CHES 2022

September 18-21, 2022

Leuven, Belgium

Accepted Papers

TCHES 2022, issue 1

  1. Quantum Period Finding against Symmetric Primitives in Practice

    Xavier Bonnetain; Samuel Jaques
    University of Waterloo; University of Oxford

  2. Bypassing Isolated Execution on RISC-V using Side-Channel-Assisted Fault-Injection and Its Countermeasure

    Shoei Nashimoto; Daisuke Suzuki; Rei Ueno; Naofumi Homma
    Mitsubishi Electric; Tohoku University

  3. Can’t Touch This: Inertial HSMs Thwart Advanced Physical Attacks

    Jan Goette; Björn Scheuermann
    Alexander von Humboldt Institute for Internet and Society Berlin

  4. CFNTT: Scalable Radix-2/4 NTT Multiplication Architecture with an Efficient Conflict-free Memory Mapping Scheme

    Xiangren Chen; Bohan Yang; Shouyi Yin; Shaojun Wei; Leibo Liu
    Tsinghua University

  5. Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4

    Amin Abdulrahman; Jiun-Peng Chen; Yu-Jia Chen; Vincent Hwang; Matthias J. Kannwischer; Bo-Yin Yang
    Ruhr University Bochum; Academia Sinica; IKV Technology; National Taiwan University and Academia Sinica

  6. A Constant-time AVX2 Implementation of a Variant of ROLLO

    Tung Chou; Jin-Han Liou
    Academia Sinica

  7. MIRACLE: MIcRo-ArChitectural Leakage Evaluation

    Ben Marshall; Dan Page; James Webb
    University of Bristol

  8. Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1

    Hanno Becker; Vincent Hwang; Matthias J. Kannwischer; Bo-Yin Yang; Shang-Yi Yang
    Arm Ltd.; National Taiwan University and Academia Sinica; Academia Sinica; Chelpis Co. Ltd.

  9. Compact Implementations of Rainbow and UOV using AVX2

    Kyung-Ah Shim; Sangyub Lee; Namhun Koo
    NIMS; Ewha Womans University

  10. A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium

    Cankun Zhao; Neng Zhang; Hanning Wang; Bohan Yang; Wenping Zhu; Zhengdong Li; Min Zhu; Shouyi Yin; Shaojun Wei; Leibo Liu
    School of Integrated Circuits, Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.

  11. Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs

    Rei Ueno; Keita Xagawa; Yutaro Tanaka; Akira Ito; Junko Takahashi; Naofumi Homma
    Tohoku University/JST CREST/JST PRESTO; NTT Social Informatics Laboratories; Tohoku University/JST CREST

  12. Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets

    David Knichel; Pascal Sasdrich; Amir Moradi
    Ruhr University Bochum

  13. Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces

    Jens Trautmann; Arthur Beckers; Lennert Wouters; Benedikt Gierlichs; Stefan Wildermann; Ingrid Verbauwhede; Jürgen Teich
    Friedrich-Alexander-Universität Erlangen-Nürnberg; KU Leuven

  14. Practical Multiple Persistent Faults Analysis

    Hadi Soleimany; Nasour Bagheri; Hosein Hadipour; Prasanna Ravi; Shivam Bhasin; Sara Mansouri
    Shahid Beheshti University, Iran; Shahid Rajaee University, Iran; University of Tehran, Iran; Nanyang Technological University, Singapore; Temasek Labs, Nanyang Technological University

  15. Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage

    Chao Sun; Thomas Espitau; Mehdi Tibouchi; Masayuki Abe
    Kyoto University; NTT Corporation; NTT Corporation and Kyoto University

  16. Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography

    Tim Fritzmann; Michiel Van Beirendonck; Debapriya Basu Roy; Patrick Karl; Thomas Schamberger; Ingrid Verbauwhede; Georg Sigl
    Technical University of Munich, Munich, Germany; KU Leuven, Leuven, Belgium; Fraunhofer Institute for Applied and Integrated Security, Garching, Germany

  17. A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB

    Francesco Berti; Shivam Bhasin; Jakub Breier; Xiaolu Hou; Romain Poussier; François-Xavier Standaert; Balazs Udvarhelyi
    University of Darmstadt, Germany; Temasek Labs, Nanyang Technological University; Silicon Austria Labs, Austria; Slovak University of Technology in Bratislava; UCLouvain, Belgium

