Transactions on Cryptographic Hardware and Embedded Systems 2022
TCHES 2022 Artifacts
Scope and Aims
The two main goals of the TCHES 2022 artifact review process were to improve functionality and reusability of artifacts to enable reproducibility and extension by the scientific community.
Reproducibility, in the context of computational experiments, means that the scientific results claimed can be obtained by a different team using the original authors’ artifacts. The artifact review process for TCHES 2022 did not include attempting to reproduce the experiment and verify the scientific claims in the accepted paper. Rather, the artifact review process for TCHES 2022 aimed at ensuring sufficient functionality of the artifact to enable a research team to attempt to reproduce the results. The artifact review process for TCHES 2022 also aimed to improve reusability, meaning that the artifacts are not just functional, but of sufficient quality that they could be extended and reused by others.
For more information, please see the TCHES 2022 Call for Artifacts.
Volume 2022, Issue 1
Practical Multiple Persistent Faults Analysis
Hosein Hadipour,Hadi Soleimany, Nasour Bagheri, Prasanna Ravi, Shivam Bhasin and Sara Mansouri.
Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang and Shang-Yi Yang.
Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer and Bo-Yin Yang
Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh and Tim Güneysu
VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic and Sri Parameswaran
Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain and Samuel Jaques
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno, Keita Kusagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi and Naofumi Homma
Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces
Jens Trautmann, Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Stefan Wildermann, Ingrid Verbauwhede and Jürgen Teich
Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay and Sujoy Sinha Roy
Volume 2022, Issue 2
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery
Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier and Shivam Bhasin
Volume 2022, Issue 3
BreakMi: Reversing, Exploiting, and Fixing Xiaomi Fitness Tracking Ecosystem
Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer and Daniele Antonioli
Don’t Reject This: Key-Recovery Timing Attacks
Due to Rejection-Sampling in HQC and BIKE
Norman Lahr, Qian Guo, Clemens Hlauschek, Robin Leander Schröder, Thomas Johansson and Alexander Nilsson
A Security Model for Randomization-based Protected Caches
Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros and Miquel Moretó
On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang and Wei Fu
Volume 2022, Issue 4
VERICA - Verification of Combined Attacks
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich and Tim Güneysu
Improved Plantard Arithmetic for Lattice-based Cryptography
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç and Donglong Chen
A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic and Sri Parameswaran
Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis
Aron Gohr, Friederike Laus and Werner Schindler
PROLEAD - A Probing-Based Hardware Leakage Detection Tool
Nicolai Mueller and Amir Moradi
Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, Saber, and NTRU
Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang and Bo-Yin Yang
Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Erdem Alkim, Vincent Hwang and Bo-Yin Yang
Faster constant-time decoder for MDPC codes and applications to BIKE KEM
Thales Paiva and Routo Terada
Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Jeroen Delvaux
A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion
Kavya Sreedhar, Mark Horowitz and Christopher Torng
SoC Root Canal!
Pantea Kiaei and Patrick Schaumont
TCHES 2022 Artifact Review Committee
Artifact Review Chair:
- Martin Albrecht, Royal Holloway, University of London
Artifact Review Committee Members:
- Alejandro Cabrera Aldaya (Tampere University, Finland)
- Ben Marshall (PQShield, UK)
- Charlie Jacomme (CISPA - Helmholtz Center for Information Security, Germany)
- Douglas Stebila (University of Waterloo, Canada)
- Erdem Alkim (Dokuz Eylul University, Turkey)
- Estuardo Alpirez Bock (Aalto University, Finland)
- Fabrizio De Santis (Siemens AG, Germany)
- Gaëtan Cassiers (UCLouvain, Belgium)
- James Howe (PQShield, UK)
- Jan Jancar (Masaryk University, Czechia)
- Joe Rowell (Royal Holloway University of London, UK)
- Joost Renes (NXP Semiconductors, The Netherlands)
- Lennert Wouters (KU Leuven, Belgium)
- Léo Ducas (CWI, The Netherlands)
- Marc Stevens (CWI Cryptology Group, The Netherlands)
- Matthias J. Kannwischer (Academia Sinica, Taiwan)
- Monika Trimoska (Université de Picardie Jules Verne, France)
- Norman Lahr (Fraunhofer SIT, Darmstadt, Germany)
- Olivier Bronchain (UCLouvain, Belgium)
- Pedro G. M. R. Alves (University of Campinas, Brazil)
- Peter Schwabe (MPI-SP & Radboud University, Germany/The Netherlands)
- Pranesh Santikellur (Indian institute of technology Kharagpur, India)
- Richard Petri (Fraunhofer SIT, Darmstadt, Germany)
- Robert Primas (Graz University of Technology, Austria)
- Sujoy Sinha Roy (Graz University of Technology, Austria)