Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2022, Issue 4
Volume 2022, Issue 4
Published:
2022-08-31
Articles
When Bad News Become Good News
Towards Usable Instances of Learning with Physical Errors
Davide Bellizia, Clément Hoffmann, Dina Kamel, Pierrick Méaux, François-Xavier Standaert
1-24
PDF
Attacks Against White-Box ECDSA and Discussion of Countermeasures
A Report on the WhibOx Contest 2021
Sven Bauer, Hermann Drexler, Max Gebhardt, Dominik Klein, Friederike Laus, Johannes Mittmann
25-55
PDF
SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element
Pascal Nasahl, Miguel Osorio, Pirmin Vogel, Michael Schaffner, Timothy Trippel, Dominic Rizzo, Stefan Mangard
56-87
PDF
An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining
Adriaan Peetermans, Ingrid Verbauwhede
88-109
PDF
Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM
Thales B. Paiva, Routo Terada
110-134
PDF
Artifacts
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation
Yaobin Shen, Thomas Peters, François-Xavier Standaert, Gaëtan Cassiers, Corentin Verhamme
135-162
PDF
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion
Kavya Sreedhar, Mark Horowitz, Christopher Torng
163-187
PDF
Artifacts
Randomness Optimization for Gadget Compositions in Higher-Order Masking
Jakob Feldtkeller, David Knichel, Pascal Sasdrich, Amir Moradi, Tim Güneysu
188-227
PDF
Perceived Information Revisited
New Metrics to Evaluate Success Rate of Side-Channel Attacks
Akira Ito, Rei Ueno, Naofumi Homma
228-254
PDF
VERICA - Verification of Combined Attacks
Automated formal verification of security against simultaneous information leakage and tampering
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich, Tim Güneysu
255-284
PDF
Artifacts
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber
Yanbin Li, Jiajie Zhu, Yuxin Huang, Zhe Liu, Ming Tang
285-310
PDF
PROLEAD
A Probing-Based Hardware Leakage Detection Tool
Nicolai Müller, Amir Moradi
311-348
PDF
Artifacts
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Erdem Alkim, Vincent Hwang, Bo-Yin Yang
349-371
PDF
Artifacts
Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks
Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Christine van Vredendaal
372-396
PDF
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis
A Report on the CHES Challenge Side-Channel Contest 2020
Aron Gohr, Friederike Laus, Werner Schindler
397-437
PDF
Artifacts
PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors
Anomadarshi Barua, Mohammad Abdullah Al Faruque
438-462
PDF
Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers
Kohei Yamashita, Benjamin Cyr, Kevin Fu, Wayne Burleson, Takeshi Sugawara
463-489
PDF
One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation
Kotaro Saito, Akira Ito, Rei Ueno, Naofumi Homma
490-526
PDF
ECDSA White-Box Implementations: Attacks and Designs from CHES 2021 Challenge
Guillaume Barbu, Ward Beullens, Emmanuelle Dottax, Christophe Giraud, Agathe Houzelot, Chaoyun Li, Mohammad Mahzoun, Adrián Ranea, Jianrui Xie
527-552
PDF
Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit
with Application to Lattice-Based KEMs
Olivier Bronchain, Gaëtan Cassiers
553-588
PDF
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic, Sri Parameswaran
589-613
PDF
Artifacts
Improved Plantard Arithmetic for Lattice-based Cryptography
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
614-636
PDF
Artifacts
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Jeroen Delvaux
637-660
PDF
Artifacts
SoK: Fully Homomorphic Encryption over the [Discretized] Torus
Marc Joye
661-692
PDF
Riding the Waves Towards Generic Single-Cycle Masking in Hardware
Rishub Nagpal, Barbara Gigerl, Robert Primas, Stefan Mangard
693-717
PDF
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU
Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
718-750
PDF
Artifacts
SoC Root Canal!
Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs
Pantea Kiaei, Patrick Schaumont
751-773
PDF
Artifacts
Side-Channel Expectation-Maximization Attacks
Julien Béguinot, Wei Cheng, Sylvain Guilley, Olivier Rioul
774-799
PDF
A Key-Recovery Side-Channel Attack on Classic McEliece Implementations
Qian Guo, Andreas Johansson, Thomas Johansson
800-827
PDF
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis
Guilherme Perin, Lichao Wu, Stjepan Picek
828-861
PDF
On the application of Two-Photon Absorption for Laser Fault Injection attacks
Pushing the physical boundaries for Laser-based Fault Injection
Bodo Selmke, Maximilian Pollanka, Andreas Duensing, Emanuele Strieder, Hayden Wen, Michael Mittermair, Reinhard Kienberger, Georg Sigl
862-885
PDF
GE vs GM: Efficient side-channel security evaluations on full cryptographic keys
Anca Rădulescu, Pantelimon G. Popescu, Marios O. Choudary
886-905
PDF
iacr-logo