CHES 2020

14–18 Sep 2020

Virtual Conference

Accepted Papers

TCHES 2020, issue 1

  1. Methodology for Efficient CNN Architectures in Profiling Attacks

    Gabriel Zaid; Lilian Bossuet; Amaury Habrard; Alexandre Venelli
    Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France

  2. Recovering the CTR_DRBG state in 256 traces

    Lauren De Meyer
    COSIC - KU Leuven

  3. Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers

    Yusuke Naito; Takeshi Sugawara
    Mitsubishi Electric Corporation; The University of Electro-Communications

  4. SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

    Shivam Bhasin; Jakub Breier; Xiaolu Hou; Dirmanto Jap; Romain Poussier; Siang Meng Sim
    Temasek Laboratories, NTU, Singapore; School of Computer Science and Engineering, NTU, Singapore; School of Computing, NUS, Singapore; Temasek Laboratories, NTU, Singapore; Temasek Laboratories, NTU, Singapore; DSO National Laboratories, Singapore

  5. Power Analysis on NTRU Prime

    Wei-Lun Huang; Jiun-Peng Chen; Bo-Yin Yang
    Academia Sinica, Taiwan; Academia Sinica, Taiwan; Academia Sinica, Taiwan

  6. Share-slicing: Friend or Foe?

    Si Gao; Ben Marshall; Dan Page; Elisabeth Oswald
    University of Bristol; University of Bristol; University of Bristol; University of Bristol;University of Klagenfurt, Klagenfurt, Austria

  7. CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme

    Bicky Shakya; Xiaolin Xu; Mark Tehranipoor; Domenic Forte
    University of Florida; University of Illinois, Chicago; University of Florida; University of Florida

  8. Improved Heuristics for Short Linear Programs

    Quan Quan Tan; Thomas Peyrin
    Nanyang Technological University, Singapore; Nanyang Technological University, Singapore

  9. Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung

    Daniel Genkin; Romain Poussier; Rui Qi Sim; Yuval Yarom; Yuanjing Zhao
    University of Michigan; Nanyang Technological University; University of Adelaide; University of Adelaide and Data61; University of Adelaide

  10. TEDT, a Leakage-Resistant AEAD Mode for High Physical Security Applications

    Francesco Berti; Chun Guo; Olivier Pereira; Thomas Peters; François-Xavier Standaert
    Université catholique de Louvain; Shandong University; Université catholique de Louvain; Université catholique de Louvain; Université catholique de Louvain

  11. Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX

    Tianlin Huo; Xiaoni Meng; Wenhao Wang; Chunliang Hao; Pei Zhao; Jian Zhai; Mingshu Li
    Institute of Software, CAS; Institute of Software, CAS; Institute of Information Engineering, CAS; China Electronics Standardization Institute; Institute of Software, CAS; Institute of Software, CAS; Institute of Software, CAS

  12. A Comprehensive Study of Deep Learning for Side-Channel Analysis

    Loïc Masure; Cécile Dumas; Emmanuel Prouff
    Univ. Grenoble Alpes, CEA, LETI, DSYS, CESTI; Univ. Grenoble Alpes, CEA, LETI, DSYS, CESTI; ANSSI, FRANCE

TCHES 2020, issue 2

  1. Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations

    Olivier Bronchain; François-Xavier Standaert
    ICTEAM Institute, UCLouvain; ICTEAM Institute, UCLouvain

  2. A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery

    Ziyue Zhang; A. Adam Ding; Yunsi Fei
    Northeastern University; Northeastern University; Northeastern University

  3. Highly Efficient Architecture of NewHope-NIST on FPGA using Low-Complexity NTT/INTT

    Neng Zhang; Bohan Yang; Chen Chen; Shouyi Yin; Shaojun Wei; Leibo Liu
    Institute of Microelectronics, Tsinghua University, Beijing, 100084, China.; Institute of Microelectronics, Tsinghua University, Beijing, 100084, China.; Institute of Microelectronics, Tsinghua University, Beijing, 100084, China.; Institute of Microelectronics, Tsinghua University, Beijing, 100084, China.; Institute of Microelectronics, Tsinghua University, Beijing, 100084, China.; Institute of Microelectronics, Tsinghua University, Beijing, 100084, China.

