Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2022, Issue 3
Volume 2022, Issue 3
Published:
2022-06-08
Articles
A Security Model for Randomization-based Protected Caches
Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros, Miquel Moretó
1-25
PDF
Artifacts
When the Decoder Has to Look Twice: Glitching a PUF Error Correction
Jonas Ruchti, Michael Gruber, Michael Pehl
26-70
PDF
Complete and Improved FPGA Implementation of Classic McEliece
Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang
71-113
PDF
Composable Gadgets with Reused Fresh Masks
First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks
David Knichel, Amir Moradi
114-140
PDF
The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon
Morgane Guerreau, Ange Martinelli, Thomas Ricosset, Mélissa Rossi
141-164
PDF
The Wiretap Channel for Capacitive PUF-Based Security Enclosures
Kathrin Garb, Marvin Xhemrishi, Ludwig Kürzinger, Christoph Frisch
165-191
PDF
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu
192-222
PDF
Artifacts
Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Qian Guo, Clemens Hlauschek, Thomas Johansson, Norman Lahr, Alexander Nilsson, Robin Leander Schröder
223-263
PDF
Artifacts
SIKE Channels
Zero-Value Side-Channel Attacks on SIKE
Luca De Feo, Nadia El Mrabet, Aymeric Genêt, Novak Kaluđerovi´c, Natacha Linard de Guertechin, Simon Pontié, Élise Tasso
264-289
PDF
Side-Channel Masking with Common Shares
Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, Yang Su
290-329
PDF
BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem
Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer, Daniele Antonioli
330-366
PDF
Artifacts
SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
Nasour Bagheri, Sadegh Sadeghi, Prasanna Ravi, Shivam Bhasin, Hadi Soleimany
367-390
PDF
Know Time to Die – Integrity Checking for Zero Trust Chiplet-based Systems Using Between-Die Delay PUFs
Aleksa Deric, Daniel Holcomb
391-412
PDF
The Best of Two Worlds: Deep Learning-assisted Template Attack
Lichao Wu, Guilherme Perin, Stjepan Picek
413-437
PDF
Beware of Insufficient Redundancy
An Experimental Evaluation of Code-based FI Countermeasures
Timo Bartkewitz, Sven Bettendorf, Thorben Moos, Amir Moradi, Falk Schellenberg
438-462
PDF
iacr-logo