Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2023, Issue 2
Volume 2023, Issue 2
Published:
2023-03-06
Articles
PMFault: Faulting and Bricking Server CPUs through Management Interfaces
Or: A Modern Example of Halt and Catch Fire
Zitai Chen, David Oswald
1-23
PDF
Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis
Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
24-53
PDF
Garbled Circuits from an SCA Perspective
Free XOR can be Quite Expensive. . .
Itamar Levi, Carmit Hazay
54-79
PDF
On Protecting SPHINCS+ Against Fault Attacks
Aymeric Genêt
80-114
PDF
Artifacts
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input
Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba
115-154
PDF
Threshold Implementations in Software: Micro-architectural Leakages in Algorithms
John Gaspoz, Siemen Dhooghe
155-179
PDF
High-order masking of NTRU
Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
180-211
PDF
FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software
Keerthi K, Chester Rebeiro
212-240
PDF
How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?
Rei Ueno, Naofumi Homma
241-269
PDF
Some New Methods to Generate Short Addition Chains
Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang, Jianwei Liu
270-285
PDF
Efficient Private Circuits with Precomputation
Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu
286-309
PDF
Conditional Variational AutoEncoder based on Stochastic Attacks
Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
310-357
PDF
Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs
Guiwen Luo, Shihui Fu, Guang Gong
358-380
PDF
Artifacts
A Closer Look at the Chaotic Ring Oscillators based TRNG Design
Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
381-417
PDF
Artifacts
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond
Gokulnath Rajendran, Prasanna Ravi, Jan-Pieter D’Anvers, Shivam Bhasin, Anupam Chattopadhyay
418-446
PDF
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
447-481
PDF
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, François-Xavier Standaert
482-518
PDF
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts
Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo
519-542
PDF
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks
David Spielmann, Ognjen Glamočanin, Mirjana Stojilović
543-567
PDF
Artifacts
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate
Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin
568-586
PDF
“Whispering MLaaS”
Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks
Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay
587-613
PDF
Artifacts
iacr-logo