Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Vol. 2023 No. 4
Vol. 2023 No. 4
Published:
2023-08-31
Articles
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers
Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang
1-31
PDF
BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
32-57
PDF
Protecting Dilithium against Leakage
Revisited Sensitivity Analysis and Improved Implementations
Melissa Azouaoui, Olivier Bronchain, Gaëtan Cassiers, Clément Hoffmann, Yulia Kuzovkova, Joost Renes, Tobias Schneider, Markus Schönauer, François-Xavier Standaert, Christine van Vredendaal
58-79
PDF
MMM: Authenticated Encryption with Minimum Secret State for Masking
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
80-109
PDF
Improved Gadgets for the High-Order Masking of Dilithium
Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
110-145
PDF
Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards
Alexander May, Carl Richard Theodor Schneider
146-166
PDF
On Provable White-Box Security in the Strong Incompressibility Model
Estuardo Alpirez Bock, Chris Brzuska, Russell W. F. Lai
167-187
PDF
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant
188-210
PDF
Artifacts
Enhancing Quality and Security of the PLL-TRNG
Viktor Fischer, Florent Bernard, Nathalie Bochard, Quentin Dallison, Maciej Skórski
211-237
PDF
Artifacts
Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis
Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
238-261
PDF
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium
Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal
262-286
PDF
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors
Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
287-317
PDF
LPN-based Attacks in the White-box Setting
Alex Charlès, Aleksei Udovenko
318-343
PDF
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD
Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao
344-366
PDF
Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP
Vincent Quentin Ulitzsch, Soundes Marzougui, Alexis Bagia, Mehdi Tibouchi, Jean-Pierre Seifert
367-392
PDF
Don’t Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees
Yu Dai, Fangguo Zhang, Chang-an Zhao
393-419
PDF
Provable Secure Parallel Gadgets
Francesco Berti, Sebastian Faust, Maximilian Orlt
420-459
PDF
Pincering SKINNY by Exploiting Slow Diffusion
Enhancing Differential Power Analysis with Cluster Graph Inference
Nicolas Costes, Martijn Stam
460-492
PDF
Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations
Yufeng Tang, Zheng Gong, Bin Li, Liangju Zhao
493-522
PDF
iacr-logo