


default search action
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2025
Volume 2025, Number 1, 2025
- Najwa Aaraj, Abdelrahaman Aly
, Tim Güneysu
, Chiara Marcolla
, Johannes Mono
, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez
, Victor Sucasas
, Ajith Suresh
:
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC. 1-36 - Johann Knechtel, Mohammad Eslami
, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Pagliarini:
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort. 37-77 - Ashley Kurian, Anuj Dubey, Ferhat Yaman, Aydin Aysu:
TPUXtract: An Exhaustive Hyperparameter Extraction Framework. 78-103 - John Gaspoz
, Siemen Dhooghe:
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking. 104-127 - Shipei Qu, Yuxuan Wang, Jintong Yu
, Chi Zhang, Dawu Gu:
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting. 128-159 - Vincent Hwang, YoungBeom Kim, Seog Chung Seo:
Multiplying Polynomials without Powerful Multiplication Instructions. 160-202 - Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Hanning Wang, Qichao Tao, Min Zhu, Shaojun Wei, Leibo Liu:
FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation. 203-226 - Téo Biton
, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov, Sébastien Pillement:
Call Rewinding: Efficient Backward Edge Protection. 227-250 - Haiyue Dong, Qian Guo:
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates. 251-274 - Xiangren Chen, Bohan Yang, Wenping Zhu, Hanning Wang, Qichao Tao, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu:
A High-performance NTT/MSM Accelerator for Zero-knowledge Proof Using Load-balanced Fully-pipelined Montgomery Multiplier. 275-313 - Yu Xiao, Feng-Hao Liu, Yu-Te Ku, Ming-Chien Ho, Chih-Fan Hsu, Ming-Ching Chang, Shih-Hao Hung, Wei-Chao Chen:
GPU Acceleration for FHEW/TFHE Bootstrapping. 314-339 - Lixuan Wu, Yanhong Fan, Weijia Wang, Bart Preneel, Meiqin Wang:
Extending Randomness-Free First-Order Masking Schemes and Applications to Masking-Friendly S-boxes. 340-366 - Vlad-Florin Dragoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso:
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation. 367-391 - Pierre Ayoub, Aurélien Hernandez
, Romain Cayre, Aurélien Francillon, Clémentine Maurice:
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels. 392-419 - Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth:
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits. 420-449 - Akira Ito, Rei Ueno, Naofumi Homma:
Perceived Information Revisited II Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks. 450-474 - Xunyue Hu, Quentin L. Meunier, Emmanuelle Encrenaz:
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training. 475-496 - Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha
, Isaac Andrés Canales Martinez, Jorge Chávez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez:
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4. 497-522 - Bohan Wang
, Fanjie Ji, Yiteng Sun, Weijia Wang:
Random Probing Security with Precomputation. 523-551 - Feng Zhou, Hua Chen, Limin Fan:
Prover - Toward More Efficient Formal Verification of Masking in Probing Model. 552-585 - Yongjin Jeon, Seungjun Baek
, Giyoon Kim, Jongsung Kim:
A Framework for Generating S-Box Circuits with Boyar-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin. 586-631 - Jipeng Zhang
, Yuxing Yan, Junhao Huang, Çetin Kaya Koç:
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}. 632-655 - Vedad Hadzic, Roderick Bloem:
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters. 656-683
Volume 2025, Number 2, 2025
- Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang:
Improving MPCitH with Preprocessing: Mask Is All You Need. 1-22 - Fan Huang, Xiaolin Duan, Chengcong Hu, Mengce Zheng, Honggang Hu:
MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4. 23-68 - Jinling Tang, Haixia Xu, Huimei Liao, Yinchang Zhou:
SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities. 69-93 - Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom:
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information. 94-125 - Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap:
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic. 126-162 - Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy:
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption. 163-208 - Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales B. Paiva, Prasanna Ravi, Goutam Tamvada:
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations. 209-234 - Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede:
Higher-Order Time Sharing Masking. 235-267 - Jennifer Jackson, Minmin Jiang, David F. Oswald:
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures. 268-292 - Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weijia Wang:
A Code-Based ISE to Protect Boolean Masking in Software. 293-332 - Junfan Zhu, Jiqiang Lu:
Leading Degree: A Metric for Model Performance Evaluation and Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis. 333-361 - Ziyu Zhao, Jintai Ding, Bo-Yin Yang:
Sieving with Streaming Memory Access. 362-384 - Weizhe Wang, Pierrick Méaux, Deng Tang:
Shortcut2Secrets: A Table-based Differential Fault Attack Framework. 385-419 - Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao:
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience. 420-459 - Holger Mandry, Jonas Ruchti, Julius Nowakowski, Michael Pehl, Maurits Ortmanns:
Protection of Oscillator-Based PUFs against Side Channel Analyses by Random Interruption. 460-488 - Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, Ingrid Verbauwhede:
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM. 489-510 - Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler:
Constant time lattice reduction in dimension 4 with application to SQIsign. 511-534 - Daphné Trama, Aymen Boudguiga, Pierre-Emmanuel Clet, Renaud Sirdey, Nicolas Ye:
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction. 535-578 - Aric Fowler, Mohammed Shayan, Mustafa M. Shihab, Thomas Broadfoot, Peter Beerel, Carl Sechen, Yiorgos Makris:
A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks. 579-603 - Georg Maringer, Matthias Hiller:
Information Theoretic Analysis of PUF-Based Tamper Protection. 604-646 - Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede:
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism. 647-680 - Rui Jiang, Cong Peng, Min Luo, Rongmao Chen, Debiao He:
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs. 681-704 - Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto:
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme. 705-742 - Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Fabian Schmid, Markus Schofnegger:
Skyscraper: Fast Hashing on Big Primes. 743-780 - Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo:
New Quantum Cryptanalysis of Binary Elliptic Curves. 781-804

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.