default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2019
Volume 2019, Number 1, 2019
- Pieter Robyns, Peter Quax, Wim Lamotte:
Improving CEMA using Correlation Optimization. 1-24 - Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
M&M: Masks and Macs against Physical Attacks. 25-50 - Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl:
Secure Physical Enclosures from Covers with Tamper-Resistance. 51-96 - Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan:
SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks. 97-122 - Takeshi Sugawara:
3-Share Threshold Implementation of AES S-box without Fresh Randomness. 123-145 - Keegan Ryan:
Return of the Hidden Number Problem. A Widespread and Novel Key Extraction Attack on ECDSA and DSA. 146-168 - Martin R. Albrecht, Christian Hanser, Andrea Höller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner:
Implementing RLWE-based Schemes Using an RSA Co-Processor. 169-208 - Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. 209-237 - Alexander Nilsson, Thomas Johansson, Paul Stankovski:
Error Amplification in Code-based Cryptography. 238-258 - Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina:
Practical Evaluation of Protected Residue Number System Scalar Multiplication. 259-282
Volume 2019, Number 2, 2019
- Björn Haase, Benoît Labrique:
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT. 1-48 - Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida:
Best Information is Most Successful Mutual Information and Success Rate in Side-Channel Analysis. 49-79 - Adi Akavia, Dan Feldman, Hayim Shaul:
Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets. 80-106 - Benjamin Timon:
Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis. 107-131 - Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. 132-161 - Gaëtan Cassiers, François-Xavier Standaert:
Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks. 162-198 - Claudio Bozzato, Riccardo Focardi, Francesco Palmarini:
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks. 199-224 - Matthieu Rivain, Junwei Wang:
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. 225-255 - Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert:
Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing Model are Needed. 256-292 - Itamar Levi, Davide Bellizia, François-Xavier Standaert:
Reducing a Masked Implementation's Effective Security Order with Setup Manipulations And an Explanation Based on Externally-Amplified Couplings. 293-317 - Olivier Bronchain, Tobias Schneider, François-Xavier Standaert:
Multi-Tuple Leakage Detection and the Dependent Signal Issue. 318-345
Volume 2019, Number 3, 2019
- Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu:
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers. 1-29 - Vincent Immler, Karthik Uppund:
New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions. 30-65 - Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs, Bart Preneel:
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars. 66-85 - Bicky Shakya, Hao-Ting Shen, Mark M. Tehranipoor, Domenic Forte:
Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging. 86-118 - Lauren De Meyer, Begül Bilgin, Oscar Reparaz:
Consolidating Security Notions in Hardware Masking. 119-147 - Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. 148-179 - Vadim Lyubashevsky, Gregor Seiler:
NTTRU: Truly Fast NTRU Using NTT. 180-201 - Thorben Moos:
Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments. 202-232 - Naghmeh Karimi, Thorben Moos, Amir Moradi:
Exploring the Effect of Device Aging on Static Power Analysis Attacks. 233-256 - Jean-Charles Faugère, Ludovic Perret, Jocelyn Ryckeghem:
Software Toolkit for HFE-based Multivariate Schemes. 257-304 - Dennis R. E. Gnad, Jonas Krautter, Mehdi Baradaran Tahoori:
Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices. 305-339 - Daniel J. Bernstein, Bo-Yin Yang:
Fast constant-time gcd computation and modular inversion. 340-398
Volume 2019, Number 4, 2019
- Nele Mentens, Jan Genoe, Thomas Vandenabeele, Lynn Verschueren, Dirk Smets, Wim Dehaene, Kris Myny:
Security on Plastics: Fake or Real? 1-16 - Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan:
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols. 17-61 - Masahiro Kinugawa, Daisuke Fujimoto, Yu-ichi Hayashi:
Electromagnetic Information Extortion from Electronic Devices Using Interceptor and Its Countermeasure. 62-90 - Alexander Maximov, Patrik Ekdahl:
New Circuit Minimization Techniques for Smaller and Faster AES SBoxes. 91-125 - Colin O'Flynn, Alex Dewar:
On-Device Power Analysis Across Hardware Security Domains. Stop Hitting Yourself. 126-153 - Riad S. Wahby, Dan Boneh:
Fast and simple constant-time hashing to the BLS12-381 elliptic curve. 154-179 - Bo-Yeon Sim, Jihoon Kwon, Kyu Young Choi, Jihoon Cho, Aesun Park, Dong-Guk Han:
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography. 180-212 - Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley:
Cache-Timing Attacks on RSA Key Generation. 213-242 - Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk:
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks. 243-290
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.