default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2021
Volume 2021, Number 1, 2021
- Denisa O. C. Greconici, Matthias J. Kannwischer, Amber Sprenkels:
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4. 1-24 - Gabriel Zaid, Lilian Bossuet, François Dassance, Amaury Habrard, Alexandre Venelli:
Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis. 25-55 - Jan Van den Herrewegen, David F. Oswald, Flavio D. Garcia, Qais Temeiza:
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. 56-81 - Max Hoffmann, Christof Paar:
Doppelganger Obfuscation - Exploring theDefensive and Offensive Aspects of Hardware Camouflaging. 82-108 - Ben Marshall, G. Richard Newell, Dan Page, Markku-Juhani O. Saarinen, Claire Wolf:
The design of scalar AES Instruction Set Extensions for RISC-V. 109-136 - Joppe W. Bos, Andreas Hülsing, Joost Renes, Christine van Vredendaal:
Rapidly Verifiable XMSS Signatures. 137-168 - Siang Meng Sim, Dirmanto Jap, Shivam Bhasin:
DAPA: Differential Analysis aided Power Attack on (Non-) Linear Feedback Shift Registers. 169-191 - Albert Spruyt, Alyssa Milburn, Lukasz Chmielewski:
Fault Injection as an Oscilloscope: Fault Correlation Analysis. 192-216 - Erdem Alkim, Dean Yun-Li Cheng, Chi-Ming Marvin Chung, Hülya Evkan, Leo Wei-Lun Huang, Vincent Hwang, Ching-Lin Trista Li, Ruben Niederhagen, Cheng-Jhih Shih, Julian Wälde, Bo-Yin Yang:
Polynomial Multiplication in NTRU Prime Comparison of Optimization Strategies on Cortex-M4. 217-238 - Fatih Balli, Andrea Caforio, Subhadeep Banik:
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits. 239-278 - Benjamin Hettwer, Sebastien Leger, Daniel Fennes, Stefan Gehrer, Tim Güneysu:
Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine. 279-304 - Aein Rezaei Shahmirzadi, Amir Moradi:
Re-Consolidating First-Order Masking Schemes Nullifying Fresh Randomness. 305-342 - Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. 343-372 - Sébastien Duval, Pierrick Méaux, Charles Momin, François-Xavier Standaert:
Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying. 373-401 - Alexandre Adomnicai, Thomas Peyrin:
Fixslicing AES-like Ciphers New bitsliced AES speed records on ARM-Cortex M and RISC-V. 402-425 - Nicolas Costes, Martijn Stam:
Redundant Code-based Masking Revisited. 426-450 - Gustavo Banegas, Daniel J. Bernstein, Iggy van Hoof, Tanja Lange:
Concrete quantum cryptanalysis of binary elliptic curves. 451-472
Volume 2021, Number 2, 2021
- Emanuele Strieder, Christoph Frisch, Michael Pehl:
Machine Learning of Physical Unclonable Functions using Helper Data Revealing a Pitfall in the Fuzzy Commitment Scheme. 1-36 - Peter Pessl, Lukas Prokop:
Fault Attacks on CCA-secure Lattice KEMs. 37-60 - Okan Seker, Thomas Eisenbarth, Maciej Liskiewicz:
A White-Box Masking Scheme Resisting Computational and Algebraic Attacks. 61-105 - Aysajan Abidin, Mohieddine El Soussi, Jac Romme, Pepijn Boer, Dave Singelée, Christian Bachmann:
Secure, Accurate, and Practical Narrow-Band Ranging System. 106-135 - Gaëtan Cassiers, François-Xavier Standaert:
Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry. 136-158 - Chi-Ming Marvin Chung, Vincent Hwang, Matthias J. Kannwischer, Gregor Seiler, Cheng-Jhih Shih, Bo-Yin Yang:
NTT Multiplication for NTT-unfriendly Rings New Speed Records for Saber and NTRU on Cortex-M4 and AVX2. 159-188 - Gilles Barthe, Marc Gourjon, Benjamin Grégoire, Maximilian Orlt, Clara Paglialonga, Lars Porth:
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification. 189-228 - Antonio Guimarães, Edson Borin, Diego F. Aranha:
