CHES 2021

September 12–15, 2021 (tentative)

Beijing, China

Accepted Papers

TCHES 2021, issue 1

  1. Compact Dilithium Implementations on Cortex-M3 and Cortex-M4

    Denisa O. C. Greconici; Matthias J. Kannwischer; Daan Sprenkels
    Radboud University; Max Planck Institute for Security and Privacy; Radboud University

  2. Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis

    Gabriel Zaid; Lilian Bossuet; François Dassance; Amaury Habrard; Alexandre Venelli
    Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France; Univ Lyon, UJM-Saint-Etienne, CNRS Laboratoire Hubert Curien UMR 5516 F-42023, Saint-Etienne, France; Thales ITSEF, Toulouse, France

  3. Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis

    Jan Van den Herrewegen; David Oswald; Flavio Garcia; Qais Temeiza
    The University of Birmingham; The University of Birmingham; The University of Birmingham; Independent Researcher

  4. Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging

    Max Hoffmann; Christof Paar
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany; Max Planck Institute for Security and Privacy, Bochum, Germany

  5. The design of scalar AES Instruction Set Extensions for RISC-V

    Ben Marshall; G. Richard Newell; Dan Page; Markku-Juhani O. Saarinen; Claire Wolf
    University of Bristol; Microchip Technology; University of Bristol; PQShield; Symbiotic EDA

  6. Rapidly Verifiable XMSS Signatures

    Joppe W. Bos; Andreas Hülsing; Joost Renes; Christine van Vredendaal
    NXP Semiconductors; Eindhoven University of Technology; NXP Semiconductors; NXP Semiconductors

  7. DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers

    Siang Meng Sim; Dirmanto Jap; Shivam Bhasin
    DSO National Laboratories; Temasek Laboratories, NTU Singapore; Temasek Laboratories, NTU Singapore

  8. Fault Injection as an Oscilloscope: Fault Correlation Analysis

    Albert Spruyt; Alyssa Milburn; Lukasz Chmielewski
    ; Vrije Universiteit Amsterdam; Radboud University

  9. Polynomial Multiplication in NTRU Prime

    Erdem Alkim; Dean Yun-Li Cheng; Chi-Ming Marvin Chung; Hülya Evkan; Leo Wei-Lun Huang; Vincent Hwang; Ching-Lin Trista Li; Ruben Niederhagen; Cheng-Jhih Shih; Julian Wälde; Bo-Yin Yang
    Ondokuz Mayis University; Academia Sinica; Academia Sinica; Fraunhofer SIT; Academia Sinica; Academia Sinica; Academia Sinica; University of Southern Denmark; Academia Sinica; Fraunhofer SIT; Academia Sinica

  10. The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits

    Fatih Balli; Andrea Caforio; Subhadeep Banik
    EPFL Switzerland; EPFL Switzerland; EPFL Switzerland

  11. Side-Channel Analysis of the Xilinx ZYNQ Ultrascale+ Encryption Engine

    Benjamin Hettwer; Sebastien Leger; Daniel Fennes; Stefan Gehrer; Tim Güneysu
    Robert Bosch GmbH, Corporate Sector Research, Stuttgart, Germany; Robert Bosch GmbH, Corporate Sector Research, Stuttgart, Germany; Ruhr University Bochum, Bochum, Germany; Robert Bosch LLC, Pittsburgh, USA; Ruhr University Bochum, Bochum, Germany

  12. Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness

    Aein Rezaei Shahmirzadi; Amir Moradi
    Ruhr University Bochum; Ruhr University Bochum

  13. Keep it Unsupervised: Horizontal Attacks Meet Deep Learning

    Guilherme Perin; Lukasz Chmielewski; Lejla Batina; Stjepan Picek
    Delft University of Technology; Riscure BV, Radboud University Nijmegen; Radboud University Nijmegen; Delft University of Technology

  14. Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding (Towards Secure and Efficient Fresh Re-Keying)

    Sébastien Duval; Pierrick Méaux; Charles Momin; François-Xavier Standaert
    UCLouvain; UCLouvain; UCLouvain; UCLouvain

