CHES 2021

13-17 September 2021

Virtual

Accepted Papers

TCHES 2021, issue 1

  1. Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

    Denisa O. C. Greconici; Matthias J. Kannwischer; Daan Sprenkels
    Radboud University; Max Planck Institute for Security and Privacy; Radboud University

  2. Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis

    Gabriel Zaid; Lilian Bossuet; François Dassance; Amaury Habrard; Alexandre Venelli
    Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France

  3. Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis

    Jan Van den Herrewegen; David Oswald; Flavio Garcia; Qais Temeiza
    The University of Birmingham; The University of Birmingham; The University of Birmingham; Independent Researcher

  4. Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging

    Max Hoffmann; Christof Paar
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany

  5. The design of scalar AES Instruction Set Extensions for RISC-V

    Ben Marshall; G. Richard Newell; Dan Page; Markku-Juhani O. Saarinen; Claire Wolf
    University of Bristol; Microchip Technology; University of Bristol; PQShield; Symbiotic EDA

  6. Rapidly Verifiable XMSS Signatures

    Joppe W. Bos; Andreas Hülsing; Joost Renes; Christine van Vredendaal
    NXP Semiconductors; Eindhoven University of Technology; NXP Semiconductors; NXP Semiconductors

  7. DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers

    Siang Meng Sim; Dirmanto Jap; Shivam Bhasin
    DSO National Laboratories; Temasek Laboratories, NTU Singapore; Temasek Laboratories, NTU Singapore

  8. Fault Injection as an Oscilloscope: Fault Correlation Analysis

    Albert Spruyt; Alyssa Milburn; Lukasz Chmielewski
    ; Vrije Universiteit Amsterdam; Radboud University

  9. Polynomial Multiplication in NTRU Prime

    Erdem Alkim; Dean Yun-Li Cheng; Chi-Ming Marvin Chung; Hülya Evkan; Leo Wei-Lun Huang; Vincent Hwang; Ching-Lin Trista Li; Ruben Niederhagen; Cheng-Jhih Shih; Julian Wälde; Bo-Yin Yang
    Ondokuz Mayis University; Academia Sinica; Academia Sinica; Fraunhofer SIT; Academia Sinica; Academia Sinica; Academia Sinica; University of Southern Denmark; Academia Sinica; Fraunhofer SIT; Academia Sinica

  10. The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

    Fatih Balli; Andrea Caforio; Subhadeep Banik
    EPFL Switzerland; EPFL Switzerland; EPFL Switzerland

  11. Side-Channel Analysis of the Xilinx ZYNQ Ultrascale+ Encryption Engine

    Benjamin Hettwer; Sebastien Leger; Daniel Fennes; Stefan Gehrer; Tim Güneysu
    Robert Bosch GmbH, Corporate Sector Research, Stuttgart, Germany; Robert Bosch GmbH, Corporate Sector Research, Stuttgart, Germany; Ruhr University Bochum, Bochum, Germany; Robert Bosch LLC, Pittsburgh, USA; Ruhr University Bochum, Bochum, Germany

  12. Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness

    Aein Rezaei Shahmirzadi; Amir Moradi
    Ruhr University Bochum; Ruhr University Bochum

  13. Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

    Guilherme Perin; Lukasz Chmielewski; Lejla Batina; Stjepan Picek
    Delft University of Technology; Riscure BV, Radboud University Nijmegen; Radboud University Nijmegen; Delft University of Technology

  14. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding (Towards Secure and Efficient Fresh Re-Keying)

    Sébastien Duval; Pierrick Méaux; Charles Momin; François-Xavier Standaert
    UCLouvain; UCLouvain; UCLouvain; UCLouvain

  15. Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V

    Alexandre Adomnicai; Thomas Peyrin
    Nanyang Technological University; Nanyang Technological University

  16. Redundant Code-based Masking Revisited

    Nicolas Costes; Martijn Stam
    Simula UiB; Simula UiB

  17. Concrete quantum cryptanalysis of binary elliptic curves

    Gustavo Banegas; Daniel J. Bernstein; Iggy van Hoof; Tanja Lange
    Chalmers University of Technology; University of Illinois, Ruhr University Bochum; Eindhoven University of Technology; Eindhoven University of Technology

TCHES 2021, issue 2

  1. Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme

    Emanuele Strieder; Christoph Frisch; Michael Pehl
    Fraunhofer Institute for Applied and Integrated Security AISEC; Technical University of Munich

  2. Fault Attacks on CCA-secure Lattice KEMs

    Peter Pessl; Lukas Prokop
    Infineon Technologies; Graz University of Technology