  4. FENL: an ISE to mitigate analogue micro-architectural leakage

    Si Gao; Ben Marshall; Dan Page; Thinh Pham
    University of Bristol; University of Bristol; University of Bristol; University of Bristol

  5. Dismantling DST80-based Immobiliser Systems

    Lennert Wouters; Jan Van den Herrewegen; Flavio D. Garcia; David Oswald; Benedikt Gierlichs; Bart Preneel
    imec-COSIC, KU Leuven; School of Computer Science, University of Birmingham, UK; School of Computer Science, University of Birmingham, UK; School of Computer Science, University of Birmingham, UK; imec-COSIC, KU Leuven; imec-COSIC, KU Leuven

  6. Efficient and Private Computations with Code-Based Masking

    Weijia Wang; Pierrick Méaux; Gaëtan Cassiers; François-Xavier Standaert
    ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium; ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium; ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium; ICTEAM/ELEN/Crypto Group, Université catholique de Louvain, Belgium

  7. Persistent Fault Attack in Practice

    Fan Zhang; Yiran Zhang; Huilong Jiang; Xiang Zhu; Shivam Bhasin; Xinjie Zhao; Zhe Liu; Dawu Gu; Kui Ren
    Zhejiang University; Zhejiang University; Chinese Academy of Sciences; Chinese Academy of Sciences; Nanyang Technological University; Institute of North Electronic Equipment; Nanjing University of Aeronautics and Astronautics; Shanghai Jiaotong University; Zhejiang University

  8. When one vulnerable primitive turns viral: Novel single trace attacks on ECDSA and RSA

    Alejandro Cabrera Aldaya; Billy Bob Brumley
    Tampere University, Finland; Tampere University, Finland

  9. Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography

    Jose Maria Bermudo Mera; Angshuman Karmakar; Ingrid Verbauwhede
    imec-COSIC, KU Leuven; imec-COSIC, KU Leuven; imec-COSIC, KU Leuven

  10. A Compact and Scalable Hardware/Software Co-design of SIKE

    Pedro Maat C. Massolino; Patrick Longa; Joost Renes; Lejla Batina
    Radboud University, Nijmegen, the Netherlands; Microsoft Research, USA; Radboud University, Nijmegen, the Netherlands; Radboud University, Nijmegen, the Netherlands

  11. FEDS: Comprehensive Fault Attack Exploitability Detection for Software Implementations of Block Ciphers

    Keerthi K; Indrani Roy; Chester Rebeiro; Aritra Hazra; Swarup Bhunia
    IIT Madras; IIT Madras; IIT Madras; IIT Kharagpur; University of Florida

  12. Low-Latency Hardware Masking with Application to AES

    Pascal Sasdrich; Begül Bilgin; Michael Hutter; Mark Marson
    Ruhr-Universität Bochum; Rambus Inc.; Rambus Inc.; Rambus Inc.

  13. On the Security Goals of White-box Cryptography

    Estuardo Alpirez Bock; Alessandro Amadori; Chris Brzuska; Wil Michiels
    Aalto University; TU Eindhoven; Aalto University; TU Eindhoven and NXP Semiconductors

TCHES 2020, issue 3

  1. Strengthening Sequential Side-Channel Attacks Through Change Detection

    Luca Frittoli; Matteo Bocchi; Silvia Mella; Diego Carrera; Beatrice Rossi; Pasqualina Fragneto; Ruggero Susella; Giacomo Boracchi
    Politecnico di Milano; STMicroelectronics; STMicroelectronics; STMicroelectronics; STMicroelectronics; STMicroelectronics; STMicroelectronics; Politecnico di Milano

  2. Investigating Profiled Side-Channel Attacks Against the DES Key Schedule

    Johann Heyszl; Katja Miller; Florian Unterstein; Marc Schink; Alexander Wagner; Horst Gieser; Sven Freud; Tobias Damm; Dominik Klein; Dennis Kügler
    Fraunhofer AISEC; Fraunhofer AISEC; Fraunhofer AISEC; Fraunhofer AISEC; Fraunhofer AISEC; Fraunhofer EMFT; Bundesamt für Sicherheit in der Informationstechnik; Bundesamt für Sicherheit in der Informationstechnik; Bundesamt für Sicherheit in der Informationstechnik; Bundesamt für Sicherheit in der Informationstechnik

  3. A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis and Its Extended Application to Imbalanced Data

    Jiajia Zhang; Mengce Zheng; Jiehui Nan; Honggang Hu; Nenghai Yu
    Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Sicence and Technology of China; Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Sicence and Technology of China; Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Sicence and Technology of China; Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Sicence and Technology of China; Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Sicence and Technology of China

