September 10-14, 2023

Prague, Czech Republic

Accepted Papers

TCHES 2023, issue 1

  1. Risky Translations: Securing TLBs against Timing Side Channels

    Florian Stolz, Jan Philipp Thoma, Pascal Sasdrich, Tim Güneysu
    Horst Görtz Institute for IT-Security, Ruhr University Bochum

  2. Don’t Learn What You Already Know: Grey-Box Modeling for Profiling Side-Channel Analysis against Masking

    Loïc Masure, Valence Cristiani, Maxime Lecomte, François-Xavier Standaert
    UCLouvain; CEA - Leti

  3. Adapting Belief Propagation to Counter Shuffling of NTTs

    Julius Hermelink, Silvan Streit, Emanuele Strieder, Katharina Thieme
    Universität der Bundeswehr München; Fraunhofer Institute for Applied and Integrated Security

  4. Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber

    Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang
    China University of Geosciences, Wuhan; Lund University, Lund, Sweden; Huazhong University of Science and Technology

  5. Low-Latency and Low-Randomness Second-Order Masked Cubic Functions

    Aein Rezaei Shahmirzadi, Siemen Dhooghe, Amir Moradi
    Ruhr University Bochum; KU Leuven/ imec-COSIC

  6. High-order Polynomial Comparison and Masking Lattice-based Encryption

    Jean-Sebastien Coron, François Gérard, Simon Montoya, Rina Zeitoun
    University of Luxembourg; Idemia

  7. RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

    Hao Cheng, Johann Großschädl, Ben Marshall, Dan Page, Thinh Pham
    University of Luxembourg; PQShield Ltd; University of Bristol

  8. High Order Side-Channel Security for Elliptic-Curve Implementations

    Sonia Belaïd, Matthieu Rivain
    CryptoExperts

  9. MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations

    Giovanni Camurati, Matteo Dell'Amico, François-Xavier Standaert
    ETH Zurich; University of Genoa; UC Louvain

  10. ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection

    Tahoura Mosavirik, Patrick Schaumont, Shahin Tajik
    Worcester Polytechnic Institute

  11. BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions

    Yanis Belkheyar, Joan Daemen, Christoph Dobraunig, Santosh Ghosh, Shahram Rasoolzadeh
    Radboud University, Nijmegen, The Netherlands; Intel Labs, Hillsboro, USA

  12. Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures

    Yufeng Tang, Zheng Gong, Jinhai Chen, Nanjiang Xie
    School of Computer Science, South China Normal University, China

  13. Information Theory-based Evolution of Neural Networks for Side-channel Analysis

    Rabin Y. Acharya, Fatemeh Ganji, Domenic Forte
    University of Florida; Worcester Polytechnic Institute

  14. Low-Latency Design and Implementation of the Squaring in Class Groups for Verifiable Delay Function Using Redundant Representation

    Danyang Zhu, Rongrong Zhang, Lun Ou, Jing Tian, Zhongfeng Wang
    The School of Electronic Science and Engineering, Nanjing University

  15. Medha: Microcoded Hardware Accelerator for Processing Encrypted Data

    Ahmet Can Mert, Aikata, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, Yongwoo Lee, Sujoy Sinha Roy
    Graz University of Technology; Samsung Advanced Institute of Technology

  16. FDFB: Full Domain Functional Bootstrapping Towards Practical Fully Homomorphic Encryption

    Kamil Kluczniak, Leonard Schild
    CISPA Helmholtz Center for Information Security

  17. Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts

    Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo
    School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China; Alibaba-Zhejiang University Joint Research Institute of Frontier Technologies, Hangzhou, China; Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province, Hangzhou, China; Shanghai Institute of Satellite Engineering, Shanghai, China; Henan Province Key Laboratory of Cyberspace Situation Awareness, Zhengzhou, China

  18. A Faster Third-Order Masking of Lookup Tables

    Anju Alexander, Annapurna Valiveti, Srinivas Vivek
    IIIT Bangalore, IN

  19. SoK: SCA-secure ECC in software - mission impossible?

    Lukasz Chmielewski, Peter Schwabe, Lejla Batina, Niels Samwel, Björn Haase
    Masaryk University, Brno, Czechia; Radboud University, The Netherlands; Riscure, The Netherlands; Max Planck Institute for Security and Privacy, Bochum, Germany; Endress+Hauser Liquid Analysis GmbH&Co. KG, Germany

