Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2023, Issue 1
Volume 2023, Issue 1
Published:
2022-11-29
Articles
Risky Translations: Securing TLBs against Timing Side Channels
Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
1-31
PDF
Don’t Learn What You Already Know
Scheme-Aware Modeling for Profiling Side-Channel Analysis against Masking
Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
32-59
PDF
Adapting Belief Propagation to Counter Shuffling of NTTs
Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
60-88
PDF
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles – A case study of Kyber
Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
89-112
PDF
Low-Latency and Low-Randomness Second-Order Masked Cubic Functions
Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi
113-152
PDF
High-order Polynomial Comparison and Masking Lattice-based Encryption
Jean-Sébastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
153-192
PDF
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
193-237
PDF
High Order Side-Channel Security for Elliptic-Curve Implementations
Sonia Belaïd, Matthieu Rivain
238-276
PDF
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations
Giovanni Camurati, Matteo Dell’Amico, François-Xavier Standaert
277-300
PDF
Artifacts
ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection
Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
301-325
PDF
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions
Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
326-368
PDF
Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures
Yufeng Tang, Zheng Gong, Jinhai Chen, Nanjiang Xie
369-400
PDF
Information Theory-based Evolution of Neural Networks for Side-channel Analysis
Rabin Y. Acharya, Fatemeh Ganji, Domenic Forte
401-437
PDF
Low-Latency Design and Implementation of the Squaring in Class Groups for Verifiable Delay Function Using Redundant Representation
Danyang Zhu, Rongrong Zhang, Lun Ou, Jing Tian, Zhongfeng Wang
438-462
PDF
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
463-500
PDF
FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption
Kamil Kluczniak, Leonard Schild
501-537
PDF
A Faster Third-Order Masking of Lookup Tables
Anju Alexander, Annapurna Valiveti, Srinivas Vivek
538-556
PDF
Artifacts
SoK: SCA-secure ECC in software – mission impossible?
Lejla Batina, Łukasz Chmielewski, Björn Haase, Niels Samwel, Peter Schwabe
557-589
PDF
Artifacts
iacr-logo