  18. Polynomial multiplication on embedded vector architectures

    Hanno Becker; Jose Maria Bermudo Mera; Angshuman Karmakar; Joseph Yiu; Ingrid Verbauwhede
    Arm Ltd., Cambridge; imec-COSIC, KU Leuven

  19. ModuloNET: Neural Networks Meet Modular Arithmetic for Efficient Hardware Masking

    Anuj Dubey; Afzal Ahmad; Muhammad Adeel Pasha; Rosario Cammarota; Aydin Aysu
    North Carolina State University; Hong Kong University of Science and Technology; Lahore University of Management Sciences; Intel Labs

  20. Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware

    Jan Richter-Brockmann; Ming-Shing Chen; Santosh Ghosh; Tim Güneysu
    Ruhr University Bochum, Intel Labs; Ruhr University Bochum; Intel Labs; Ruhr University Bochum, DFKI

  21. Automated Generation of Masked Hardware

    David Knichel; Amir Moradi; Nicolai Müller; Pascal Sasdrich
    Ruhr University Bochum

  22. Composite Enclaves: Towards Disaggregated Trusted Execution

    Moritz Schneider; Aritra Dhar; Ivan Puddu; Kari Kostiainen; Srdjan Capkun
    ETH Zurich

  23. VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs

    Brian Udugama; Darshana Jayasinghe; Hassaan Saadat; Aleksandar Ignjatovic; Sri Parameswaran
    UNSW

  24. Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency

    Tim Beyne; Siemen Dhooghe; Amir Moradi; Aein Rezaei Shahmirzadi
    KU Leuven; Ruhr University Bochum

  25. Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs

    Prasanna Ravi; Martianus Frederic Ezerman; Shivam Bhasin; Anupam Chattopadhyay; Sujoy Sinha Roy
    Temasek Labs and School of Computer Science and Engineering, Nanyang Technological University, Singapore; School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore; Temasek Labs, Nanyang Technological University; Institute of Applied Information Processing and Communications, TU Graz, Austria

TCHES 2022, issue 2

  1. High-order Table-based Conversion Algorithms and Masking Lattice-based Encryption

    Jean-Sébastien Coron; François Gérard; Simon Montoya; Rina Zeitoun
    University of Luxembourg; IDEMIA

  2. Highly Vectorized SIKE for AVX-512

    Hao Cheng; Georgios Fotiadis; Johann Großschädl; Peter Y. A. Ryan
    University of Luxembourg

  3. Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)

    Yaacov Belenky; Vadim Bugaenko; Leonid Azriel; Hennadii Chernyshchyk; Ira Dushar; Oleg Karavaev; Oleh Maksimenko; Yulia Ruda; Valery Teper; Yury Kreimer
    FortifyIQ, Inc.

  4. Towards a Formal Treatment of Logic Locking

    Peter A. Beerel; Marios Georgiou; Ben Hamlin; Alex J. Malozemoff; Pierluigi Nuzzo
    University of Southern California; Galois, Inc.

  5. Higher-Order Masked Ciphertext Comparison for Lattice-Based Cryptography

    Jan-Pieter D'Anvers; Daniel Heinz; Peter Pessl; Michiel van Beirendonck; Ingrid Verbauwhede
    KU Leuven; Universität der Bundeswehr; Infineon Technologies AG

  6. Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?

    Mélissa Azouaoui; Olivier Bronchain; Vincent Grosso; Kostas Papagiannopoulos; François-Xavier Standaert
    NXP, Germany and UCLouvain,, Belgium; UCLouvain, Belgium; Université Jean Monnet, France; University of Amsterdam, THe Netherlands; UC Louvain; Belgium

  7. Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery

    Satyam Kumar; Vishnu Asutosh Dasu; Anubhab Baksi; Santanu Sarkar; Dirmanto Jap; Jakub Breier; Shivam Bhasin
    Indian Institute of Technology, Madras; TCS Research and Innovation, India; Nanyang Technological University, Singapore; Silicon Austria Labs, Graz, Austria; Temasek Labs, Nanyang Technological University

  8. ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption

    Antonio de la Piedra; Marloes Venema; Greg Alpár
    Kudelski Security Research Team; Radboud University; Open University of the Netherlands; Radboud University

