dblp: IACR Transactions on Cryptographic Hardware and Embedded Systems: Volume 2018 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 2018, Number 1, 2018
Articles

Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl:
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. 1-17

Dorian Amiet
, Andreas Curiger
, Paul Zbinden:
FPGA-based Accelerator for Post-Quantum Signature Scheme SPHINCS-256. 18-39

Jean-Sébastien Coron, Franck Rondepierre, Rina Zeitoun:
High Order Masking of Look-up Tables with Common Shares. 40-72

Daniel Dinu, Ilya Kizhvatov:
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread. 73-97

Kai-Hsin Chuang
, Robin Degraeve, Andrea Fantini, Guido Groeseneken
, Dimitri Linten, Ingrid Verbauwhede
:
A Cautionary Note When Looking for a Truly Reconfigurable Resistive RAM PUF. 98-117

Hervé Chabanne
, Houssem Maghrebi, Emmanuel Prouff:
Linear Repairing Codes and Side-Channel Attacks. 118-141

Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
:
Practical CCA2-Secure and Masked Ring-LWE Implementation. 142-174

Axel Mathieu-Mahias, Michaël Quisquater:
Mixing Additive and Multiplicative Masking for Probing Secure Polynomial Evaluation Methods. 175-208

Amir Moradi
, Bastian Richter, Tobias Schneider, François-Xavier Standaert
:
Leakage Detection with the x2-Test. 209-237

Léo Ducas, Eike Kiltz
, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé
:
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. 238-268

Victor Arribas, Begül Bilgin
, George Petrides
, Svetla Nikova
, Vincent Rijmen
:
Rhythmic Keccak: SCA Security and Low Latency in HW. 269-290
Volume 2018, Number 2, 2018
Articles

Hannes Groß, Rinat Iusupov, Roderick Bloem
:
Generic Low-Latency Masking in Hardware. 1-21

Luk Bettale
, Jean-Sébastien Coron, Rina Zeitoun:
Improved High-Order Conversion From Boolean to Arithmetic Masking. 22-45

Christopher Hicks, Flavio D. Garcia
, David F. Oswald
:
Dismantling the AUT64 Automotive Cipher. 46-69

Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung:
High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA. 70-95

Jakub Breier
, Xiaolu Hou
, Yang Liu
:
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code. 96-122

Thomas De Cnudde, Maik Ender
, Amir Moradi
:
Hardware Masking, Revisited. 123-148

Gildas Avoine, Loïc Ferreira:
Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack. 149-170

Fergus Dall, Gabrielle De Micheli
, Thomas Eisenbarth
, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. 171-191

Yusuke Naito, Mitsuru Matsui, Takeshi Sugawara
, Daisuke Suzuki:
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. 192-217

Avik Chakraborti, Nilanjan Datta, Mridul Nandi, Kan Yasuda:
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers. 218-241

Sayandeep Saha, Debdeep Mukhopadhyay, Pallab Dasgupta:
ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers. 242-276

Max Hoffmann
, Christof Paar:
Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions at Negligible Overhead. 277-297

Arash Reyhani-Masoleh, Mostafa M. I. Taha, Doaa Ashmawy:
Smashing the Implementation Records of AES S-box. 298-336
Volume 2018, Number 3, 2018
Preface

Daniel Page, Matthieu Rivain:
Preface to TCHES 2018. I-IV
Articles

Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu:
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange. 1-20

Leon Groot Bruinderink, Peter Pessl:
Differential Fault Attacks on Deterministic Lattice Signatures. 21-43

Jonas Krautter, Dennis R. E. Gnad
, Mehdi Baradaran Tahoori:
FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable for DFA on AES. 44-68

Joël Cathébras, Alexandre Carbon, Peter A. Milder
, Renaud Sirdey
, Nicolas Ventroux:
Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication for SHE Acceleration. 69-88

Sebastian Faust, Vincent Grosso, Santos Merino Del Pozo
, Clara Paglialonga, François-Xavier Standaert:
Composable Masking Schemes in the Presence of Physical Defaults & the Robust Probing Model. 89-120

Patrick Derbez
, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 121-149

Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren:
Persistent Fault Analysis on Block Ciphers. 150-172

Martin R. Albrecht, Amit Deo, Kenneth G. Paterson:
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT. 173-213

Elie Noumon Allini, Maciej Skórski
, Oto Petura, Florent Bernard, Marek Laban, Viktor Fischer:
Evaluation and Monitoring of Free Running Oscillators Serving as Source of Randomness. 214-242

Angshuman Karmakar
, Jose Maria Bermudo Mera, Sujoy Sinha Roy, Ingrid Verbauwhede:
Saber on ARM CCA-secure module lattice-based key encapsulation on ARM. 243-266

Bohan Yang, Vladimir Rozic, Milos Grujic, Nele Mentens, Ingrid Verbauwhede:
ES-TRNG: A High-throughput, Low-area True Random Number Generator based on Edge Sampling. 267-292

Marc Fyrbiak, Sebastian Wallat, Jonathan Déchelotte, Nils Albartus
, Sinan Böcker, Russell Tessier, Christof Paar:
On the Difficulty of FSM-based Hardware Obfuscation. 293-330

Akira Takahashi, Mehdi Tibouchi, Masayuki Abe:
New Bleichenbacher Records: Fault Attacks on qDSA Signatures. 331-371

James Howe
, Tobias Oder, Markus Krausz
, Tim Güneysu
:
Standard Lattice-Based Key Encapsulation on Embedded Devices. 372-393

Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth
, Rainer Steinwandt:
Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks. 394-430

Lauren De Meyer, Oscar Reparaz
, Begül Bilgin
:
Multiplicative Masking for AES in Hardware. 431-468

Jin Hyung Park, Dong Hoon Lee:
FACE: Fast AES CTR mode Encryption Techniques based on the Reuse of Repetitive Data. 469-499

Aesun Park, Kyung-Ah Shim, Namhun Koo
, Dong-Guk Han:
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -. 500-523

Kostas Papagiannopoulos:
Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information. 524-546

Christoph Dobraunig
, Maria Eichlseder
, Thomas Korak, Stefan Mangard
, Florian Mendel
, Robert Primas:
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography. 547-572

Heiko Lohrke, Shahin Tajik, Thilo Krachenfels, Christian Boit, Jean-Pierre Seifert:
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs. 573-595

Lauren De Meyer, Amir Moradi
, Felix Wegener:
Spin Me Right Round Rotational Symmetry for FPGA-Specific AES. 596-626

Bernhard Jungk, Richard Petri
, Marc Stöttinger
:
Efficient Side-Channel Protections of ARX Ciphers. 627-653

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







