memory Mapping Scheme
Xiangren Chen, Bohan Yang, Shouyi Yin, Shaojun Wei, Leibo Liu
94-126
PDF
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang
127-151
PDF
Artifacts
A Constant-time AVX2 Implementation of a Variant of ROLLO
Tung Chou, Jin-Han Liou
152-174
PDF
MIRACLE: MIcRo-ArChitectural Leakage Evaluation
A study of micro-architectural power leakage across many devices
Ben Marshall, Dan Page, James Webb
175-220
PDF
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang, Shang-Yi Yang
221-244
PDF
Artifacts
Efficient Implementations of Rainbow and UOV using AVX2
Kyung-Ah Shim, Sangyub Lee, Namhun Koo
245-269
PDF
A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium
Cankun Zhao, Neng Zhang, Hanning Wang, Bohan Yang, Wenping Zhu, Zhengdong Li, Min Zhu, Shouyi Yin, Shaojun Wei, Leibo Liu
270-295
PDF
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, Naofumi Homma
296-322
PDF
Artifacts
Generic Hardware Private Circuits
Towards Automated Generation of Composable Secure Gadgets
David Knichel, Pascal Sasdrich, Amir Moradi
323-344
PDF
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces
Jens Trautmann, Arthur Beckers, Lennert Wouters, Stefan Wildermann, Ingrid Verbauwhede, Jürgen Teich
345-366
PDF
Artifacts
Practical Multiple Persistent Faults Analysis
Hadi Soleimany, Nasour Bagheri, Hosein Hadipour, Prasanna Ravi, Shivam Bhasin, Sara Mansouri
367-390
PDF
Artifacts
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage
Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe
391-413
PDF
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Tim Fritzmann, Michiel Van Beirendonck, Debapriya Basu Roy, Patrick Karl, Thomas Schamberger, Ingrid Verbauwhede, Georg Sigl
414-460
PDF
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB
Francesco Berti, Shivam Bhasin, Jakub Breier, Xiaolu Hou, Romain Poussier, François-Xavier Standaert, Balasz Udvarhelyi
461-481
PDF
Polynomial multiplication on embedded vector architectures
Hanno Becker, Jose Maria Bermudo Mera, Angshuman Karmakar, Joseph Yiu, Ingrid Verbauwhede
482-505
PDF
ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking
Anuj Dubey, Afzal Ahmad, Muhammad Adeel Pasha, Rosario Cammarota, Aydin Aysu
506-556
PDF
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh, Tim Güneysu
557-588
PDF
Artifacts
Automated Generation of Masked Hardware
David Knichel, Amir Moradi, Nicolai Müller, Pascal Sasdrich
589-629
PDF
Composite Enclaves: Towards Disaggregated Trusted Execution
Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Čapkun
630-656
PDF
VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
657-678
PDF
Artifacts
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
679-721
PDF
Will You Cross the Threshold for Me?
Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay, Sujoy Sinha Roy
722-761
PDF
Artifacts
iacr-logo