TCHES 2023, issue 2

  1. PMFault: Faulting and Bricking Server CPUs through Management Interfaces

    Zitai Chen, David Oswald
    University of Birmingham, UK

  2. Peek into the Black-Box: Interpretable Neural Network using SAT Equations in Side-Channel Analysis

    Trevor Yap, Adrien Benamira, Shivam Bhasin, Thomas Peyrin
    Nanyang Technological University

  3. Garbled Circuits from an SCA Perspective. Free XOR can be Quite Expensive...

    Itamar Levi, Carmit Hazay
    Bar-Ilan University

  4. On Protecting SPHINCS+ Against Fault Attacks

    Aymeric Genêt
    EPFL and Kudelski Group

  5. Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input

    Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba
    University of Hyogo; NICT; NEC Corporation; Mitsubishi Electric Corporation

  6. Threshold Implementations in Software: Micro-architectural Leakages in Algorithms

    John Gaspoz, Siemen Dhooghe
    KU LEUVEN

  7. High-order masking of NTRU

    Jean-Sebastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
    University of Luxembourg; IDEMIA

  8. FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software

    Keerthi K, Chester Rebeiro
    Indian Institute of Technology Madras

  9. How Secure is Exponent-blinded RSA–CRT with Sliding Window Exponentiation?

    Rei Ueno, Naofumi Homma
    Tohoku University

  10. Some New Methods to Generate Short Addition Chains

    Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang, Jianwei Liu
    School of Cyber Science and Technology, Beihang University; Beijing Institute of Satellite Information Engineering

  11. Efficient Private Circuits with Precomputation

    Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu
    Shandong University; Shanghai Jiao Tong Univeristy

  12. Conditional Variational AutoEncoder based on Stochastic Attacks

    Gabriel Zaid, Lilian Bossuet, Mathieu Carbone, Amaury Habrard, Alexandre Venelli
    Thales ITSEF, Toulouse, France; Univ Lyon, Saint-Etienne, France; CNRS Laboratoire Hubert Curien, Saint-Etienne, France; Institut Universitaire de France (IUF), Paris, France; NXP Semiconductors, Toulouse, France

  13. Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs

    GUIWEN LUO, SHIHUI FU, GUANG GONG
    University of Waterloo

  14. A Closer Look at the Chaotic Ring Oscillators based TRNG Design

    Shuqin Su, Bohan Yang, Vladimir Rožić, Mingyuan Yang, Min Zhu, Shaojun Wei, Leibo Liu
    Tsinghua University; KU Leuven; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd., Wuxi, China

  15. Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond

    Gokulnath Rajendran, PRASANNA RAVI, Jan-Pieter D'Anvers, Shivam Bhasin, Anupam Chattopadhyay
    School of Computer Science and Engineering, Nanyang Technological University, Singapore; Temasek Labs, Nanyang Technological University, Singapore; imec-COSIC, KU Leuven

  16. Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform

    PRASANNA RAVI, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay
    Temasek Labs, Nanyang Technological University, Singapore; School of Computer Science and Engineering, Nanyang Technological University, Singapore; Zhejiang University, Hangzhou, China; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Hangzhou, China; ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China; Jiaxing Research Institute, Zhejiang University, Jiaxing, China

  17. Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks

    Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, François-Xavier Standaert
    Graz University of Technology; Lamarr Security Research; UCLouvain

  18. RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks

    David Spielmann, Ognjen Glamocanin, Mirjana Stojilovic
    EPFL

  19. Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate

    Luyao Xu, Baofeng Wu, Zhengyi Dai, Dongdai Lin
    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Acdamy of Sciences; College of Computer, National University of Defense Technology

  20. "Whispering MLaaS" Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks

    Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Pabitra Mitra, Debdeep Mukhopadhyay
    Indian Institute of Technology, Kharagpur; NYU Abu Dhabi; IMEC Belgium

TCHES 2023, issue 3

  1. Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

    Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer
    FortifyIQ, Inc.

