CHES 2024

September 4-7, 2024

Halifax, Canada

Accepted Papers

TCHES 2024, issue 1

  1. Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware

    Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
    Ruhr-University Bochum; Hamburg University of Technology; NXP; DFKI GmbH

  2. A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

    Anna Guinet, Georg Land, Ioan Gabriel Bucur, Tim Güneysu
    Ruhr University Bochum; Radboud University

  3. 1LUTSensor: Detecting FPGA Voltage Fluctuations using LookUp Tables

    Darshana Jayasinghe, Brian Udugama, Sri Parameswaran
    University of Sydney; University of New South Wales

  4. Fast and Clean: Auditable high-performance assembly via constraint solving

    Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, Fabien Klein
    Ruhr University Bochum; Max Planck Institute for Security and Privacy; Amazon Web Services; Chelpis; Arm Ltd.

  5. All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M

    Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama
    University of Electro-Communications; Rambus Inc.; KU Leuven; Osaka University; University of Bergen

  6. Who Watches the Watchers: Attacking Glitch Detection Circuits

    Amund Askeland, Svetla Nikova, Ventzislav Nikov
    University of Bergen; KU Leuven; NXP Semiconductors

  7. SEV-Step: A Single-Stepping Framework for AMD-SEV

    Luca Wilke, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth
    University of Lübeck

  8. Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment

    Florent Bernard, Arturo Garay, Patrick Haddad, Nathalie Bochard, Viktor Fischer
    Université de Lyon; STMicroelectronics; Czech Technical University

  9. StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

    Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar
    KU Leuven

  10. Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

    Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
    Tohoku University; NEC

  11. Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency

    Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas
    Graz University of Technology; Infineon Technologies AG; Intel Labs

  12. EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis

    Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay
    Indian Institute of Technology Kharagpur

  13. High-assurance zeroization

    Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe
    Max Planck Institute for Security and Privacy; IMDEA Software Institute; Neodyme AG; Inria; Radboud University

  14. Quasi-linear masking against SCA and FIA, with cost amortization

    Claude CARLET, Abderrahman DAIF, Sylvain GUILLEY, Cédric TAVERNIER
    University of Bergen; University of Paris; BULL-SAS, Trustway; TELECOM-ParisTech; Secure-IC; HENSOLDT

  15. Quantile: Quantifying Information Leakage

    Vedad Hadžić, Gaëtan Cassiers, Robert Primas, Stefan Mangard, Roderick Bloem
    Graz University of Technology; Intel Labs

  16. TeeJam: Sub-Cache-Line Leakages Strike Back

    Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, Yuval Yarom
    University of Lübeck; University of Melbourne; Ruhr University Bochum

  17. CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs

    Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay
    Indian Institute of Technology Kharagpur; Indian Institute of Engineering Science and Technology Shibpur; TU Berlin; University of Connecticut

  18. ModHE: Modular Homomorphic Encryption Using Module Lattices (Potentials and Limitations)

    Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
    Graz University of Technology; Samsung Advanced Institute of Technology

  19. Faster Bootstrapping via Composite NTT and Modulus Raising

    Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang
    State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS

  20. Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation

    Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang
    Tsinghua University; Ant Group

TCHES 2024, issue 2

  1. Revisiting Keccak and Dilithium Implementations on ARMv7-M

    Junhao Huang, Alexandre Adomnicăi, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
    BNU-HKBU United International College; Hong Kong Baptist University; Independent researcher; Nanjing University of Aeronautics and Astronautics; Zhejiang Lab; Sun Yat-sen University; City University of Hong Kong; Nanjing University of Aeronautics and Astronautics; Iğdır University; University of California Santa Barbara

  2. ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches

    Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin
    University of Science and Technology of China; University of Chinese Academy of Sciences; Ant Group

  3. Single trace HQC shared key recovery with SASCA

    Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
    Université Grenoble Alpes; CEA, Leti, MINATEC Campus; University of Limoges

  4. Unlock the Door to my Secrets, but don’t Forget to Glitch

    Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein
    Fraunhofer Institute for Applied and Integrated Security; Bundesamt für Sicherheit in der Informationstechnik

  5. A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

    Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang
    Zhejiang University; BNU-HKBU United International College; City University of Hong Kong

  6. Impeccable Keccak

    Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl
    Fraunhofer Institute for Applied and Integrated Security; Technical University of Munich

  7. High-Performance Hardware Implementation of MPCitH and Picnic3

    Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju
    Tsinghua University; Shandong University

  8. SDitH in Hardware

    Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
    Yale University; SandboxAQ

  9. Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4

    Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer
    IBM Research Europe; RheinMain University of Applied Sciences; Brave Software; QSMC

  10. Masking Floating-Point Number Multiplication and Addition of Falcon

    Keng-Yu Chen, Jiun-Peng Chen
    National Taiwan University; Academia Sinica

  11. MiRitH — Efficient Post-Quantum Signatures from MinRank in the Head

    Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Floyd Zweydinger, Javier Verbel
    Technology Innovation Institute; Politecnico di Torino

  12. eLIMInate: a Leakage-focused ISE for Masked Implementation

    Hao Cheng, Daniel Page, Weijia Wang
    University of Luxembourg; University of Bristol; Shandong University

  13. Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium

    Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider
    NXP Semiconductors

  14. Distribution of Signal to Noise Ratio and Application to Leakage Detection

    Mathieu des Noes
    CEA-Leti; Université Grenoble Alpes

  15. Efficient ASIC Architecture for Low Latency Classic McEliece Decoding

    Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke
    RWTH Aachen University

  16. JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

    Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar
    Max Planck Institute for Security and Privacy; Technische Universität Darmstadt

  17. CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption

    Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie
    Villanova University; San José State University; UCSB, Iğdır University, NUAA

  18. Compact Circuits for Efficient Mobius Transform

    Subhadeep Banik, Francesco Regazzoni
    University of Lugano; University of Amsterdam; Università della Svizzera italiana

  19. Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm

    Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He
    Wuhan University

  20. Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption

    Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto
    University of Hyogo; University of Lugano; EPFL; Tokyo Institute of Technology; NEC; Mitsubishi Electric Corporation

  21. OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

    Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko
    Google; Université Jean Monnet; CryptoExperts; University of Luxembourg

  22. A Low-Latency High-Order Arithmetic to Boolean Masking Conversion

    Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu
    Beijing National Research Center for Information Science and Technology; Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.

  23. Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays

    Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu
    Tsinghua University; Huawei Cloud Co., Ltd.; Lanzhou University

  24. UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication

    Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu
    Beijing National Research Center for lnformation Science and Technology; Tsinghua University; Shaanxi Normal University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.

  25. TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips

    Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil
    Masaryk University; Red Hat; NUKIB

  26. Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

    Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer
    Yale University

  27. High-Performance Design Patterns and File Formats for Side-Channel Analysis

    Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler
    Oregon State University; Independent Security Researcher

  28. Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption: A Case Study on Crystals-Kyber

    Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin
    Temasek Labs, Nanyang Technological University; FUNDEP and CASNAV; KU Leuven

  29. SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning

    Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang
    Zhejiang University; Alibaba Group

  30. Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM

    Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
    KU Leuven; Indian Institute of Technology Kharagpur; Université catholique de Louvain; Indian Institute of Technology Kanpur

  31. Impact of the Flicker Noise on the Ring Oscillator-based TRNGs

    Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez
    Université Grenoble Alpes; CEA, Leti, MINATEC Campus; Jean Monnet University; CEA-Leti