Conference on Cryptographic Hardware and Embedded Systems 2019

Atlanta, USA, August 25–28, 2019

Accepted Papers

TCHES Issue 2019/1

  • Improving CEMA using Correlation Optimization
    Pieter Robyns (UHasselt - tUL - EDM), Peter Quax (UHasselt - tUL - Flanders Make - EDM), Wim Lamotte (UHasselt - tUL - EDM)
  • M&M: Masks and Macs against Physical Attacks
    Lauren De Meyer (KU Leuven), Victor Arribas (KU Leuven), Svetla Nikova (KU Leuven), Ventzislav Nikov (NXP Semiconductors), Vincent Rijmen (KU Leuven)
  • Secure Physical Enclosures from Covers with Tamper-Resistance
    Vincent Immler (Fraunhofer AISEC), Johannes Obermaier (Fraunhofer AISEC), Kuan Kuan Ng (DSO National Laboratories), Fei Xiang Ke (DSO National Laboratories), Jin Yu Lee (DSO National Laboratories), Yak Peng Lim (DSO National Laboratories), Wei Koon Oh (DSO National Laboratories), Keng Hoong Wee (DSO National Laboratories), Georg Sigl (Fraunhofer AISEC)
  • SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks
    Kimia Zamiri Azar (George Mason University), Hadi Mardani Kamali (George Mason University), Houman Homayoun (George Mason University), Avesta Sasan (George Mason University)
  • 3-Share Threshold Implementation of AES S-box without Fresh Randomness
    Takeshi Sugawara (The University of Electro-Communications)
  • Return of the Hidden Number Problem: A Widespread and Novel Key Extraction Attack on ECDSA and DSA
    Keegan Ryan (NCC Group)
  • Implementing RLWE-based Schemes Using an RSA Co-Processor
    Martin R. Albrecht (Information Security Group, Royal Holloway, University of London), Christian Hanser (Infineon Technologies Austria AG), Andrea Hoeller (Infineon Technologies Austria AG), Thomas Pöppelmann (Infineon Technologies AG), Fernando Virdia (Information Security Group, Royal Holloway, University of London), Andreas Wallner (Infineon Technologies Austria AG)
  • The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
    Stjepan Picek (Delft University of Technology, Delft, The Netherlands, LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS)), Annelie Heuser (Univ Rennes, Inria, CNRS, IRISA), Alan Jovic (University of Zagreb Faculty of Electrical Engineering and Computing), Shivam Bhasin (Physical Analysis and Cryptographic Engineering, Temasek Laboratories at Nanyang Technological University), Francesco Regazzoni (University of Lugano)
  • Error Amplification in Code-based Cryptography
    Alexander Nilsson (Dept. of Electrical and Information Technology, Lund University, Sweden and Advenica AB, Malmö) Thomas Johansson (Dept. of Electrical and Information Technology, Lund University) Paul Stankovski Wagner (Dept. of Electrical and Information Technology, Lund University)
  • Practical Evaluation of Protected Residue Number System Scalar Multiplication
    Louiza Papachristodoulou (Radboud University), Apostolos P. Fournaris (University of Patras), Kostas Papagiannopoulos (Radboud University), Lejla Batina (Radboud University)