CHES 2024

September 4-7, 2024

Halifax, Canada

Accepted Papers

TCHES 2024, issue 1

  1. Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware

    Georg Land, Adrian Marotzke, Jan Richter-Brockmann, Tim Güneysu
    Ruhr-University Bochum; Hamburg University of Technology; NXP; DFKI GmbH

  2. A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

    Anna Guinet, Georg Land, Ioan Gabriel Bucur, Tim Güneysu
    Ruhr University Bochum; Radboud University

  3. 1LUTSensor: Detecting FPGA Voltage Fluctuations using LookUp Tables

    Darshana Jayasinghe, Brian Udugama, Sri Parameswaran
    University of Sydney; University of New South Wales

  4. Fast and Clean: Auditable high-performance assembly via constraint solving

    Amin Abdulrahman, Hanno Becker, Matthias J. Kannwischer, Fabien Klein
    Ruhr University Bochum; Max Planck Institute for Security and Privacy; Amazon Web Services; Chelpis; Arm Ltd.

  5. All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M

    Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama
    University of Electro-Communications; Rambus Inc.; KU Leuven; Osaka University; University of Bergen

  6. Who Watches the Watchers: Attacking Glitch Detection Circuits

    Amund Askeland, Svetla Nikova, Ventzislav Nikov
    University of Bergen; KU Leuven; NXP Semiconductors

  7. SEV-Step: A Single-Stepping Framework for AMD-SEV

    Luca Wilke, Jan Wichelmann, Anja Rabich, Thomas Eisenbarth
    University of Lübeck

  8. Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment

    Florent Bernard, Arturo Garay, Patrick Haddad, Nathalie Bochard, Viktor Fischer
    Université de Lyon; STMicroelectronics; Czech Technical University

  9. StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

    Siemen Dhooghe, Artemii Ovchinnikov, Dilara Toprakhisar
    KU Leuven

  10. Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme

    Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu
    Tohoku University; NEC

  11. Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency

    Barbara Gigerl, Franz Klug, Stefan Mangard, Florian Mendel, Robert Primas
    Graz University of Technology; Infineon Technologies AG; Intel Labs

  12. EstraNet: An Efficient Shift-Invariant Transformer Network for Side-Channel Analysis

    Suvadeep Hajra, Siddhartha Chowdhury, Debdeep Mukhopadhyay
    Indian Institute of Technology Kharagpur

  13. High-assurance zeroization

    Santiago Arranz Olmos, Gilles Barthe, Ruben Gonzalez, Benjamin Grégoire, Vincent Laporte, Jean-Christophe Léchenet, Tiago Oliveira, Peter Schwabe
    Max Planck Institute for Security and Privacy; IMDEA Software Institute; Neodyme AG; Inria; Radboud University

  14. Quasi-linear masking against SCA and FIA, with cost amortization

    Claude CARLET, Abderrahman DAIF, Sylvain GUILLEY, Cédric TAVERNIER
    University of Bergen; University of Paris; BULL-SAS, Trustway; TELECOM-ParisTech; Secure-IC; HENSOLDT

  15. Quantile: Quantifying Information Leakage

    Vedad Hadžić, Gaëtan Cassiers, Robert Primas, Stefan Mangard, Roderick Bloem
    Graz University of Technology; Intel Labs

  16. TeeJam: Sub-Cache-Line Leakages Strike Back

    Florian Sieck, Zhiyuan Zhang, Sebastian Berndt, Chitchanok Chuengsatiansup, Thomas Eisenbarth, Yuval Yarom
    University of Lübeck; University of Melbourne; Ruhr University Bochum

  17. CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs

    Nimish Mishra, Kuheli Pratihar, Satota Mandal, Anirban Chakraborty, Ulrich Rührmair, Debdeep Mukhopadhyay
    Indian Institute of Technology Kharagpur; Indian Institute of Engineering Science and Technology Shibpur; TU Berlin; University of Connecticut

  18. ModHE: Modular Homomorphic Encryption Using Module Lattices (Potentials and Limitations)

    Anisha Mukherjee, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
    Graz University of Technology; Samsung Advanced Institute of Technology

  19. Faster Bootstrapping via Composite NTT and Modulus Raising

    Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang
    State Key Laboratory of Information Security, IIE, CAS; School of Cyber Security, UCAS

  20. Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation

    Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang
    Tsinghua University; Ant Group

TCHES 2024, issue 2

  1. Revisiting Keccak and Dilithium Implementations on ARMv7-M

    Junhao Huang, Alexandre Adomnicăi, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
    BNU-HKBU United International College; Hong Kong Baptist University; Independent researcher; Nanjing University of Aeronautics and Astronautics; Zhejiang Lab; Sun Yat-sen University; City University of Hong Kong; Nanjing University of Aeronautics and Astronautics; Iğdır University; University of California Santa Barbara