  3. Combining Optimization Objectives: New Modeling Attacks on Strong PUFs

    Johannes Tobisch; Anita Aghaie; Georg T. Becker
    Max Planck Institute for Security and Privacy, Bochum; Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum; DCSO, Berlin

  4. A White-Box Masking Scheme Resisting Computational and Algebraic Attacks

    Okan Seker; Thomas Eisenbarth; Maciej Liskiewicz
    University of Lübeck

  5. Secure, Accurate, and Practical Narrow-Band Ranging System

    Aysajan Abidin; Mohieddine El Soussi; Jac Romme; Pepijn Boer; Dave Singelée; Christian Bachmann
    imec-COSIC KU Leuven; imec, The Netherlands

  6. Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

    Gaëtan Cassiers; François-Xavier Standaert
    UCLouvain

  7. NTT Multiplication for NTT-unfriendly Rings

    Chi-Ming Marvin Chung; Vincent Hwang; Matthias J. Kannwischer; Gregor Seiler; Cheng-Jhih Shih; Bo-Yin Yang
    National Taiwan University and Academia Sinica; Max Planck Institute for Security and Privacy; IBM Research, Zurich; Academia Sinica

  8. Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification

    Gilles Barthe; Marc Gourjon; Benjamin Grégoire; Maximilian Orlt; Clara Paglialonga; Lars Porth
    MPI-SP, Germany and IMDEA Software Institute, Spain; Hamburg University of Technology and NXP Semiconductors Germany GmbH; Inria, France; TU Darmstadt, Germany

  9. Revisiting the functional bootstrap in TFHE

    Antonio Guimarães; Edson Borin; Diego F. Aranha
    University of Campinas; Aarhus University

  10. Time-Memory Analysis for Parallel Collision Search Algorithms

    Monika Trimoska; Sorina Ionica; Gilles Dequen
    University of Picardie Jules Verne

  11. RASSLE: Return Address Stack based Side-channel LEakage

    Anirban Chakraborty; Sarani Bhattacharya; Manaar Alam; Sikhar Patranabis; Debdeep Mukhopadhyay
    Indian Institute of Technology, Kharagpur; Katholieke Universiteit Leuven; ETH Zurich, Switzerland

  12. New First-Order Secure AES Performance Records

    Aein Rezaei Shahmirzadi; Dusan Bozilov; Amir Moradi
    Ruhr Uni­ver­si­ty Bo­chum, Horst Görtz Institute for IT Security, Bochum; NXP Semiconductors, Leuven, Belgium and COSIC KU Leuven and imec, Leuven, Belgium

  13. A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

    Yufei Xing; Shuguo Li
    Tsinghua University

TCHES 2021, issue 3

  1. Speed Reading in the Dark: Accelerating Functional Encryption for Quadratic Functions with Reprogrammable Hardware

    Milad Bahadori; Kimmo Järvinen; Tilen Marc; Miha Stopar
    University of Helsinki; XLAB

  2. Online Template Attacks: Revisited

    Alejandro Cabrera Aldaya; Billy Bob Brumley
    Tampere University

  3. Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks -- A Case Study on Public-Key Algorithms --

    Gabriel Zaid; Lilian Bossuet; Amaury Habrard; Alexandre Venelli
    Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; NXP Semiconductors, Toulouse, France

  4. Optimizing BIKE for the Intel Haswell and ARM Cortex-M4

    Tung Chou; Ming-Shing Chen; Markus Krausz
    Academia Sinica; Ruhr University Bochum

  5. Classic McEliece on the ARM Cortex-M4

    Tung Chou; Ming-Shing Chen
    Academia Sinica; Ruhr University Bochum

  6. Timing Black-Box Attacks: Crafting Adversarial Examples through Data-dependent Timing Leaks against DNNs on Embedded Devices

    Tsunato Nakai; Daisuke Suzuki; Takeshi Fujino
    Mitsubishi Electric Corporation; Ritsumeikan University

  7. Security and Trust in Open Source Security Tokens

    Marc Schink; Alexander Wagner; Florian Unterstein; Johann Heyszl
    Fraunhofer Institute for Applied and Integrated Security (AISEC)

  8. Breaking Masked Implementations with Many Shares on 32-bit Software Platforms or When the Security Order Does Not Matter

    Olivier Bronchain; François-Xavier Standaert
    UCLouvain

  9. Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks

    Xiangjun Lu; Chi Zhang; Pei Cao; Dawu Gu; Haining Lu
    Shanghai Jiao Tong University

  10. Analysis and Comparison of Table-based Arithmetic to Boolean Masking

    Michiel Van Beirendonck; Jan-Pieter D'Anvers; Ingrid Verbauwhede
    imec-COSIC KU Leuven

