CHES 2021

September 13–17, 2021

Virtual Conference

Accepted Papers

TCHES 2021, issue 1

  1. Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

    Denisa O. C. Greconici; Matthias J. Kannwischer; Daan Sprenkels
    Radboud University; Max Planck Institute for Security and Privacy; Radboud University

  2. Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis

    Gabriel Zaid; Lilian Bossuet; François Dassance; Amaury Habrard; Alexandre Venelli
    Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France

  3. Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis

    Jan Van den Herrewegen; David Oswald; Flavio Garcia; Qais Temeiza
    The University of Birmingham; The University of Birmingham; The University of Birmingham; Independent Researcher

  4. Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging

    Max Hoffmann; Christof Paar
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany

  5. The design of scalar AES Instruction Set Extensions for RISC-V

    Ben Marshall; G. Richard Newell; Dan Page; Markku-Juhani O. Saarinen; Claire Wolf
    University of Bristol; Microchip Technology; University of Bristol; PQShield; Symbiotic EDA

  6. Rapidly Verifiable XMSS Signatures

    Joppe W. Bos; Andreas Hülsing; Joost Renes; Christine van Vredendaal
    NXP Semiconductors; Eindhoven University of Technology; NXP Semiconductors; NXP Semiconductors

  7. DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers

    Siang Meng Sim; Dirmanto Jap; Shivam Bhasin
    DSO National Laboratories; Temasek Laboratories, NTU Singapore; Temasek Laboratories, NTU Singapore

  8. Fault Injection as an Oscilloscope: Fault Correlation Analysis

    Albert Spruyt; Alyssa Milburn; Lukasz Chmielewski
    ; Vrije Universiteit Amsterdam; Radboud University

  9. Polynomial Multiplication in NTRU Prime

    Erdem Alkim; Dean Yun-Li Cheng; Chi-Ming Marvin Chung; Hülya Evkan; Leo Wei-Lun Huang; Vincent Hwang; Ching-Lin Trista Li; Ruben Niederhagen; Cheng-Jhih Shih; Julian Wälde; Bo-Yin Yang
    Ondokuz Mayis University; Academia Sinica; Academia Sinica; Fraunhofer SIT; Academia Sinica; Academia Sinica; Academia Sinica; University of Southern Denmark; Academia Sinica; Fraunhofer SIT; Academia Sinica

  10. The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

    Fatih Balli; Andrea Caforio; Subhadeep Banik
    EPFL Switzerland; EPFL Switzerland; EPFL Switzerland

  11. Side-Channel Analysis of the Xilinx ZYNQ Ultrascale+ Encryption Engine

    Benjamin Hettwer; Sebastien Leger; Daniel Fennes; Stefan Gehrer; Tim Güneysu
    Robert Bosch GmbH, Corporate Sector Research, Stuttgart, Germany; Robert Bosch GmbH, Corporate Sector Research, Stuttgart, Germany; Ruhr University Bochum, Bochum, Germany; Robert Bosch LLC, Pittsburgh, USA; Ruhr University Bochum, Bochum, Germany

  12. Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness

    Aein Rezaei Shahmirzadi; Amir Moradi
    Ruhr University Bochum; Ruhr University Bochum

  13. Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

    Guilherme Perin; Lukasz Chmielewski; Lejla Batina; Stjepan Picek
    Delft University of Technology; Riscure BV, Radboud University Nijmegen; Radboud University Nijmegen; Delft University of Technology

  14. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding (Towards Secure and Efficient Fresh Re-Keying)

    Sébastien Duval; Pierrick Méaux; Charles Momin; François-Xavier Standaert
    UCLouvain; UCLouvain; UCLouvain; UCLouvain

  15. Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V

    Alexandre Adomnicai; Thomas Peyrin
    Nanyang Technological University; Nanyang Technological University

  16. Redundant Code-based Masking Revisited

    Nicolas Costes; Martijn Stam
    Simula UiB; Simula UiB

  17. Concrete quantum cryptanalysis of binary elliptic curves

    Gustavo Banegas; Daniel J. Bernstein; Iggy van Hoof; Tanja Lange
    Chalmers University of Technology; University of Illinois, Ruhr University Bochum; Eindhoven University of Technology; Eindhoven University of Technology

