Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Vol. 2024 No. 2
Vol. 2024 No. 2
Published:
2024-03-12
Articles
Revisiting Keccak and Dilithium Implementations on ARMv7-M
Junhao Huang, Alexandre Adomnicăi, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
1-24
PDF
Artifacts
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin
25-63
PDF
Single trace HQC shared key recovery with SASCA
Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
64-87
PDF
Unlock the Door to my Secrets, but don’t Forget to Glitch
A comprehensive analysis of flash erase suppression attacks
Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein
88-129
PDF
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang
130-153
PDF
Impeccable Keccak
Towards Fault Resilient SPHINCS+ Implementations
Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl
154-189
PDF
High-Performance Hardware Implementation of MPCitH and Picnic3
Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju
190-214
PDF
SDitH in Hardware
Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
215-251
PDF
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer
252-275
PDF
Artifacts
Masking Floating-Point Number Multiplication and Addition of Falcon
First- and Higher-order Implementations and Evaluations
Keng-Yu Chen, Jiun-Peng Chen
276-303
PDF
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head
Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, Floyd Zweydinger
304-328
PDF
eLIMInate: a Leakage-focused ISE for Masked Implementation
Hao Cheng, Daniel Page, Weijia Wang
329-358
PDF
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
Application to CRYSTALS-Dilithium
Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider
359-383
PDF
Distribution of Signal to Noise Ratio and Application to Leakage Detection
Mathieu des Noes
384-402
PDF
Efficient ASIC Architecture for Low Latency Classic McEliece Decoding
Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke
403-425
PDF
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar
426-450
PDF
Artifacts
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption
Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie
451-480
PDF
Compact Circuits for Efficient Möbius Transform
Subhadeep Banik, Francesco Regazzoni
481-521
PDF
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm
Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He
522-544
PDF
Artifacts
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption
Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto
545-587
PDF
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko
588-629
PDF
Artifacts
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu
630-653
PDF
Artifacts
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays
Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu
654-676
PDF
Artifacts
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication
Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu
677-713
PDF
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips
Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil
714-734
PDF
Artifacts
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer
735-768
PDF
High-Performance Design Patterns and File Formats for Side-Channel Analysis
Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler
769-794
PDF
Artifacts
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
A Case Study on Crystals-Kyber
Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D’Anvers, Shivam Bhasin
795-818
PDF
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning
Ziyuan Liang, Qi’ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanhheng Lu, Fan Zhang
819-843
PDF
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
844-869
PDF
Impact of the Flicker Noise on the Ring Oscillator-based TRNGs
Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez
870-889
PDF
Artifacts
iacr-logo