  15. Fixslicing AES-like Ciphers - New bitsliced AES speed records on ARM-Cortex M and RISC-V

    Alexandre Adomnicai; Thomas Peyrin
    Nanyang Technological University; Nanyang Technological University

  16. Redundant Code-based Masking Revisited

    Nicolas Costes; Martijn Stam
    Simula UiB; Simula UiB

  17. Concrete quantum cryptanalysis of binary elliptic curves

    Gustavo Banegas; Daniel J. Bernstein; Iggy van Hoof; Tanja Lange
    Chalmers University of Technology; University of Illinois, Ruhr University Bochum; Eindhoven University of Technology; Eindhoven University of Technology

TCHES 2020, issue 2

  1. Machine Learning of Physical Unclonable Functions using Helper Data - Revealing a Pitfall in the Fuzzy Commitment Scheme

    Emanuele Strieder; Christoph Frisch; Michael Pehl
    Fraunhofer Institute for Applied and Integrated Security AISEC; Technical University of Munich

  2. Fault Attacks on CCA-secure Lattice KEMs

    Peter Pessl; Lukas Prokop
    Infineon Technologies; Graz University of Technology

  3. Combining Optimization Objectives: New Modeling Attacks on Strong PUFs

    Johannes Tobisch; Anita Aghaie; Georg T. Becker
    Max Planck Institute for Security and Privacy, Bochum; Ruhr University Bochum, Horst Görtz Institute for IT Security, Bochum; DCSO, Berlin

  4. A White-Box Masking Scheme Resisting Computational and Algebraic Attacks

    Okan Seker; Thomas Eisenbarth; Maciej Liskiewicz
    University of Lübeck

  5. Secure, Accurate, and Practical Narrow-Band Ranging System

    Aysajan Abidin; Mohieddine El Soussi; Jac Romme; Pepijn Boer; Dave Singelée; Christian Bachmann
    imec-COSIC KU Leuven; imec, The Netherlands

  6. Provably Secure Hardware Masking in the Transition- and Glitch-Robust Probing Model: Better Safe than Sorry

    Gaëtan Cassiers; François-Xavier Standaert
    UCLouvain

  7. NTT Multiplication for NTT-unfriendly Rings

    Chi-Ming Marvin Chung; Vincent Hwang; Matthias J. Kannwischer; Gregor Seiler; Cheng-Jhih Shih; Bo-Yin Yang
    National Taiwan University and Academia Sinica; Max Planck Institute for Security and Privacy; IBM Research, Zurich; Academia Sinica

  8. Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification

    Gilles Barthe; Marc Gourjon; Benjamin Grégoire; Maximilian Orlt; Clara Paglialonga; Lars Porth
    MPI-SP, Germany and IMDEA Software Institute, Spain; Hamburg University of Technology and NXP Semiconductors Germany GmbH; Inria, France; TU Darmstadt, Germany

  9. Revisiting the functional bootstrap in TFHE

    Antonio Guimarães; Edson Borin; Diego F. Aranha
    University of Campinas; Aarhus University

  10. Time-Memory Analysis for Parallel Collision Search Algorithms

    Monika Trimoska; Sorina Ionica; Gilles Dequen
    University of Picardie Jules Verne

  11. RASSLE: Return Address Stack based Side-channel LEakage

    Anirban Chakraborty; Sarani Bhattacharya; Manaar Alam; Sikhar Patranabis; Debdeep Mukhopadhyay
    Indian Institute of Technology, Kharagpur; Katholieke Universiteit Leuven; ETH Zurich, Switzerland

  12. New First-Order Secure AES Performance Records

    Aein Rezaei Shahmirzadi; Dusan Bozilov; Amir Moradi
    Ruhr Uni­ver­si­ty Bo­chum, Horst Görtz Institute for IT Security, Bochum; NXP Semiconductors, Leuven, Belgium and COSIC KU Leuven and imec, Leuven, Belgium

  13. A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

    Yufei Xing; Shuguo Li
    Tsinghua University