TCHES 2021, issue 2

  1. Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme

    Emanuele Strieder; Christoph Frisch; Michael Pehl
    Fraunhofer Institute for Applied and Integrated Security AISEC; Technical University of Munich

  2. Fault Attacks on CCA-secure Lattice KEMs

    Peter Pessl; Lukas Prokop
    Infineon Technologies; Graz University of Technology

  3. Combining Optimization Objectives: New Modeling Attacks on Strong PUFs

    Johannes Tobisch; Anita Aghaie; Georg T. Becker
    Max Planck Institute for Security and Privacy, Bochum; Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum; DCSO, Berlin

  4. A White-Box Masking Scheme Resisting Computational and Algebraic Attacks

    Okan Seker; Thomas Eisenbarth; Maciej Liskiewicz
    University of Lübeck

  5. Secure, Accurate, and Practical Narrow-Band Ranging System

    Aysajan Abidin; Mohieddine El Soussi; Jac Romme; Pepijn Boer; Dave Singelée; Christian Bachmann
    imec-COSIC KU Leuven; imec, The Netherlands

  6. Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

    Gaëtan Cassiers; François-Xavier Standaert
    UCLouvain

  7. NTT Multiplication for NTT-unfriendly Rings

    Chi-Ming Marvin Chung; Vincent Hwang; Matthias J. Kannwischer; Gregor Seiler; Cheng-Jhih Shih; Bo-Yin Yang
    National Taiwan University and Academia Sinica; Max Planck Institute for Security and Privacy; IBM Research, Zurich; Academia Sinica

  8. Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification

    Gilles Barthe; Marc Gourjon; Benjamin Grégoire; Maximilian Orlt; Clara Paglialonga; Lars Porth
    MPI-SP, Germany and IMDEA Software Institute, Spain; Hamburg University of Technology and NXP Semiconductors Germany GmbH; Inria, France; TU Darmstadt, Germany

  9. Revisiting the functional bootstrap in TFHE

    Antonio Guimarães; Edson Borin; Diego F. Aranha
    University of Campinas; Aarhus University

  10. Time-Memory Analysis for Parallel Collision Search Algorithms

    Monika Trimoska; Sorina Ionica; Gilles Dequen
    University of Picardie Jules Verne

  11. RASSLE: Return Address Stack based Side-channel LEakage

    Anirban Chakraborty; Sarani Bhattacharya; Manaar Alam; Sikhar Patranabis; Debdeep Mukhopadhyay
    Indian Institute of Technology, Kharagpur; Katholieke Universiteit Leuven; ETH Zurich, Switzerland

  12. New First-Order Secure AES Performance Records

    Aein Rezaei Shahmirzadi; Dusan Bozilov; Amir Moradi
    Ruhr Uni­ver­si­ty Bo­chum, Horst Görtz Institute for IT Security, Bochum; NXP Semiconductors, Leuven, Belgium and COSIC KU Leuven and imec, Leuven, Belgium

  13. A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

    Yufei Xing; Shuguo Li
    Tsinghua University

TCHES 2021, issue 3

  1. Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware

    Milad Bahadori; Kimmo Järvinen; Tilen Marc; Miha Stopar
    University of Helsinki; XLAB

  2. Online Template Attacks: Revisited

    Alejandro Cabrera Aldaya; Billy Bob Brumley
    Tampere University

  3. Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks -- A Case Study on Public-Key Algorithms --

    Gabriel Zaid; Lilian Bossuet; Amaury Habrard; Alexandre Venelli
    Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; NXP Semiconductors, Toulouse, France

  4. Optimizing BIKE for the Intel Haswell and ARM Cortex-M4

    Tung Chou; Ming-Shing Chen; Markus Krausz
    Academia Sinica; Ruhr University Bochum

  5. Classic McEliece on the ARM Cortex-M4

    Tung Chou; Ming-Shing Chen
    Academia Sinica; Ruhr University Bochum

  6. Timing Black-Box Attacks: Crafting Adversarial Examples through Data-dependent Timing Leaks against DNNs on Embedded Devices

