Vol. 2024 No. 2 | IACR Transactions on Cryptographic Hardware and Embedded Systems
Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Current
Archives
Submissions
Call for Papers
Paper Submission
Camera-ready Submission
Publication Ethics
Retraction Policy
FAQ
Editorial Board
Contact
CHES
Search
Login
Home
/
Archives
/
Vol. 2024 No. 2
Vol. 2024 No. 2
Published:
2024-03-12
Articles
Revisiting Keccak and Dilithium Implementations on ARMv7-M
Junhao Huang, Alexandre Adomnicăi, Jipeng Zhang, Wangchen Dai, Yao Liu, Ray C. C. Cheung, Çetin Kaya Koç, Donglong Chen
1-24
PDF
Artifacts
ConvKyber: Unleashing the Power of AI Accelerators for Faster Kyber with Novel Iteration-based Approaches
Tian Zhou, Fangyu Zheng, Guang Fan, Lipeng Wan, Wenxu Tang, Yixuan Song, Yi Bian, Jingqiang Lin
25-63
PDF
Single trace HQC shared key recovery with SASCA
Guillaume Goy, Julien Maillard, Philippe Gaborit, Antoine Loiseau
64-87
PDF
Unlock the Door to my Secrets, but don’t Forget to Glitch
A comprehensive analysis of flash erase suppression attacks
Marc Schink, Alexander Wagner, Felix Oberhansl, Stefan Köckeis, Emanuele Strieder, Sven Freud, Dominik Klein
88-129
PDF
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Zewen Ye, Ruibing Song, Hao Zhang, Donglong Chen, Ray Chak-Chung Cheung, Kejie Huang
130-153
PDF
Impeccable Keccak
Towards Fault Resilient SPHINCS+ Implementations
Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl
154-189
PDF
High-Performance Hardware Implementation of MPCitH and Picnic3
Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju
190-214
PDF
SDitH in Hardware
Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue
215-251
PDF
Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4
Ward Beullens, Fabio Campos, Sofía Celi, Basil Hess, Matthias J. Kannwischer
252-275
PDF
Artifacts
Masking Floating-Point Number Multiplication and Addition of Falcon
First- and Higher-order Implementations and Evaluations
Keng-Yu Chen, Jiun-Peng Chen
276-303
PDF
MiRitH: Efficient Post-Quantum Signatures from MinRank in the Head
Gora Adj, Stefano Barbero, Emanuele Bellini, Andre Esser, Luis Rivera-Zamarripa, Carlo Sanna, Javier Verbel, Floyd Zweydinger
304-328
PDF
eLIMInate: a Leakage-focused ISE for Masked Implementation
Hao Cheng, Daniel Page, Weijia Wang
329-358
PDF
Exploiting Small-Norm Polynomial Multiplication with Physical Attacks
Application to CRYSTALS-Dilithium
Olivier Bronchain, Melissa Azouaoui, Mohamed ElGhamrawy, Joost Renes, Tobias Schneider
359-383
PDF
Distribution of Signal to Noise Ratio and Application to Leakage Detection
Mathieu des Noes
384-402
PDF
Efficient ASIC Architecture for Low Latency Classic McEliece Decoding
Daniel Fallnich, Christian Lanius, Shutao Zhang, Tobias Gemmeke
403-425
PDF
JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing
Maik Ender, Felix Hahn, Marc Fyrbiak, Amir Moradi, Christof Paar
426-450
PDF
Artifacts
CASA: A Compact and Scalable Accelerator for Approximate Homomorphic Encryption
Pengzhou He, Samira Carolina Oliva Madrigal, Çetin Kaya Koç, Tianyou Bao, Jiafeng Xie
451-480
PDF
Compact Circuits for Efficient Möbius Transform
Subhadeep Banik, Francesco Regazzoni
481-521
PDF
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm
Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He
522-544
PDF
Artifacts
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption
Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto
545-587
PDF
OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element
Darius Mercadier, Viet Sang Nguyen, Matthieu Rivain, Aleksei Udovenko
588-629
PDF
Artifacts
A Low-Latency High-Order Arithmetic to Boolean Masking Conversion
Jiangxue Liu, Cankun Zhao, Shuohang Peng, Bohan Yang, Hang Zhao, Xiangdong Han, Min Zhu, Shaojun Wei, Leibo Liu
630-653
PDF
Artifacts
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays
Hetian Shi, Yi He, Qing Wang, Jianwei Zhuge, Qi Li, Xin Liu
654-676
PDF
Artifacts
UpWB: An Uncoupled Architecture Design for White-box Cryptography Using Vectorized Montgomery Multiplication
Xiangren Chen, Bohan Yang, Jianfeng Zhu, Jun Liu, Shuying Yin, Guang Yang, Min Zhu, Shaojun Wei, Leibo Liu
677-713
PDF
TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips
Petr Svenda, Antonin Dufka, Milan Broz, Roman Lacko, Tomas Jaros, Daniel Zatovic, Josef Pospisil
714-734
PDF
Artifacts
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer
735-768
PDF
High-Performance Design Patterns and File Formats for Side-Channel Analysis
Jonah Bosland, Stefan Ene, Peter Baumgartner, Vincent Immler
769-794
PDF
Artifacts
Defeating Low-Cost Countermeasures against Side-Channel Attacks in Lattice-based Encryption
A Case Study on Crystals-Kyber
Prasanna Ravi, Thales Paiva, Dirmanto Jap, Jan-Pieter D’Anvers, Shivam Bhasin
795-818
PDF
SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning
Ziyuan Liang, Qi’ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanhheng Lu, Fan Zhang
819-843
PDF
Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM
Suparna Kundu, Siddhartha Chowdhury, Sayandeep Saha, Angshuman Karmakar, Debdeep Mukhopadhyay, Ingrid Verbauwhede
844-869
PDF
Impact of the Flicker Noise on the Ring Oscillator-based TRNGs
Licinius Benea, Mikael Carmona, Viktor Fischer, Florian Pebay-Peyroula, Romain Wacquez
870-889
PDF
Artifacts
iacr-logo