  2. Pasta: A Case for Hybrid Homomorphic Encryption

    Christoph Dobraunig, Lorenzo Grassi, Lukas Helminger, Christian Rechberger, Markus Schofnegger, Roman Walch
    Lamarr Security Research; Radboud University Nijmegen; Graz University of Technology; Know-Center GmbH

  3. Enabling FrodoKEM on Embedded Devices

    Frank Custers, Joppe Bos, Olivier Bronchain, Joost Renes, Christine van Vredendaal, Denise Verbakel
    NXP Semiconductors; Radboud University

  4. Cryptanalysis of ARX-based White-box Implementations

    Alex Biryukov, Baptiste Lambin, Aleksei Udovenko
    DCS and SnT, University of Luxembourg; SnT, University of Luxembourg

  5. Cache-Timing Attack Against HQC

    Senyang Huang, Rui Qi Sim, Chitchanok Chuengsatiansup, Qian Guo, Thomas Johansson
    Lund University; University of Adelaide; The University of Melbourne

  6. Formally verifying Kyber Part I: Implementation Correctness

    José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Hugo Pacheco, Miguel Quaresma, Peter Schwabe, Antoine Séré, Pierre-Yves Strub
    University of Minho & INESC TEC; University of Porto (FCUP) & INESC TEC; Max Planck Institute for Security and Privacy; Université Côte d’Azur, Inria; Université de Lorraine, CNRS, Inria; Max Planck Institute for Security and Privacy & Radboud University; École Polytechnique; Meta

  7. cuZK: Accelerating Zero-Knowledge Proof with A Faster Parallel Multi-Scalar Multiplication Algorithm on GPUs

    Tao Lu, Chengkun Wei, Ruijing Yu, Chaochao Chen, Wenjing Fang, Lei Wang, Zeke Wang, Wenzhi Chen
    Zhejiang University; Ant Group

  8. Separating Oil and Vinegar with a Single Trace

    Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger
    University of Regensburg; Radboud University, Nijmegen; RheinMain University of Applied Sciences Wiesbaden

  9. Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling

    Kittiphon Phalakarn, Vorapong Suppakitpaisarn, Francisco Rodríguez-Henríquez, M. Anwar Hasan
    University of Waterloo; The University of Tokyo; CINVESTAV-IPN and Technology Innovation Institute

  10. Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations

    Gaëtan Cassiers, Henri Devillez, François-Xavier Standaert, Balazs Udvarhelyi
    TU Graz, Austria; UCLouvain, Belgium

  11. JitSCA: Jitter-based Side-Channel Analysis in Picoscale Resolution

    Kai Schoos, Sergej Meschkov, Mehdi Tahoori, Dennis Gnad
    Karlsruhe Institute of Technology

  12. Oil and Vinegar: Modern Parameters and Implementations

    Ward Beullens, Ming-Shing Chen, Shih-Hao Hung, Matthias J. Kannwischer, Bo-Yuan Peng, Cheng-Jhih Shih, Bo-Yin Yang
    IBM Research Zurich, Switzerland; Academia Sinica; National Taiwan University

  13. Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography

    Aikata Aikata, Andrea Basso, Gaëtan Cassiers, Ahmet Can Mert, Sujoy Sinha Roy
    Graz University of Technology; University of Birmingham

  14. PROLEAD_SW - Probing-Based Software Leakage Detection for ARM Binaries

    Jannik Zeitschner, Nicolai Müller, Amir Moradi
    Ruhr University Bochum

  15. Deep Learning Side-Channel Collision Attack

    Marvin Staib, Amir Moradi
    Ruhr University Bochum

  16. Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings

    Patrick Longa
    Microsoft Research

  17. Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs

    Yutaro Tanaka, Rei Ueno, Keita Xagawa, Akira Ito, Junko Takahashi, Naofumi Homma
    Tohoku University; Social Informatics Laboratories, NTT Corporation

  18. EdMSM: Multi-Scalar-Multiplication for recursive SNARKs and more

    Youssef El Housni, Gautam Botrel
    ConsenSys R&D

  19. Information Bounds and Convergence Rates for Side-Channel Security Evaluators

    Loïc Masure, Gaëtan Cassiers, Julien Hendrickx, François-Xavier Standaert
    Université catholique de Louvain; Graz University of Technology, Graz, Austria; Lamarr Security Research, Graz, Austria

  20. RAFA: Redundancies-assisted Algebraic Fault Analysis and its Implementation on SPN block ciphers

    Zehong (Zephyr) Qiu, Fan (Terry) Zhang, Tianxiang Feng, Xue Gong
    Zhejiang University

TCHES 2023, issue 4

  1. Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers

    Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang
    School of Cyber Science and Technology, Shandong University; Institute for Advanced Study, BNRist, Tsinghua University; BNRist, Tsinghua University; Institute for Network Sciences and Cyberspace, BNRist, Tsinghua University

