Conference on Cryptographic Hardware and Embedded Systems 2018

Amsterdam, The Netherlands, September 9–12, 2018

Accepted Papers

TCHES Issue 2018/1

  • Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
    Philipp Koppermann (Fraunhofer Research Institution), Fabrizio De Santis (Siemens AG), Johann Heyszl (Fraunhofer Research Institution), Georg Sigl (Fraunhofer Research Institution, Technische Universität München)
  • FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256
    Dorian Amiet (IMES Institut für Mikroelektronik und Embedded Systems), Andreas Curiger (Securosys SA), Paul Zbinden (IMES Institut für Mikroelektronik und Embedded Systems)
  • High Order Masking of Look-up Tables with Common Shares
    Jean-Sébastien Coron (University of Luxembourg), Franck Rondepierre (IDEMIA), Rina Zeitoun (IDEMIA)
  • EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread
    Daniel Dinu (University of Luxembourg), Ilya Kizhvatov (Radboud University)
  • A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF
    Kai-Hsin Chuang (imec-COSIC), Robin Degraeve (imec-COSIC), Andrea Fantini (imec-COSIC), Guido Groeseneken (imec-COSIC), Dimitri Linten (imec-COSIC), Ingrid Verbauwhede (imec-COSIC)
  • Linear Repairing Codes and Side-Channel Attacks
    Hervé Chabanne (IDEMIA, Télécom Paristech), Houssem Maghrebi (Underwriters Laboratories), Emmanuel Prouff (ANSSI)
  • Practical CCA2-Secure and Masked Ring-LWE Implementation
    Tobias Oder (Ruhr-Universität Bochum), Tobias Schneider (Université Catholique de Louvain), Thomas Pöppelmann (Infineon Technologies AG), Tim Güneysu (Ruhr-Universität Bochum)
  • Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods
    Axel Mathieu-Mahias (University of Versailles-St-Quentin-en-Yvelines), Michaël Quisquater (University of Versailles-St-Quentin-en-Yvelines)
  • Leakage Detection with the x2-Test
    Amir Moradi (Ruhr-Universität Bochum), Bastian Richter (Ruhr-Universität Bochum), Tobias Schneider (Université Catholique de Louvain), François-Xavier Standaert (Université Catholique de Louvain)
  • CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme
    Léo Ducas (CWI), Eike Kiltz (Ruhr-Universität Bochum), Tancrède Lepoint (SRI International), Vadim Lyubashevsky (IBM Research), Peter Schwabe (Radboud University), Gregor Seiler (IBM Research), Damien Stehlé (ENS de Lyon)
  • Rhythmic Keccak: SCA Security and Low Latency in HW
    Victor Arribas (KU Leuven), Begül Bilgin (KU Leuven), George Petrides (Vrije Universiteit Brussel), Svetla Nikova (KU Leuven), Vincent Rijmen (KU Leuven)

TCHES Issue 2018/2

  • Generic Low-Latency Masking in Hardware
    Hannes Gross (TU Graz), Rinat Iusupov (TU Graz), Roderick Bloem (TU Graz)
  • Improved High-Order Conversion From Boolean to Arithmetic Masking
    Luk Bettale (IDEMIA), Jean-Sébastien Coron (University of Luxembourg), Rina Zeitoun (IDEMIA)
  • Dismantling the AUT64 Automotive Cipher
    Christopher Hicks (University of Birmingham), Flavio Garcia (University of Birmingham), David Oswald (University of Birmingham)
  • High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA
    Ahmad Al Badawi (National University of Singapore, A*STAR), Bharadwaj Veeravalli (National University of Singapore), Chan Fook Mun (A*STAR), Khin Mi Mi Aung (A*STAR)
  • Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code
    Jakub Breier (Nanyang Technological University), Xiaolu Hou (Nanyang Technological University), Yang Liu (Nanyang Technological University)
  • Hardware Masking, Revisited
    Thomas De Cnudde (KU Leuven), Maik Ender (Ruhr-Universität Bochum), Amir Moradi (Ruhr-Universität Bochum)
  • Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack
    Gildas Avoine (Université de Rennes, Institut Universitaire de France), Loïc Ferreira (Université de Rennes, Orange Labs)
  • CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
    Fergus Dall (University of Adelaide), Gabrielle De Micheli (University of Pennsylvania), Thomas Eisenbarth (University of Lübeck, Worcester Polytechnic Institute), Daniel Genkin (University of Pennsylvania, University of Maryland), Nadia Heninger (University of Pennsylvania), Ahmad Moghimi (Worcester Polytechnic Institute), Yuval Yarom (University of Adelaide, Data61)
  • SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
    Yusuke Naito (Mitsubishi Electric Corporation), Mitsuru Matsui (Mitsubishi Electric Corporation), Takeshi Sugawara (University of Electro-Communications), Daisuke Suzuki (Mitsubishi Electric Corporation)
  • Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers
    Avik Chakraborti (NTT Secure Platform Laboratories), Nilanjan Datta (Indian Institute of Technology, Kharagpur), Mridul Nandi (Indian Statistical Institute, Kolkata), Kan Yasuda (NTT Secure Platform Laboratories)
  • ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers
    Sayandeep Saha (Indian Institute of Technology, Kharagpur), Debdeep Mukhopadhyay (Indian Institute of Technology, Kharagpur), Pallab Dasgupta (Indian Institute of Technology, Kharagpur)
  • Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead
    Max Hoffmann (Ruhr-Universität Bochum), Christof Paar (Ruhr-Universität Bochum)
  • Smashing the Implementation Records of AES S-box
    Arash Reyhani-Masoleh (Western University), Mostafa Taha (Western University), Doaa Ashmawy (Western University)