  2. ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches

    Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin
    University of Science and Technology of China; University of Chinese Academy of Sciences; Ant Group

  3. Single trace HQC shared key recovery with SASCA

    Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
    Université Grenoble Alpes; CEA, Leti, MINATEC Campus; University of Limoges

  4. Unlock the Door to my Secrets, but don’t Forget to Glitch

    Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein
    Fraunhofer Institute for Applied and Integrated Security; Bundesamt für Sicherheit in der Informationstechnik

  5. A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

    Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang
    Zhejiang University; BNU-HKBU United International College; City University of Hong Kong

  6. Impeccable Keccak

    Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl
    Fraunhofer Institute for Applied and Integrated Security; Technical University of Munich

  7. High-Performance Hardware Implementation of MPCitH and Picnic3

    Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju
    Tsinghua University; Shandong University

  8. SDitH in Hardware

    Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
    Yale University; SandboxAQ

  9. Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4

    Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer
    IBM Research Europe; RheinMain University of Applied Sciences; Brave Software; QSMC

  10. Masking Floating-Point Number Multiplication and Addition of Falcon

    Keng-Yu Chen, Jiun-Peng Chen
    National Taiwan University; Academia Sinica

  11. MiRitH — Efficient Post-Quantum Signatures from MinRank in the Head

    Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Floyd Zweydinger, Javier Verbel
    Technology Innovation Institute; Politecnico di Torino

  12. eLIMInate: a Leakage-focused ISE for Masked Implementation

    Hao Cheng, Daniel Page, Weijia Wang
    University of Luxembourg; University of Bristol; Shandong University

  13. Exploiting Small-Norm Polynomial Multiplication with Physical Attacks: Application to CRYSTALS-Dilithium

    Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider
    NXP Semiconductors

  14. Distribution of Signal to Noise Ratio and Application to Leakage Detection

    Mathieu des Noes
    CEA-Leti; Université Grenoble Alpes

  15. Efficient ASIC Architecture for Low Latency Classic McEliece Decoding

    Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke
    RWTH Aachen University

  16. JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing

    Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar
    Max Planck Institute for Security and Privacy; Technische Universität Darmstadt

  17. CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption

    Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie
    Villanova University; San José State University; UCSB, Iğdır University, NUAA

  18. Compact Circuits for Efficient Mobius Transform

    Subhadeep Banik, Francesco Regazzoni
    University of Lugano; University of Amsterdam; Università della Svizzera italiana

  19. Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm

    Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He
    Wuhan University

  20. Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption

    Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto
    University of Hyogo; University of Lugano; EPFL; Tokyo Institute of Technology; NEC; Mitsubishi Electric Corporation

  21. OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

    Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko
    Google; Université Jean Monnet; CryptoExperts; University of Luxembourg

  22. A Low-Latency High-Order Arithmetic to Boolean Masking Conversion

    Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu
    Beijing National Research Center for Information Science and Technology; Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.

  23. Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays

    Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu
    Tsinghua University; Huawei Cloud Co., Ltd.; Lanzhou University

  24. UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication

    Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu
    Beijing National Research Center for lnformation Science and Technology; Tsinghua University; Shaanxi Normal University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.

  25. TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips

    Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil
    Masaryk University; Red Hat; NUKIB

  26. Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers

    Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer
    Yale University

  27. High-Performance Design Patterns and File Formats for Side-Channel Analysis

    Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler
    Oregon State University; Independent Security Researcher

  28. Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption: A Case Study on Crystals-Kyber

    Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D'Anvers, Shivam Bhasin
    Temasek Labs, Nanyang Technological University; FUNDEP and CASNAV; KU Leuven

  29. SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning

    Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang
    Zhejiang University; Alibaba Group

  30. Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM

    Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
    KU Leuven; Indian Institute of Technology Kharagpur; Université catholique de Louvain; Indian Institute of Technology Kanpur

  31. Impact of the Flicker Noise on the Ring Oscillator-based TRNGs

    Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez
    Université Grenoble Alpes; CEA, Leti, MINATEC Campus; Jean Monnet University; CEA-Leti

TCHES 2024, issue 3

  1. White-box filtering attacks breaking SEL masking: from exponential to polynomial time

    Alex Charlès, Aleksei Udovenko
    University of Luxembourg

  2. HAETAE: Shorter Lattice-Based Fiat-Shamir Signatures

    Jung Hee Cheon, Hyeongmin Choe, Julien Devevey, Tim Güneysu, Dongyeon Hong, Markus Krausz, Georg Land, Marc Möller, Damien Stehlé, MinJune Yi
    Seoul National University; École Normale Supérieure de Lyon; DFKI Bremen; Ruhr-University Bochum; CryptoLab Inc.