  9. BAT: Small and Fast KEM over NTRU Lattices

    Pierre-Alain Fouque; Paul Kirchner; Thomas Pornin; Yang Yu
    Rennes Univ, IRISA, Rennes, France; NCC Group, Quebec, Canada; BNRist, Tsinghua University, Beijing, China

  10. Transitional Leakage in Theory and Practice - Unveiling Security Flaws in Masked Circuits

    Nicolai Müller; David Knichel; Pascal Sasdrich; Amir Moradi
    Ruhr-University Bochum; University of Cologne

  11. Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers

    Fan Zhang; Tianxiang Feng; Zhiqi Li; Kui Ren; Xinjie Zhao
    School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China; State Key Laboratory of Cryptology, Beijing, China; Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou, China; Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Hangzhou, China; Henan Province Key Laboratory of Cyberspace Situation Awareness, Zhengzhou, China

TCHES 2022, issue 3

  1. A Security Model for Randomization-based Protected Caches

    Jordi Ribes-González; Oriol Farràs; Carles Hernández; Vatistas Kostalabros; Miquel Moretó
    Universitat Rovira i Virgili; Universitat Politècnica de València; Barcelona Supercomputing Center

  2. When the Decoder Has to Look Twice: Glitching a PUF Error Correction

    Jonas Ruchti; Michael Gruber; Michael Pehl
    Technical University of Munich, Munich, Germany

  3. Complete and Improved FPGA Implementation of Classic McEliece

    Po-Jen Chen; Tung Chou; Sanjay Deshpande; Norman Lahr; Ruben Niederhagen; Jakub Szefer; Wen Wang
    NTU; Academia Sinica; Yale University; Fraunhofer SIT; University of Southern Denmark

  4. Composable Gadgets with Reused Fresh Masks - First-Order Probing-Secure Hardware Circuits with only 6 Fresh Masks

    David Knichel; Amir Moradi
    Ruhr University Bochum; University of Cologne

  5. The Hidden Parallelepiped Is Back Again: Power Analysis Attacks on Falcon

    Morgane Guerreau; Ange Martinelli; Thomas Ricosset; Mélissa Rossi
    ANSSI; Thales

  6. The Wiretap Channel for Capacitive PUF-Based Security Enclosures

    Kathrin Garb; Marvin Xhemrishi; Ludwig Kürzinger; Christoph Frisch
    Technical University of Munich

  7. On Efficient and Secure Code-based Masking: A Pragmatic Evaluation

    Qianmei Wu; Wei Cheng; Sylvain Guilley; Fan Zhang; Wei Fu
    LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France; Secure-IC S.A.S., Paris, France; Institute of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University; ANT GROUP

  8. Don't Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE

    Norman Lahr; Qian Guo; Clemens Hlauschek; Robin Leander Schröder; Thomas Johansson; Alexander Nilsson
    Fraunhofer SIT; Lund University; Technische Universität Wien, RISE GmbH; Technische Universität Wien; Lund University, Advenica AB

  9. SIKE Channels

    Luca De Feo; Nadia El Mrabet; Aymeric Genêt; Novak Kaluđerović; Natacha Linard de Guertechin; Simon Pontié; Élise Tasso
    IBM Research Europe; Mines Saint-Etienne; EPFL; CYSEC; CEA-Leti

  10. Side-Channel Masking with Common Shares

    Weijia Wang; Chun Guo; Yu Yu; Fanjie Ji; Yang Su
    Shandong University; Shanghai Jiao Tong University

  11. BreakMi: Reversing, Exploiting and Fixing Xiaomi Fitness Tracking Ecosystem

    Marco Casagrande; Eleonora Losiouk; Mauro Conti; Mathias Payer; Daniele Antonioli
    EURECOM; University of Padua; EPFL

  12. SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers

    Nasour Bagheri; Sadegh Sadeghi; Prasanna Ravi; Shivam Bhasin; Hadi Soleimany
    CPS2 lab., Shahid Rajaee Teacher Training University, Iran; Department of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, Iran and Research Center for Basic Sciences and Modern Technologies (RBST), Institute for Advanced Studies in Basic Sciences (IASBS), Zanjan, Iran; Temasek Laboratories, NTU, Singapore; Cyber Research Center, Shahid Beheshti University, Iran