Revisiting the functional bootstrap in TFHE. 229-253 - Monika Trimoska, Sorina Ionica, Gilles Dequen:
Time-Memory Analysis of Parallel Collision Search Algorithms. 254-274 - Anirban Chakraborty, Sarani Bhattacharya, Manaar Alam, Sikhar Patranabis, Debdeep Mukhopadhyay:
RASSLE: Return Address Stack based Side-channel LEakage. 275-303 - Aein Rezaei Shahmirzadi, Dusan Bozilov, Amir Moradi:
New First-Order Secure AES Performance Records. 304-327 - Yufei Xing, Shuguo Li:
A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA. 328-356 - Johannes Tobisch, Anita Aghaie, Georg T. Becker:
Combining Optimization Objectives: New Modeling Attacks on Strong PUFs. 357-389
Volume 2021, Number 3, 2021
- Milad Bahadori, Kimmo Järvinen, Tilen Marc, Miha Stopar:
Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware. 1-27 - Alejandro Cabrera Aldaya, Billy Bob Brumley:
Online Template Attacks: Revisited. 28-59 - Gabriel Zaid, Lilian Bossuet, Amaury Habrard, Alexandre Venelli:
Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks - A Case Study on Public-Key Algorithms -. 60-96 - Ming-Shing Chen, Tung Chou, Markus Krausz:
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4. 97-124 - Ming-Shing Chen, Tung Chou:
Classic McEliece on the ARM Cortex-M4. 125-148 - Tsunato Nakai, Daisuke Suzuki, Takeshi Fujino:
Timing Black-Box Attacks: Crafting Adversarial Examples through Timing Leaks against DNNs on Embedded Devices. 149-175 - Marc Schink, Alexander Wagner, Florian Unterstein, Johann Heyszl:
Security and Trust in Open Source Security Tokens. 176-201 - Olivier Bronchain, François-Xavier Standaert:
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter. 202-234 - Xiangjun Lu, Chi Zhang, Pei Cao, Dawu Gu, Haining Lu:
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks. 235-274 - Michiel Van Beirendonck, Jan-Pieter D'Anvers, Ingrid Verbauwhede:
Analysis and Comparison of Table-based Arithmetic to Boolean Masking. 275-297 - Yusuke Naito, Yu Sasaki, Takeshi Sugawara:
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption. 298-333 - Shivam Bhasin, Jan-Pieter D'Anvers, Daniel Heinz, Thomas Pöppelmann, Michiel Van Beirendonck:
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography. 334-359 - Sam L. Thomas, Jan Van den Herrewegen, Georgios Vasilakis, Zitai Chen, Mihai Ordean, Flavio D. Garcia:
Cutting Through the Complexity of Reverse Engineering Embedded Devices. 360-389 - Davide Bellizia, Clément Hoffmann, Dina Kamel, Hanlin Liu, Pierrick Méaux, François-Xavier Standaert, Yu Yu:
Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype. 390-417 - Abhrajit Sengupta, Nimisha Limaye, Ozgur Sinanoglu:
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces. 418-440 - Tuan La, Khoa Dang Pham, Joseph Powell, Dirk Koch:
Denial-of-Service on FPGA-based Cloud Infrastructures - Attack and Defense. 441-464 - Wei Cheng, Sylvain Guilley, Claude Carlet, Jean-Luc Danger, Sihem Mesnager:
Information Leakages in Code-based Masking: A Unified Quantification Approach. 465-495 - Oleksiy Lisovets, David Knichel, Thorben Moos, Amir Moradi:
Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA. 496-519 - Anita Aghaie, Amir Moradi:
Inconsistency of Simulation and Practice in Delay-based Strong PUFs. 520-551 - Thorben Moos, Felix Wegener, Amir Moradi:
DL-LA: Deep Learning Leakage Assessment A modern roadmap for SCA evaluations. 552-598 - Dahmun Goudarzi, Thomas Prest, Matthieu Rivain, Damien Vergnaud:
Probing Security through Input-Output Separation and Revisited Quasilinear Masking. 599-640 - Olivier Bronchain, Charles Momin, Thomas Peters, François-Xavier Standaert:
Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors. 641-676 - Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. 677-707 - Aein Rezaei Shahmirzadi, Amir Moradi:
Second-Order SCA Security with almost no Fresh Randomness. 708-755 - Deepika Natarajan, Wei Dai:
SEAL-Embedded: A Homomorphic Encryption Library for the Internet of Things. 756-779 - Thorben Moos, Amir Moradi:
Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -. 780-805
Volume 2021, Number 4, 2021
- Sunghyun Jin, Sangyub Lee, Sung Min Cho, HeeSeok Kim, Seokhie Hong:
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries. 1-26 - Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu:
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. 27-56 - Claude Carlet, Sylvain Guilley, Sihem Mesnager:
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography. 57-87 - Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. 88-113 - Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, Younho Lee:
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. 114-148 - Lennert Wouters, Benedikt Gierlichs, Bart Preneel:
My other car is your car: compromising the Tesla Model X keyless entry system. 149-172 - Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, Christine van Vredendaal:
Masking Kyber: First- and Higher-Order Implementations. 173-214 - Pedro Branco, Luís Fiolhais, Manuel Goulão, Paulo Martins, Paulo Mateus, Leonel Sousa:
ROTed: Random Oblivious Transfer for embedded devices. 215-238 - Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha:
Side-Channel Protections for Picnic Signatures. 239-282 - Si Gao, Johann Großschädl, Ben Marshall, Dan Page, Thinh Hung Pham, Francesco Regazzoni:
An Instruction Set Extension to Support Software-Based Masking. 283-325 - Jingdian Ming, Huizhong Li, Yongbin Zhou, Wei Cheng, Zehua Qiao:
Revealing the Weakness of Addition Chain Based Masked SBox Implementations. 326-350 - Gustavo Banegas, Daniel J. Bernstein, Fabio Campos, Tung Chou, Tanja Lange, Michael Meyer, Benjamin Smith, Jana Sotáková:
CTIDH: faster constant-time CSIDH. 351-387 - Sara Zarei, Aein Rezaei Shahmirzadi, Hadi Soleimany, Raziyeh Salarifard, Amir Moradi:
Low-Latency Keccak at any Arbitrary Order. 388-411 - Florian Stolz, Nils Albartus, Julian Speith, Simon Klix, Clemens Nasenberg, Aiden Gula, Marc Fyrbiak, Christof Paar, Tim Güneysu, Russell Tessier:
LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security. 412-446 - Jan Richter-Brockmann, Aein Rezaei Shahmirzadi, Pascal Sasdrich, Amir Moradi, Tim Güneysu:
FIVER - Robust Verification of Countermeasures against Fault Injections. 447-473 - Jose Maria Bermudo Mera, Angshuman Karmakar, Suparna Kundu, Ingrid Verbauwhede:
Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms. 474-509 - Gregor Leander, Thorben Moos, Amir Moradi, Shahram Rasoolzadeh:
The SPEEDY Family of Block Ciphers Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures. 510-545 - Annapurna Valiveti, Srinivas Vivek:
Higher-Order Lookup Table Masking in Essentially Constant Memory. 546-586 - Yuji Koike, Takanori Isobe:
Yoroi: Updatable Whitebox Cryptography. 587-617 - Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan, Peter B. Rønne:
Batching CSIDH Group Actions using AVX-512. 618-649 - Tung Chou, Matthias J. Kannwischer, Bo-Yin Yang:
Rainbow on Cortex-M4. 650-675 - Kalle Ngo, Elena Dubrova, Qian Guo, Thomas Johansson:
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation. 676-707
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.