  3. A Deep Analysis of two Glitch-Free Hardware Masking Schemes SESYM and LMDPL

    Nicolai Müller, Daniel Lammers, Amir Moradi
    Ruhr University Bochum; TU Darmstadt

  4. Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA

    Tengfei Wang, Chi Zhang, Xiaolin Zhang, Dawu Gu, Pei Cao
    Shanghai Jiao Tong University; Viewsource (Shanghai) Technology Company Limited

  5. Automated Generation of Fault-Resistant Circuits

    Nicolai Müller, Amir Moradi
    Ruhr University Bochum; TU Darmstadt

  6. Correction Fault Attacks on Randomized CRYSTALS-Dilithium

    Elisabeth Krahmer, Peter Pessl, Georg Land, Tim Güneysu
    Ruhr-University Bochum; Infineon Technologies AG; DFKI

  7. Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs

    Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng
    China University of Geosciences (Wuhan); University of Texas at Austin; Chinese Academy of Sciences; Jinan University

  8. Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks

    Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang
    University of Adelaide; University of Melbourne; Georgia Tech; Ruhr University Bochum

  9. Time Sharing - A Novel Approach to Low-Latency Masking

    Dilip Kumar Shanmugasundaram Veeraraghavan, Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
    KU Leuven

  10. Efficient Table-Based Masking with Pre-processing

    Juelin Zhang, Taoyun Wang, Yiteng Sun, Fanjie Ji, Bohan Wang, Lu Li, Yu Yu, Weijia Wang
    Shandong University; Shanghai Jiao Tong Univeristy

  11. Optimized Homomorphic Evaluation of Boolean Functions

    Nicolas Bon, David Pointcheval, Matthieu Rivain
    Ecole Normale Supérieure; CryptoExperts

  12. PoMMES: Prevention of Micro-architectural Leakages in Masked Embedded Software

    Jannik Zeitschner, Amir Moradi
    Ruhr University Bochum; TU Darmstadt

  13. CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors

    Itamar Levi, Oren Ganon
    Bar-Ilan University

  14. Faster NTRU-based Bootstrapping less than 4 ms

    Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou
    Chinese Academy of Sciences

  15. On the (Im)possibility of Preventing Differential Computation Analysis with Internal Encodings

    Agathe Houzelot, Laurent Castelnovi
    Idemia

  16. Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning

    Elie Bursztein, Luca Invernizzi, Karel Král, Daniel Moghimi, Jean-Michel Picod, Marina Zhang
    Google

  17. Weakly Profiling Side-channel Analysis

    Lichao Wu, Guilherme Perin, Stjepan Picek
    Radboud University; Leiden University

  18. COMPRESS: Generate Small and Fast Masked Pipelined Circuits

    Gaëtan Cassiers, Barbara Gigerl, Stefan Mangard, Charles Momin, Rishub Nagpal
    UCLouvain; Graz University of Technology

  19. Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE

    Benqiang Wei, Xianhui Lu, Ruida Wang, Kun Liu, Zhihao Li, Kunpeng Wang
    Chinese Academy of Sciences; University of Chinese Academy of Sciences

  20. 1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits

    Dev M. Mehta, Mohammad Hashemi, Domenic Forte, Shahin Tajik, Fatemeh Ganji
    Worcester Polytechnic Institute; University of Florida

  21. Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon

    Gaëtan Cassiers, François-Xavier Standaert, Corentin Verhamme
    UCLouvain

  22. Polynomial sharings on two secrets: Buy one, get one free

    Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Maximilian Orlt
    University of Lübeck; Technische Hochschule Lübeck; TU Darmstadt

  23. Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications

    Yufeng Tang, Zheng Gong, Liangju Zhao, Di Li, Zhe Liu
    South China Normal University; Zhejiang Lab

TCHES 2024, issue 4

  1. SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits

    Huiyu Tan, Pengfei Gao, Taolue Chen, Fu Song, Zhilin Wu
    ShanghaiTech University; Bytedance; Birkbeck, University of London; Chinese Academy of Sciences

  2. SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning

    Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu
    Beijing Institute of Technology

  3. Enabling PERK and other MPC-in-the-Head Signatures on Resource-Constrained Devices

    Alessandro Budroni, Loïc Bidoux, Lucas Pandolfo Perin, Marco Palumbi, slim bettaieb
    Technology Innovation Institute