  13. Know Time to Die - Integrity Checking for Zero Trust Chiplet-based Systems Using Between-Die Delay PUFs

    Aleksa Deric; Daniel Holcomb
    UMass Amherst

  14. The Best of Two Worlds: Deep Learning-assisted Template Attack

    Lichao Wu; Guilherme Perin; Stjepan Picek
    TU Delft; Radboud University and TU Delft

  15. Beware of Insufficient Redundancy - An Experimental Evaluation of Code-based FI Countermeasures

    Timo Bartkewitz; Sven Bettendorf; Thorben Moos; Amir Moradi; Falk Schellenberg
    TÜViT; Université catholique de Louvain; University of Cologne; Max Planck Institute for Security and Privacy

TCHES 2022, issue 4

  1. When Bad News Become Good News: Towards Usable Instances of Learning with Physical Errors

    Davide Bellizia; Clément Hoffmann; Dina Kamel; Pierrick Méaux; François-Xavier Standaert
    UCLouvain; Luxembourg University; UC Louvain

  2. Attacks Against White-Box ECDSA and Discussion of Countermeasures - A Report on the WhibOx Contest 2021

    Friederike Laus; Johannes Mittmann; Maximilian Gebhardt; Dominik Klein; Sven Bauer; Hermann Drexler
    Bundesamt für Sicherheit in der Informationstechnik; Giesecke+Devrient Mobile Security GmbH

  3. SYNFI: Pre-Silicon Fault Analysis of an Open-Source Secure Element

    Pascal Nasahl; Miguel Osorio; Pirmin Vogel; Michael Schaffner; Timothy Trippel; Dominic Rizzo; Stefan Mangard
    Graz University of Technology; Google; lowRISC

  4. An energy and area efficient, all digital entropy source compatible with modern standards based on jitter pipelining

    Adriaan Peetermans; Ingrid Verbauwhede
    imec-COSIC, KU Leuven

  5. Faster constant-time decoder for MDPC codes and applications to BIKE KEM

    Thales Paiva; Routo Terada
    University of Sao Paulo

  6. Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation

    Yaobin Shen; Thomas Peters; François-Xavier Standaert; Gaëtan Cassiers; Corentin Verhamme
    UCLouvain, Belgium

  7. A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion

    Kavya Sreedhar; Mark Horowitz; Christopher Torng
    Stanford University

  8. Randomness Optimization for Gadget Compositions in Higher-Order Masking

    Jakob Feldtkeller; David Knichel; Pascal Sasdrich; Amir Moradi; Tim Güneysu
    Ruhr-University Bochum; Uni­ver­si­ty of Co­lo­gne

  9. Perceived Information Revisited: New Metrics to Evaluate Success Rate of Side-Channel Attacks

    Akira Ito; Rei Ueno; Naofumi Homma
    NTT Corporation; Tohoku University

  10. VERICA - Verification of Combined Attacks Automated formal verification of security against simultaneous information leakage and tampering

    Jan Richter-Brockmann; Jakob Feldtkeller; Pascal Sasdrich; Tim Güneysu
    Ruhr-University Bochum; Ruhr-University Bochum, DFKI

  11. Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber

    Yanbin Li; Jiajie Zhu; Yuxin Huang; Zhe Liu; Ming Tang
    Nanjing Agricultural University; Zhejiang Lab; Nanjing University of Aeronautics and Astronautics; Wuhan University

  12. PROLEAD - A Probing-Based Hardware Leakage Detection Tool

    Nicolai Mueller; Amir Moradi
    Ruhr-University Bochum; University of Cologne

  13. Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4

    Erdem Alkim; Vincent Hwang; Bo-Yin Yang
    Dokuz Eylul University; National Taiwan University; Academia Sinica

  14. Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks

    Melissa Azouaoui; Yulia Kuzovkova; Tobias Schneider; Christine van Vredendaal
    NXP Semiconductors

  15. Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis - A Report on the CHES Challenge Side-Channel Contest 2020

    Friederike Laus; Werner Schindler; Aron Gohr
    Bundesamt für Sicherheit in der Informationstechnik; Independent Researcher