  4. Splitting the Interpose PUF: A Novel Modeling Attack Strategy

    Nils Wisiol; Christopher Mühl; Niklas Pirnay; Phuong Ha Nguyen; Marian Margraf; Jean-Pierre Seifert; Marten van Dijk; Ulrich Rührmair
    Technische Universität Berlin and Freie Universität Berlin; Technische Universität Berlin; Technische Universität Berlin; University of Connecticut; Freie Universität Berlin; Technische Universität Berlin; University of Connecticut and CWI Amsterdam; LMU München and University of Connecticut

  5. CPAmap: On the Complexity of Secure FPGA Virtualization, Multi-Tenancy, and Physical Design

    Jonas Krautter; Dennis Gnad; Mehdi Tahoori
    Karlsruhe Institute of Technology; Karlsruhe Institute of Technology; Karlsruhe Institute of Technology

  6. Revisiting a Methodology for Efficient CNN Architectures in Profiling Attacks

    Lennert Wouters; Victor Arribas; Benedikt Gierlichs; Bart Preneel
    imec-COSIC, KU Leuven; imec-COSIC, KU Leuven; imec-COSIC, KU Leuven; imec-COSIC, KU Leuven

  7. JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms

    Zane Weissman; Thore Tiemann; Daniel Moghimi; Evan Custodio; Thomas Eisenbarth; Berk Sunar
    Worcester Polytechnic Institute; University of Luebeck; Worcester Polytechnic Institute; Intel Corporation; University of Luebeck; Worcester Polytechnic Institute

  8. The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10

    Daniel De Almeida Braga; Pierre-Alain Fouque; Mohamed Sabt
    Univ Rennes, CNRS, IRISA; Univ Rennes, CNRS, IRISA; Univ Rennes, CNRS, IRISA

  9. ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V

    Erdem Alkim; Hülya Evkan; Norman Lahr; Ruben Niederhagen; Richard Petri
    Fraunhofer SIT, Ondokuz May?s University; Fraunhofer SIT; Fraunhofer SIT; Fraunhofer SIT; Fraunhofer SIT

  10. Single-Trace Attacks on Keccak

    Matthias J. Kannwischer; Peter Pessl; Robert Primas
    Radboud University, Nijmegen, The Netherlands; Graz University of Technology, Austria; Graz University of Technology, Austria

  11. Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA

    Wen Wang; Shanquan Tian; Bernhard Jungk; Nina Bindel; Patrick Longa; Jakub Szefer
    Yale University, USA; Yale University, USA; MAN Truck & Bus SE, Germany; University of Waterloo, Canada; Microsoft Research, USA; Yale University, USA

  12. Generic Side-channel attacks on CCA-secure lattice-based PKE and KEMs

    PRASANNA RAVI; SUJOY SINHA ROY; ANUPAM CHATTOPADHYAY; SHIVAM BHASIN
    Temasek Labs, School of Computer Science and Engineering, Nanyang Technological University, Singapore; University of Birmingham, UK; School of Computer Science and Engineering, Temasek Labs, Nanyang Technological University, Singapore; Temasek Labs, Nanyang Technological University, Singapore

  13. Cortex-M4 optimizations for {R,M}LWE schemes

    Erdem Alkim; Yusuf Alper Bilgin; Murat Cenk; François Gérard
    Department of Computer Engineering, Ondokuz Mayis University, Samsun, Turkey - Fraunhofer SIT, Darmstadt, Germany; Aselsan Inc., Ankara, Turkey - Institute of Applied Mathematics, Middle East Technical University, Ankara, Turkey; Institute of Applied Mathematics, Middle East Technical University, Ankara, Turkey; Université libre de Bruxelles, Brussels, Belgium

  14. Understanding Screaming Channels: From a Detailed Analysis to Improved Attacks

    Giovanni Camurati; Aurélien Francillon; François-Xavier Standaert
    EURECOM; EURECOM; Université catholique de Louvain

  15. Fixslicing: A New GIFT Representation

    Alexandre Adomnicai; Zakaria Najm; Thomas Peyrin
    Nanyang Technological University, Temasek Laboratories; Nanyang Technological University, Temasek Laboratories, TU Delft; Nanyang Technological University, Temasek Laboratories

  16. From A to Z: Projective coordinates leakage in the wild

    Alejandro Cabrera Aldaya; Cesar Pereida García; Billy Bob Brumley
    Tampere University; Tampere University; Tampere University

  17. Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks

    Louis Goubin; Matthieu Rivain; Junwei Wang
    Université Paris-Saclay, UVSQ, CNRS, Laboratoire de Mathématiques de Versailles; CryptoExperts; CryptoExperts, University of Luxembourg, Université Paris 8

