Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Volume 2019, Issue 1
Volume 2019, Issue 1
Published:
2018-11-12
Articles
Improving CEMA using Correlation Optimization
Pieter Robyns, Peter Quax, Wim Lamotte
1-24
PDF
Video
Slides
M&M: Masks and Macs against Physical Attacks
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
25-50
PDF
Video
Slides
Secure Physical Enclosures from Covers with Tamper-Resistance
Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl
51-96
PDF
Video
Slides
SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks
Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan
97-122
PDF
Video
Slides
3-Share Threshold Implementation of AES S-box without Fresh Randomness
Takeshi Sugawara
123-145
PDF
Video
Slides
Return of the Hidden Number Problem.
A Widespread and Novel Key Extraction Attack on ECDSA and DSA
Keegan Ryan
146-168
PDF
Video
Slides
Implementing RLWE-based Schemes Using an RSA Co-Processor
Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner
169-208
PDF
Video
Slides
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni
209-237
PDF
Video
Slides
Error Amplification in Code-based Cryptography
Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner
238-258
PDF
Video
Slides
Practical Evaluation of Protected Residue Number System Scalar Multiplication
Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
259-282
PDF
Video
Slides
iacr-logo