  2. BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption

    Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
    COSIC KU Leuven; Galois, Inc.; Niobium Microsystems

  3. Protecting Dilithium against Leakage Revisited Sensitivity Analysis and Improved Implementations

    Christine van Vredendaal, Olivier Bronchain, Clément Hoffmann, François-Xavier Standaert, Gaetan Cassiers, Joost Renes, Markus Schönauer, Melissa Azouaoui, Tobias Schneider, Yulia Kuzovkova
    NXP Semiconductors; UCLouvain; TUGraz

  4. MMM: Authenticated Encryption with Minimum Secret State for Masking

    Yusuke Naito, Yu Sasaki, Takeshi Sugawara
    Mitsubishi Electric Corporation; NTT Social Informatics Laboratories; The University of Electro-Communications

  5. Improved Gadgets for the High-Order Masking of Dilithium

    Jean-Sébastien Coron, François Gérard, Matthias Trannoy, Rina Zeitoun
    University of Luxembourg; IDEMIA

  6. Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards

    Alexander May, Carl Richard Theodor Schneider
    Ruhr University Bochum

  7. On Provable White-box Security in the Strong Incompressibility Model

    Estuardo {Alpirez Bock}, Chris Brzuska, Russell W. F. Lai
    Xiphera LTD; Aalto University

  8. Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach

    Andersson Calle Viera, Maya Chartouny, Damien Vergnaud, David Vigilant, Alexandre Berzati, Steven Madec
    Thales DIS, Sorbonne Université Lip6; Thales DIS, Paris Saclay; Sorbonne Université, Lip6; Thales DIS

  9. Enhancing Quality and Security of the PLL-TRNG

    Viktor Fischer, Florent Bernard, Nathalie Bochard, Quentin Dallison, Maciej Skórski
    Hubert Curien Laboratory, Jean Monnet University; THALES, Gennevilliers, France; University of Warsaw, Warsaw, Poland

  10. Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis

    Tahoura Mosavirik, Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik
    Worcester Polytechnic Institute (WPI)

  11. From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium

    Mohamed ElGhamrawy, Melissa Azouaoui, Olivier Bronchain, Joost Renes, Tobias Schneider, Markus Schönauer, Okan Seker, Christine van Vredendaal
    NXP Semiconductors and Hamburg University of Applied Sciences, Hamburg, Germany; NXP Semiconductors, Hamburg, Germany; NXP Semiconductors, Leuven, Belgium; NXP Semiconductors, Eindhoven, the Netherlands; NXP Semiconductors, Gratkorn, Austria

  12. Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors

    Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek
    Max Planck Institute for Security and Privacy; Selmer Center, Department of Informatics, University of Bergen; Department of Electrical and Information Technology, Lund University; Digital Security Group, Radboud University; Infineon Technologies AG; Universität der Bundeswehr München

  13. LPN-based Attacks in the White-box Setting

    Alex Charlès, Aleksei Udovenko
    University of Luxembourg, Esch-sur-Alzette, Luxembourg

  14. Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD

    Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao
    University of Cambridge; University of Warwick

  15. Loop Aborts Strike Back: Defeating Fault Countermeasures in Lattice Signatures with ILP

    Vincent Ulitzsch, Soundes Marzougui, Alexis Victor Nicolas Bagia, Mehdi Tibouchi, Jean-Pierre Seifert
    TU Berlin -- SECT; NTT Social Informatics Laboratories

  16. Don't Forget Pairing-Friendly Curves with Odd Prime Embedding Degrees

    Yu Dai, Fangguo Zhang, Chang-An Zhao
    Wuhan University and Sun Yat-Sen University; Sun Yat-Sen University

  17. Long Paper: Provable secure Parallel Gadgets

    Francesco Berti, Sebastian Faust, Maximilian Orlt
    Bar-Ilan University; Technical University of Darmstadt

  18. Pincering SKINNY by Exploiting Slow Diffusion: Enhancing Differential Power Analysis with Cluster Graph Inference

    Nicolas Costes, Martijn Stam
    Simula UiB

  19. Revisiting the Computation Analysis against Internal Encodings in White-Box Implementations

    Yufeng Tang, Zheng Gong, Bin Li, Liangju Zhao
    School of Computer Science, South China Normal University