  4. Closing the Gap: Leakage Contracts for Processors with Transitions and Glitches

    Johannes Haring, Vedad Hadžić, Roderick Bloem
    Graz University of Technology

  5. Another Evidence to not Employ Customized Masked Hardware - Identifying and Fixing Flaws in SCARV

    Felix Uhle, Florian Stolz, Amir Moradi
    Ruhr Universität Bochum; TU Darmstadt

  6. A Not So Discrete Sampler: Power Analysis Attacks on HAWK signature scheme

    Morgane Guerreau, Mélissa Rossi
    CryptoNext Security; ANSSI

  7. Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults

    Simon Tollec, Vedad Hadžić, Pascal Nasahl, Mihail Asavoae, Roderick Bloem, Damien Couroussé, Karine Heydemann, Mathieu Jan, Stefan Mangard
    Université Paris-Saclay; Graz University of Technology; lowRISC C.I.C.; Université Grenoble Alpes; Thales DIS; Sorbonne Université

  8. Fast Transciphering via Batched and Reconfigurable LUT Evaluation

    Leonard Schild, Aysajan Abidin, Bart Preneel
    KU Leuven

  9. Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3

    Cankun Zhao, Hang Zhao, Jiangxue Liu, Bohan Yang, Wenping Zhu, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu
    Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.

  10. Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs

    Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, Rui Hou
    Chinese Academy of Sciences; University of Chinese Academy of Sciences

  11. TRNG Entropy Model in the Presence of Flicker FM Noise

    Adriaan Peetermans, Ingrid Verbauwhede
    KU Leuven

  12. Combined Threshold Implementation

    Jakob Feldtkeller, Jan Richter-Brockmann, Pascal Sasdrich, Tim Güneysu
    Ruhr University Bochum

  13. Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium

    Jean-Sebastien Coron, François Gérard, Rina Zeitoun, Matthias Trannoy, Tancrède Lepoint
    University of Luxembourg; Idemia; AWS

  14. pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis

    Jan Jancar, Vojtech Suchanek, Petr Svenda, Vladimir Sedlacek, Lukasz Chmielewski
    Masaryk University; Rutgers University

  15. Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements

    Colin O'Flynn
    Dalhousie University

  16. Switching Off your Device Does Not Protect Against Fault Attacks

    Paul Grandamme, Pierre-Antoine Tissot, Lilian Bossuet, Jean-Max Dutertre, Brice Colombier, Vincent Grosso
    Université Jean Monnet; Leti

  17. Robust but Relaxed Probing Model

    Nicolai Müller, Amir Moradi
    Ruhr University Bochum; TU Darmstadt

  18. Masking FALCON's Floating-Point Multiplication in Hardware

    Emre Karabulut, Aydin Aysu
    North Carolina State University

  19. Static Leakage in Dual-Rail Precharge Logics

    Bijan Fadaeinia, Thorben Moos, Amir Moradi
    Ruhr University Bochum; UCLouvain; TU Darmstadt

  20. Through the Looking-Glass:Sensitive Data Extraction by Optical Probing of Scan Chains

    Tuba Kiyan, Lars Renkes, Marvin Sass, Antonio Saavedra, Norbert Herfurth, Elham Amini, Jean-Pierre Seifert
    Technische Universität Berlin; Leibniz-Institut für innovative Mikroelektronik

  21. Bake It Till You Make It: Heat-induced Power Leakage from Masked Neural Networks

    Dev M. Mehta, Mohammad Hashemi, David S. Koblah, Domenic Forte, Fatemeh Ganji
    Worcester Polytechnic Institute; University of Florida

  22. FaultDetective: Explainable to a Fault, from the Design Layout to the Software

    Zhenyuan Liu, Dillibabu Shanmugam, Patrick Schaumont
    Worcester Polytechnic Institute

  23. Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes

    Johannes Mono, Kamil Kluczniak, Tim Güneysu
    Ruhr University Bochum; secunet Security Networks; Ruhr University Bochum; DFKI

  24. An Algebraic Approach for Evaluating Random Probing Security With Application to AES

    Vahid Jahandideh Khajeh, Bart Mennink, Lejla Batina
    Radboud University

  25. Prime Masking vs. Faults - Exponential Security Amplification against Selected Classes of Attacks

    Thorben Moos, Sayandeep Saha, François-Xavier Standaert
    UCLouvain; Indian Institute of Technology Bombay

  26. Faster Complete Addition Laws for Montgomery Curves

    Reza Rezaeian Farashahi, Mojtaba Fadavi, Soheila Sabbaghian
    Isfahan University of Technology; University of Calgary

  27. Know-Thy-Basis: Decomposing F(2⁶) for Lightweight S-box Implementation

    Dilip Sau, Sumanta Sarkar, Dhiman Saha, Kalikinkar Mandal
    Indian Institute of Technology; University of Warwick; University of New Brunswick