Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Vol. 2023 No. 3
Vol. 2023 No. 3
Published:
2023-06-09
Articles
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer
1-29
PDF
Artifacts
Pasta: A Case for Hybrid Homomorphic Encryption
Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
30-73
PDF
Artifacts
Enabling FrodoKEM on Embedded Devices
Joppe W. Bos, Olivier Bronchain, Frank Custers, Joost Renes, Denise Verbakel, Christine van Vredendaal
74-96
PDF
Cryptanalysis of ARX-based White-box Implementations
Alex Biryukov, Baptiste Lambin, Aleksei Udovenko
97-135
PDF
Cache-Timing Attack Against HQC
Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
136-163
PDF
Formally verifying Kyber
Episode IV: Implementation correctness
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
164-193
PDF
Artifacts
cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs
Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
194-220
PDF
Separating Oil and Vinegar with a Single Trace
Side-Channel Assisted Kipnis-Shamir Attack on UOV
Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
221-245
PDF
Artifacts
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling
Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
246-269
PDF
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations
Towards Analytical Attacks against 32-bit Implementations
Gaëtan Cassiers, Henri Devillez, François-Xavier Standaert, Balazs Udvarhelyi
270-293
PDF
Artifacts
JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution
Kai Schoos, Sergej Meschkov, Mehdi B. Tahoori, Dennis R. E. Gnad
294-320
PDF
Oil and Vinegar: Modern Parameters and Implementations
Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
321-365
PDF
Artifacts
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography
Aikata Aikata, Andrea Basso, Gaetan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
366-390
PDF
Artifacts
PROLEAD_SW
Probing-Based Software Leakage Detection for ARM Binaries
Jannik Zeitschner, Nicolai Müller, Amir Moradi
391-421
PDF
Artifacts
Deep Learning Side-Channel Collision Attack
Marvin Staib, Amir Moradi
422-444
PDF
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings
Patrick Longa
445-472
PDF
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
473-503
PDF
Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs
Gautam Botrel, Youssef El Housni
504-521
PDF
Artifacts
Information Bounds and Convergence Rates for Side-Channel Security Evaluators
Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
522-569
PDF
RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers
Zehong (Zephyr) Qiu, Fan Zhang, Tianxiang Feng, Xue Gong
570-596
PDF
iacr-logo