    Tsunato Nakai; Daisuke Suzuki; Takeshi Fujino
    Mitsubishi Electric Corporation; Ritsumeikan University

  7. Security and Trust in Open Source Security Tokens

    Marc Schink; Alexander Wagner; Florian Unterstein; Johann Heyszl
    Fraunhofer Institute for Applied and Integrated Security (AISEC)

  8. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter

    Olivier Bronchain; François-Xavier Standaert
    UCLouvain

  9. Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks

    Xiangjun Lu; Chi Zhang; Pei Cao; Dawu Gu; Haining Lu
    Shanghai Jiao Tong University

  10. Analysis and Comparison of Table-based Arithmetic to Boolean Masking

    Michiel Van Beirendonck; Jan-Pieter D'Anvers; Ingrid Verbauwhede
    imec-COSIC KU Leuven

  11. AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption

    Yusuke Naito; Yu Sasaki; Takeshi Sugawara
    Mitsubishi Electric Corporation; NTT Secure Platform Laboratories; The University of Electro-Communications

  12. Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography

    Shivam Bhasin; Jan-Pieter D'Anvers; Daniel Heinz; Thomas Pöppelmann; Michiel Van Beirendonck
    NTU Signapore; imec-COSIC KU Leuven; Research Institute CODE; Infineon Technologies

  13. Cutting Through the Complexity of Reverse Engineering Embedded Devices

    Sam L. Thomas; Jan Van den Herrewegen; Georgios Vasilakis; Zitai Chen; Mihai Ordean; Flavio D. Garcia
    University of Birmingham

  14. Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype

    Davide Bellizia; Clément Hoffmann; Dina Kamel; Hanlin Liu; Pierrick Méaux; François-Xavier Standaert; Yu Yu
    UCLouvain; Shanghai Jiao Tong University; UClouvain

  15. Breaking CAS-Lock and Its Variants by Exploiting Structural Traces

    Abhrajit Sengupta; Nimisha Limaye; Ozgur Sinanoglu
    New York University; New York University Abu Dhabi

  16. Denial-of-Service on FPGA-based Cloud Infrastructure - Attack and Defense

    Tuan La; Khoa Pham; Joseph Powell; Dirk Koch
    University of Manchester; Univerisity of Manchester; Universtify of Manchester

  17. Information Leakages in Code-based Masking: A Unified Quantification Approach

    Wei Cheng; Sylvain Guilley; Claude Carlet; Jean-Luc Danger; Sihem Mesnager
    Télécom Paris; Secure-IC; Télécom Paris; University of Paris 8; Télécom Paris; Secure-IC

  18. Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA

    Oleksiy Lisovets; David Knichel; Thorben Moos; Amir Moradi
    Ruhr University Bochum

  19. Inconsistency of Simulation and Practice in Delay-based Strong PUFs

    Anita Aghaie; Amir Moradi
    Ruhr University Bochum; Ruhr University Bo­chum

  20. DL-LA: Deep Learning Leakage Assessment - A modern roadmap for SCA evaluations

    Thorben Moos; Felix Wegener; Amir Moradi
    Ruhr University Bochum

  21. Probing Security through Input-Output Separation and Revisited Quasilinear Masking

    Dahmun Goudarzi; Thomas Prest; Matthieu Rivain; Damien Vergnaud
    Independent researcher; PQShield; CryptoExperts; Sorbonne Université

  22. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

    Olivier Bronchain; Charles Momin; Thomas Peters; François-Xavier Standaert
    UCLouvain

  23. Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis

    Jorai Rijsdijk; Lichao Wu; Guilherme Perin; Stjepan Picek
    TU Delft

  24. Second-Order SCA Security with almost no Fresh Randomness

    Aein Rezaei Shahmirzadi; Amir Moradi
    Ruhr University Bochum

  25. SEAL-Embedded: A Homomorphic Encryption Library for the Internet of Things

    Deepika Natarajan; Wei Dai
    University of Michigan; Microsoft Research

  26. Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -

    Thorben Moos; Amir Moradi
    Ruhr University Bochum