  11. AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption

    Yusuke Naito; Yu Sasaki; Takeshi Sugawara
    Mitsubishi Electric Corporation; NTT Secure Platform Laboratories; The University of Electro-Communications

  12. Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography

    Shivam Bhasin; Jan-Pieter D'Anvers; Daniel Heinz; Thomas Pöppelmann; Michiel Van Beirendonck
    NTU Signapore; imec-COSIC KU Leuven; Research Institute CODE; Infineon Technologies

  13. Cutting Through the Complexity of Reverse Engineering Embedded Devices

    Sam L. Thomas; Jan Van den Herrewegen; Georgios Vasilakis; Zitai Chen; Mihai Ordean; Flavio D. Garcia
    University of Birmingham

  14. Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype

    Davide Bellizia; Clément Hoffmann; Dina Kamel; Hanlin Liu; Pierrick Méaux; François-Xavier Standaert; Yu Yu
    UCLouvain; Shanghai Jiao Tong University; UClouvain

  15. Breaking CAS-Lock and Its Variants by Exploiting Structural Traces

    Abhrajit Sengupta; Nimisha Limaye; Ozgur Sinanoglu
    New York University; New York University Abu Dhabi

  16. Denial-of-Service on FPGA-based Cloud Infrastructure - Attack and Defense

    Tuan La; Khoa Pham; Joseph Powell; Dirk Koch
    University of Manchester; Univerisity of Manchester; Universtify of Manchester

  17. Information Leakages in Code-based Masking: A Unified Quantification Approach

    Wei Cheng; Sylvain Guilley; Claude Carlet; Jean-Luc Danger; Sihem Mesnager
    Télécom Paris; Secure-IC; Télécom Paris; University of Paris 8; Télécom Paris; Secure-IC

  18. Let's Take it Offline: Boosting Brute-Force Attacks on iPhone's User Authentication through SCA

    Oleksiy Lisovets; David Knichel; Thorben Moos; Amir Moradi
    Ruhr University Bochum

  19. Inconsistency of Simulation and Practice in Delay-based Strong PUFs

    Anita Aghaie; Amir Moradi
    Ruhr University Bochum; Ruhr University Bo­chum

  20. DL-LA: Deep Learning Leakage Assessment - A modern roadmap for SCA evaluations

    Thorben Moos; Felix Wegener; Amir Moradi
    Ruhr University Bochum

  21. Probing Security through Input-Output Separation and Revisited Quasilinear Masking

    Dahmun Goudarzi; Thomas Prest; Matthieu Rivain; Damien Vergnaud
    Independent researcher; PQShield; CryptoExperts; Sorbonne Université

  22. Improved Leakage-Resistant Authenticated Encryption based on Hardware AES Coprocessors

    Olivier Bronchain; Charles Momin; Thomas Peters; François-Xavier Standaert
    UCLouvain

  23. Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis

    Jorai Rijsdijk; Lichao Wu; Guilherme Perin; Stjepan Picek
    TU Delft

  24. Second-Order SCA Security with almost no Fresh Randomness

    Aein Rezaei Shahmirzadi; Amir Moradi
    Ruhr University Bochum

  25. SEAL-Embedded: A Homomorphic Encryption Library for the Internet of Things

    Deepika Natarajan; Wei Dai
    University of Michigan; Microsoft Research

  26. Countermeasures against Static Power Attacks - Comparing Exhaustive Logic Balancing and Other Protection Schemes in 28 nm CMOS -

    Thorben Moos; Amir Moradi
    Ruhr University Bochum

TCHES 2021, issue 4

  1. LifeLine for FPGA Protection: Obfuscated Cryptography for Real-World Security

    Florian Stolz; Nils Albartus; Julian Speith; Simon Klix; Clemens Nasenberg; Aiden Gula; Marc Fyrbiak; Christof Paar; Tim Güneysu; Russell Tessier
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; University of Massachusetts, Amherst, USA

  2. Yoroi: Updatable Whitebox Cryptography

    Yuji Koike; Takanori Isobe
    University of Hyogo; University of Hyogo / National Institute of Information and Communications Technology

  3. Rainbow on Cortex-M4

    Tung Chou; Matthias J. Kannwischer; Bo-Yin Yang
    Academia Sinica; Max Planck Institute for Security and Privacy

  4. A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation

    Kalle Ngo; Elena Dubrova; Qian Guo; Thomas Johansson
    KTH Royal Institute of Technology; Lund University

  5. Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries

    Sunghyun Jin; Sangyub Lee; Sung Min Cho; HeeSeok Kim; Seokhie Hong
    School of Cyber Security, Center for Information Security Technologies, Institute of Cyber Security and Privacy, Korea University; National Institute for Mathematical Sciences; CIOT; Department of Cyber Security, College of Science and Technology, Korea University

