Accepted Papers
All papers are available for download from the TCHES website.
TCHES Volume 2019, Issue 1 (Published: 2018-11-12)
-
Improving CEMA using Correlation Optimization
Pieter Robyns, Peter Quax, Wim Lamotte -
M&M: Masks and Macs against Physical Attacks
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen -
Secure Physical Enclosures from Covers with Tamper-Resistance
Vincent Immler, Johannes Obermaier, Kuan Kuan Ng, Fei Xiang Ke, JinYu Lee, Yak Peng Lim, Wei Koon Oh, Keng Hoong Wee, Georg Sigl -
SMT Attack: Next Generation Attack on Obfuscated Circuits with Capabilities and Performance Beyond the SAT Attacks
Kimia Zamiri Azar, Hadi Mardani Kamali, Houman Homayoun, Avesta Sasan -
3-Share Threshold Implementation of AES S-box without Fresh Randomness
Takeshi Sugawara -
Return of the Hidden Number Problem – A Widespread and Novel Key Extraction Attack on ECDSA and DSA
Keegan Ryan -
Implementing RLWE-based Schemes Using an RSA Co-Processor
Martin R. Albrecht, Christian Hanser, Andrea Hoeller, Thomas Pöppelmann, Fernando Virdia, Andreas Wallner -
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations
Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni -
Error Amplification in Code-based Cryptography
Alexander Nilsson, Thomas Johansson, Paul Stankovski Wagner -
Practical Evaluation of Protected Residue Number System Scalar Multiplication
Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
TCHES Volume 2019, Issue 2 (Published: 2019-02-28)
-
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
Björn Haase, Benoît Labrique -
Best Information is Most Successful – Mutual Information and Success Rate in Side-Channel Analysis
Eloi de Chérisey, Sylvain Guilley, Olivier Rioul, Pablo Piantanida -
Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets
Adi Akavia, Dan Feldman, Hayim Shaul -
Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity Analysis
Benjamin Timon -
Deep Learning to Evaluate Secure RSA Implementations
Mathieu Carbone, Vincent Conin, Marie-Angela Cornélie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli -
Towards Globally Optimized Masking: From Low Randomness to Low Noise Rate – or Probe Isolating Multiplications with Reduced Randomness and Security against Horizontal Attacks
Gaëtan Cassiers, François-Xavier Standaert -
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks
Claudio Bozzato, Riccardo Focardi, Francesco Palmarini -
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations
Matthieu Rivain, Junwei Wang -
Glitch-Resistant Masking Revisited – or Why Proofs in the Robust Probing Model are Needed
Thorben Moos, Amir Moradi, Tobias Schneider, François-Xavier Standaert -
Reducing a Masked Implementation’s Effective Security Order with Setup Manipulations – And an Explanation Based on Externally-Amplified Couplings
Itamar Levi, Davide Bellizia, François-Xavier Standaert -
Multi-Tuple Leakage Detection and the Dependent Signal Issue
Olivier Bronchain, Tobias Schneider, François-Xavier Standaert
TCHES Volume 2019, Issue 3 (Published: 2019-05-09)
-
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
Xiaolu Hou, Jakub Breier, Fuyuan Zhang, Yang Liu -
New Insights to Key Derivation for Tamper-Evident Physical Unclonable Functions
Vincent Immler, Karthik Uppund -
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars
Lennert Wouters, Eduard Marin, Tomer Ashur, Benedikt Gierlichs, Bart Preneel -
Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging
Bicky Shakya, Haoting Shen, Mark Tehranipoor, Domenic Forte -
Consolidating Security Notions in Hardware Masking
Lauren De Meyer, Begül Bilgin, Oscar Reparaz -
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic -
NTTRU: Truly Fast NTRU Using NTT
Vadim Lyubashevsky, Gregor Seiler -
Static Power SCA of Sub-100 nm CMOS ASICs and the Insecurity of Masking Schemes in Low-Noise Environments
Thorben Moos -
Exploring the Effect of Device Aging on Static Power Analysis Attacks
Naghmeh Karimi, Thorben Moos, Amir Moradi -
Software Toolkit for HFE-based Multivariate Schemes
Jean-Charles Faugère, Ludovic Perret, Jocelyn Ryckeghem -
Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices
Dennis R. E. Gnad, Jonas Krautter, Mehdi B. Tahoori -
Fast constant-time gcd computation and modular inversion
Daniel J. Bernstein, Bo-Yin Yang
Volume 2019, Issue 4 (upcoming)
-
Security on Plastics: Fake or Real?
Nele Mentens, Jan Genoe, Thomas Vandenabeele, Lynn Verschueren, Dirk Smets, Wim Dehaene, Kris Myny -
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan -
Electromagnetic Information Extortion from Electronic Devices Using Interceptor, Its Countermeasure
Masahiro Kinugawa, Daisuke Fujimoto, Yuichi Hayashi -
New Circuit Minimization Techniques for Smaller, Faster AES SBoxes
Alexander Maximov, Patrik Ekdahl -
On-Device Power Analysis Across Hardware Security Domains
Colin O'Flynn, Alex Dewar -
Fast, simple constant-time hashing to the BLS12-381 elliptic curve
Riad S. Wahby, Dan Boneh -
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography
Bo-Yeon Sim, Jihoon Kwon, Kyu Young Choi, Jihoon Cho, Aesun Park, Dong-Guk Han -
Cache-Timing Attacks on RSA Key Generation
Alejandro Cabrera Aldaya, Cesar Pereida García, Luis Manuel Alvarez Tapia, Billy Bob Brumley -
The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks
Phuong Ha Nguyen, Durga Prasad Sahoo, Chenglu Jin, Kaleel Mahmood, Ulrich Rührmair, Marten van Dijk