  16. PreMSat: Preventing Magnetic Saturation Attack on Hall Sensors

    Anomadarshi Barua; Mohammad Abdullah Al Faruque
    University of California, Irvine

  17. Redshift: Manipulating Signal Propagation Delay via Continuous-Wave Lasers

    Kohei Yamashita; Benjamin Cyr; Kevin Fu; Wayne Burleson; Takeshi Sugawara
    The University of Electro-Communications; University of Michigan; University of Massachusetts Amherst

  18. One Truth Prevails: A Deep-learning Based Single-Trace Power Analysis on RSA–CRT with Windowed Exponentiation

    Kotaro Saito; Akira Ito; Rei Ueno; Naofumi Homma
    Tohoku University

  19. ECDSA White-Box Implementations : Attacks and Designs from CHES 2021 Challenge

    Guillaume Barbu; Ward Beullens; Emmanuelle Dottax; Christophe Giraud; Agathe Houzelot; Chaoyun Li; Mohammad Mahzoun; Adrián Ranea; Jianrui Xie
    IDEMIA; IBM Research; imec-COSIC KU Leuven; Eindhoven University of Technology

  20. Bitslicing Arithmetic/Boolean Masking Conversions for Fun and Profit with Application to Lattice-Based KEMs

    Olivier Bronchain; Gaëtan Cassiers
    UCLouvain, Belgium

  21. A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks

    Brian Udugama; Darshana Jayasinghe; Hassaan Saadat; Aleksandar Ignjatovic; Sri Parameswaran
    UNSW

  22. Improved Plantard Arithmetic for Lattice-based Cryptography

    Junhao Huang; Jipeng Zhang; Haosong Zhao; Zhe Liu; Ray C. C. Cheung; Çetin Kaya Koç; Donglong Chen
    Guangdong Provincial Key Laboratory of Interdisciplinary Research and Application for Data Science, BNU-HKBU United International College; Nanjing University of Aeronautics and Astronautics; Nanjing University of Aeronautics and Astronautics; Zhejiang Lab; City University of Hong Kong; University of California Santa Barbara; Nanjing University of Aeronautics and Astronautics

  23. Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber

    Jeroen Delvaux
    Technology Innovation Institute

  24. SoK: Fully Homomorphic Encryption over the [Discretized] Torus

    Marc Joye
    Zama

  25. Riding the Waves Towards Generic Single-Cycle Masking in Hardware

    Rishub Nagpal; Barbara Gigerl; Robert Primas; Stefan Mangard
    Lamarr Security Research; Graz University of Technology

  26. Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, Saber, and NTRU

    Bo-Yin Yang; Jiaxiang Liu; Xiaomu Shi; Vincent Hwang; Ming-Hsien Tsai; Bow-Yaw Wang; Gregor Seiler
    Academia Sinica; Shenzhen University; Academia Sinica and Taiwan University; National Applied Research Labs, Taiwan; IBM Research Zurich

  27. SoC Root Canal! Root Cause Analysis of Power Side-Channel Leakage in System-on-Chip Designs

    Pantea Kiaei; Patrick Schaumont
    Worcester Polytechnic Institute

  28. Side-Channel Expectation-Maximization Attacks

    Julien Béguinot; Wei Cheng; Sylvain Guilley; Olivier Rioul
    Télécom Paris, Institut Polytechnique de Paris; Télécom Paris, Institut Polytechnique de Paris, Secure IC

  29. A Key-Recovery Side-Channel Attack on Classic McEliece Implementations

    Qian Guo; Andreas Johansson; Thomas Johansson
    Lund University

  30. Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis

    Guilherme Perin; Lichao Wu; Stjepan Picek
    Radboud University and TU Delft; TU Delft

  31. On the application of Two-Photon Absorption for Laser Fault Injection attacks

    Bodo Selmke; Maximilian Pollanka; Hayden Wen; Andreas Duensing; Emanuele Strieder; Michael Mittermair; Reinhard Kienberger; Georg Sigl
    Fraunhofer AISEC; Technical University of Munich (TUM), Chair for Laser and X-ray Physics; echnical University of Munich (TUM), Chair of Security in Information Technology

  32. GE vs GM: Efficient side-channel security evaluations on full cryptographic keys

    Anca Rădulescu; Pantelimon George Popescu; Marios Omar Choudary
    University Politehnica of Bucharest