  6. Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation

    Pei Cao; Chi Zhang; Xiangjun Lu; Dawu Gu
    School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

  7. Structural Attack (and Repair) of Diffused-Input-Blocked-Output White Box Cryptography

    Claude Carlet; Sylvain Guilley; Sihem Mesnager
    University of Bergen; Secure-IC; University of Paris 8

  8. Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber

    Mike Hamburg; Julius Hermelink; Robert Primas; Simona Samardjiska; Thomas Schamberger; Silvan Streit; Emanuele Strieder; Christine van Vredendaal
    Rambus Labs; Universität der Bundeswehr München; Graz University of Technology; Radboud University; Technical University of Munich; Fraunhofer Institute AISEC; NXP Semiconductors

  9. Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs

    Wonkyung Jung; Sangpyo Kim; Jung Ho Ahn; Jung Hee Cheon; Younho Lee
    Seoul National University; SeoulTech

  10. My other car is your car: Compromising the Tesla Model X keyless entry system

    Lennert Wouters; Benedikt Gierlichs; Bart Preneel
    KU Leuven

  11. Masking Kyber: First- and Higher-Order Implementations

    Joppe W. Bos; Marc Gourjon; Joost Renes; Tobias Schneider; Christine van Vredendaal
    NXP Semiconductors; NXP Semiconductors and Hamburg University of Technology

  12. ROTed: Random Oblivious Transfer for embedded devices

    Pedro Branco; Luís Fiolhais; Manuel Goulão; Paulo Martins; Paulo Mateus; Leonel Sousa
    Instituto de Telecomunicações, Instituto Superior Técnico, Universidade de Lisboa; INESC-ID, Instituto Superior Técnico, Universidade de Lisboa

  13. Side-Channel Protections for Picnic Signatures

    Diego F. Aranha; Sebastian Berndt; Thomas Eisenbarth; Okan Seker; Akira Takahashi; Luca Wilke; Greg Zaverucha
    Aarhus University; University of Lübeck; Microsoft Research

  14. An Instruction Set Extension to Support Software-Based Masking

    Si Gao; Johann Großschädl; Ben Marshall; Dan Page; Thinh Pham; Francesco Regazzoni
    Alpen-Adria Universität Klagenfurt; University of Luxembourg; University of Bristol and PQShield; University of Bristol; University of Amsterdam and Università della Svizzera italiana

  15. Revealing the Weakness of Addition Chain Based Masked SBox Implementations

    Jingdian Ming; Huizhong Li; Yongbin Zhou; Wei Cheng; Zehua Qiao
    Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; School of Cyber Security, Nanjing University of Science and Technology, Nanjing, China; Telecom Paris, Polytechnique de Paris, Palaiseau, France

  16. CTIDH: faster constant-time CSIDH

    Gustavo Banegas; Daniel J. Bernstein; Fabio Campos; Tung Chou; Tanja Lange; Michael Meyer; Benjamin Smith; Jana Sotáková
    Inria and Laboratoire d’Informatique de l’Ecole Polytechnique, Institut Polytechnique de Paris; University of Illinois at Chicago, Ruhr University Bochum; Max Planck Institute for Security and Privacy; Academia Sinica; Eindhoven University of Technology; Technical University of Darmstadt; Inria and Laboratoire d’Informatique de l’École Polytechnique, Institut Polytechnique de Paris; University of Amsterdam, QuSoft

  17. Low-Latency Keccak at any Arbitrary Order

    Sara Zarei; Aein Rezaei Shahmirzadi; Hadi Soleimany; Raziye Salarifard; Amir Moradi
    Shahid Beheshti University; Ruhr University Bochum

  18. FIVER - Robust Verification of Countermeasures against Fault Injections

    Jan Richter-Brockmann; Aein Rezaei Shahmirzadi; Pascal Sasdrich; Amir Moradi; Tim Güneysu
    Ruhr University Bochum; Ruhr University Bochum, DFKI

  19. Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms

    Jose Maria Bermudo Mera; Angshuman Karmakar; Suparna Kundu; Ingrid Verbauwhede
    imec-COSIC, KU Leuven

  20. The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures

    Gregor Leander; Thorben Moos; Amir Moradi; Shahram Rasoolzadeh
    Ruhr University Bochum; Radboud University Nijmegen

  21. Higher-Order Lookup Table Masking in Essentially Constant Memory

    Annapurna Valiveti; Srinivas Vivek
    IIIT Bangalore, IN

  22. Batching CSIDH Group Actions using AVX-512

    Hao Cheng; Georgios Fotiadis; Johann Großschädl; Peter Y. A. Ryan; Peter B. Rønne
    University of Luxembourg