Stop the war!
Остановите войну!
for scientists:
default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2024
Volume 2024, Number 1, 2024
- Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu:
Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware. 1-26 - Anna Guinet, Georg Land, Ioan Gabriel Bucur, Tim Güneysu:
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps. 27-50 - Darshana Jayasinghe, Brian Udugama, Sri Parameswaran:
1LUTSensor: Detecting FPGA Voltage Fluctuations using LookUp Tables. 51-86 - Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, Fabien Klein:
Fast and Clean: Auditable high-performance assembly via constraint solving. 87-132 - Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. 133-156 - Amund Askeland, Svetla Nikova, Ventzislav Nikov:
Who Watches the Watchers: Attacking Glitch Detection Circuits. 157-179 - Luca Wilke, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth:
SEV-Step A Single-Stepping Framework for AMD-SEV. 180-206 - Florent Bernard, Arturo Mollinedo Garay, Patrick Haddad, Nathalie Bochard, Viktor Fischer:
Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment. 207-228 - Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar:
StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations. 229-263 - Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. 264-308 - Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas:
Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency. 309-335 - Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay:
EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis. 336-374 - Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe:
High-assurance zeroization. 375-397 - Claude Carlet, Abderrahman Daif, Sylvain Guilley, Cédric Tavernier:
Quasi-linear masking against SCA and FIA, with cost amortization. 398-432 - Vedad Hadzic, Gaëtan Cassiers, Robert Primas, Stefan Mangard, Roderick Bloem:
Quantile: Quantifying Information Leakage. 433-456 - Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, Yuval Yarom:
TeeJam: Sub-Cache-Line Leakages Strike Back. 457-500 - Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay:
CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs. 501-526 - Anisha Mukherjee, Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy:
ModHE: Modular Homomorphic Encryption Using Module Lattices Potentials and Limitations. 527-562 - Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang:
Faster Bootstrapping via Modulus Raising and Composite NTT. 563-591 - Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. 592-616
Volume 2024, Number 2, 2024
- Junhao Huang, Alexandre Adomnicai, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen:
Revisiting Keccak and Dilithium Implementations on ARMv7-M. 1-24 - Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin:
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches. 25-63 - Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau:
Single trace HQC shared key recovery with SASCA. 64-87 - Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein:
Unlock the Door to my Secrets, but don't Forget to Glitch A comprehensive analysis of flash erase suppression attacks. 88-129 - Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang:
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications. 130-153 - Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl:
Impeccable Keccak Towards Fault Resilient SPHINCS+ Implementations. 154-189 - Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju:
High-Performance Hardware Implementation of MPCitH and Picnic3. 190-214 - Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. 215-251 - Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer:
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4. 252-275 - Keng-Yu Chen, Jiun-Peng Chen:
Masking Floating-Point Number Multiplication and Addition of Falcon First- and Higher-order Implementations and Evaluations. 276-303 - Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier A. Verbel, Floyd Zweydinger:
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head. 304-328 - Hao Cheng, Daniel Page, Weijia Wang:
eLIMInate: a Leakage-focused ISE for Masked Implementation. 329-358 - Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider:
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks Application to CRYSTALS-Dilithium. 359-383 - Mathieu Des Noes:
Distribution of Signal to Noise Ratio and Application to Leakage Detection. 384-402 - Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke:
Efficient ASIC Architecture for Low Latency Classic McEliece Decoding. 403-425 - Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar:
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing. 426-450 - Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie:
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption. 451-480 - Subhadeep Banik, Francesco Regazzoni:
Compact Circuits for Efficient Möbius Transform. 481-521 - Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He:
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm. 522-544 - Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. 545-587 - Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko:
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element. 588-629 - Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu:
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion. 630-653 - Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu:
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays. 654-676 - Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu:
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication. 677-713 - Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil:
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips. 714-734 - Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. 735-768 - Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler:
High-Performance Design Patterns and File Formats for Side-Channel Analysis. 769-794 - Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin:
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption A Case Study on Crystals-Kyber. 795-818 - Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang:
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning. 819-843 - Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede:
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. 844-869 - Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez:
Impact of the Flicker Noise on the Ring Oscillator-based TRNGs. 870-889
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.