  18. High-Speed Masking for Polynomial Comparison in Lattice-based KEMs

    Florian Bache; Clara Paglialonga; Tobias Oder; Tobias Schneider; Tim Güneysu
    Ruhr-Universität Bochum, Germany; Technische Universität Darmstadt, Germany; Ruhr-Universität Bochum, Germany; NXP Semiconductors Austria, Gratkorn, Austria; Ruhr-Universität Bochum, Germany

  19. Protecting against Statistical Ineffective Fault Attacks

    Joan Daemen; Christoph Dobraunig; Maria Eichlseder; Hannes Gross; Florian Mendel; Robert Primas
    Radboud University, Nijmegen, The Netherlands; Radboud University, Nijmegen, The Netherlands and Graz University of Technology, Graz, Austria; Graz University of Technology, Graz, Austria; SGS Digital Trust Services GmbH, Graz, Austria; Infineon Technologies AG, Neubiberg, Germany; Graz University of Technology, Graz, Austria

TCHES 2020, issue 4

  1. A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed Passwords

    Zhendong Zhang; Peng Liu
    Zhejiang University; Zhejiang University

  2. On the spectral features of robust probing security

    Maria Chiara Molteni; Vittorio Zaccaria
    Università degli studi di Milano; Politecnico di Milano

  3. Plaintext: A Missing Feature for Enhancing the Power of Deep Learning in Side-Channel Analysis?

    Anh-Tuan Hoang; Neil Hanley; Maire O
    Centre for Secure Information Technologies (CSIT), ECIT, Queen; Centre for Secure Information Technologies (CSIT), ECIT, Queen; Centre for Secure Information Technologies (CSIT), ECIT, Queen

  4. Rejection Sampling Schemes for Extracting Uniform Distribution from Biased PUFs

    Rei Ueno; Kohei Kazumori; Naofumi Homma
    Tohoku University; Tohoku University; Tohoku University

  5. Second-Order Masked Lookup Table Compression Scheme

    Annapurna Valiveti; Srinivas Vivek
    IIIT Bangalore, IN; IIIT Bangalore, IN

  6. Improving the Performance of the Picnic Signature Scheme

    Daniel Kales; Greg Zaverucha
    Graz University of Technology; Microsoft Research

  7. Faster Montgomery and double-add ladders for short Weierstrass curves

    Mike Hamburg
    Rambus Inc

  8. Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint

    Qian Guo; Vincent Grosso; François-Xavier Standaert; Olivier Bronchain
    Lund University, Sweden; Universite de Lyon, France; UCLouvain, Belgium; UCLouvain, Belgium

  9. RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography

    Tim Fritzmann; Georg Sigl; Johanna Sepúlveda
    Technical University of Munich, Department of Electrical and Computer Engineering, Chair of Security in Information Technology; Technical University of Munich, Department of Electrical and Computer Engineering, Chair of Security in Information Technology; AIRBUS Defence and Space GmbH

  10. Minerva: The curse of ECDSA nonces

    Jan Jancar; Vladimir Sedlacek; Petr Svenda; Marek Sys
    Masaryk University; Masaryk University, Ca’ Foscari University of Venice; Masaryk University; Masaryk University

  11. DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering

    Nils Albartus; Max Hoffman; Sebastian Temme; Leonid Azriel; Christof Paar
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Technion - Israel Institute of Technology, Haifa, Israel; Max Planck Institute for Security and Privacy, Bochum, Germany

  12. Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis

    Guilherme Perin; Lukasz Chmielewski; Stjepan Picek
    Delft University of Technology, Riscure BV, The Netherlands; Riscure BV, The Netherlands; Delft University of Technology, The Netherlands

  13. Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers

    Florian Unterstein; Marc Schink; Thomas Schamberger; Lars Tebelmann; Manuel Ilg; Johann Heyszl
    Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany; Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany; Technical University of Munich, Germany, Department of Electrical and Computer Engineering, Chair of Security in Information Technology; Technical University of Munich, Germany, Department of Electrical and Computer Engineering, Chair of Security in Information Technology; Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany; Fraunhofer Institute for Applied and Integrated Security (AISEC), Germany

  14. Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders

    Lichao Wu; Stjepan Picek
    TU Delft, The Netherlands; TU Delft, The Netherlands

  15. Unrolled Cryptography on Silicon - A Physical Security Analysis

    Thorben Moos
    Ruhr University Bochum, Horst Görtz Institute for IT Security

  16. High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware

    Sujoy Sinha Roy; Andrea Basso
    University of Birmingham; University of Birmingham