TCHES Issue 2018/3

  • SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
    Hwajeong Seo (Hansung University), Zhe Liu (Nanjing University), Patrick Longa (Microsoft Research), Zhi Hu (Central South University)
  • Differential Fault Attacks on Deterministic Lattice Signatures
    Leon Groot Bruinderink (Technische Universiteit Eindhoven), Peter Pessl (TU Graz)
  • FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES
    Jonas Krautter (Karlsruhe Institute of Technology), Dennis R.E. Gnad (Karlsruhe Institute of Technology), Mehdi B. Tahoori (Karlsruhe Institute of Technology)
  • Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication for SHE Acceleration
    Joël Cathébras (CEA), Alexandre Carbon (CEA), Peter Milder (Stony Brook University), Renaud Sirdey (CEA), Nicolas Ventroux (CEA)
  • Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model
    Sebastian Faust (TU Darmstadt), Vincent Grosso (Radboud University), Santos Merino Del Pozo (Université catholique de Louvain, DarkMatter LLC), Clara Paglialonga (TU Darmstadt), François-Xavier Standaert (Université catholique de Louvain)
  • On Recovering Affine Encodings in White-Box Implementations
    Patrick Derbez (Université de Rennes), Pierre-Alain Fouque (Université de Rennes), Baptiste Lambin (Université de Rennes), Brice Minaud (Royal Holloway, University of London)
  • Persistent Fault Analysis on Block Ciphers
    Fan Zhang (Zhejiang University), Xiaoxuan Lou (Zhejiang University), Xinjie Zhao (The Institute of North Electronic Equipment), Shivam Bhasin (Nanyang Technological University), Wei He (Huawei Ltd.), Ruyi Ding (Zhejiang University, Georgia Institute of Technology), Samiya Qureshi (Zhejiang University), Kui Ren (Zhejiang University)
  • Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
    Martin R. Albrecht (Royal Holloway, University of London), Amit Deo (Royal Holloway, University of London), Kenneth G. Paterson (Royal Holloway, University of London)
  • Evaluation and monitoring of free running oscillators serving as source of randomness
    Elie Noumon Allini (University of Lyon), Maciej Skórski (IST Austria), Oto Petura (University of Lyon), Florent Bernard (University of Lyon), Marek Laban (University of Košice), Viktor Fischer (University of Lyon)
  • Saber on ARM: CCA-secure module lattice-based key encapsulation on ARM
    Angshuman Karmakar (imec-COSIC), Jose Maria Bermudo Mera (imec-COSIC), Sujoy Sinha Roy (imec-COSIC), Ingrid Verbauwhede (imec-COSIC)
  • ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling
    Bohan Yang (imec-COSIC), Vladimir Rožić (imec-COSIC), Miloš Grujić (imec-COSIC), Nele Mentens (imec-COSIC), Ingrid Verbauwhede (imec-COSIC)
  • On the Difficulty of FSM-based Hardware Obfuscation
    Marc Fyrbiak (Ruhr-Universität Bochum), Sebastian Wallat (University of Massachusetts Amherst), Jonathan Dèchelotte (University of Massachusetts Amherst), Nils Albartus (Ruhr-Universität Bochum), Sinan Böcker (Ruhr-Universität Bochum), Russell Tessier (University of Massachusetts Amherst), Christof Paar (Ruhr-Universität Bochum)
  • New Bleichenbacher Records: Fault Attacks on qDSA Signatures
    Takahashi (Kyoto University), Mehdi Tibouchi (Kyoto University, NTT Secure Platform Laboratories), Masayuki Abe (Kyoto University, NTT Secure Platform Laboratories)
  • title: Standard Lattice-Based Key Encapsulation on Embedded Devices
    James Howe (University of Bristol), Tobias Oder (Ruhr-Universität Bochum), Markus Krausz (Ruhr-Universität Bochum), Tim Güneysu (Ruhr-Universität Bochum, DFKI)
  • Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks
    Okan Seker (Universitat zu Lubeck), Abraham Fernandez-Rubio (Intel), Rainer Steinwandt (Florida Atlantic University), Thomas Eisenbarth (Universitat zu Lubeck)
  • Multiplicative Masking for AES in Hardware
    Lauren De Meyer (imec-COSIC), Oscar Reparaz (imec-COSIC, Square Inc.), Begül Bilgin (imec-COSIC)
  • FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data
    Jin Hyung Park (Korea University), Dong Hoon Lee (Korea University)
  • Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -
    Aesun Park (Kookmin University), Kyung-Ah Shim (NIMS), Namhun Koo (NIMS), Dong-Guk Han (Kookmin University)
  • Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information
    Kostas Papagiannopoulos (Radboud University)
  • SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
    Christoph Dobraunig (TU Graz), Maria Eichlseder (TU Graz), Thomas Korak (Infineon Technologies AG), Stefan Mangard (TU Graz), Florian Mendel (Infineon Technologies AG), Robert Primas (TU Graz)
  • Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
    Heiko Lohrke (TU Berlin), Shahin Tajik (University of Florida), Thilo Krachenfels (TU Berlin), Christian Boit (TU Berlin), Jean-Pierre Seifert (TU Berlin)
  • Spin Me Right Round: Rotational Symmetry for FPGA-Specific AES
    Lauren De Meyer (imec-COSIC), Amir Moradi (Ruhr-Universität Bochum), Felix Wegener (Ruhr-Universität Bochum)
  • Efficient Side-Channel Protections of ARX Ciphers
    Bernhard Jungk (Fraunhofer Singapore), Richard Petri (Fraunhofer SIT), Marc Stöttinger (Continental Teves)