International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems 2022

TCHES 2022 Artifacts


Scope and Aims

The two main goals of the TCHES 2022 artifact review process were to improve functionality and reusability of artifacts to enable reproducibility and extension by the scientific community.

Reproducibility, in the context of computational experiments, means that the scientific results claimed can be obtained by a different team using the original authors’ artifacts. The artifact review process for TCHES 2022 did not include attempting to reproduce the experiment and verify the scientific claims in the accepted paper. Rather, the artifact review process for TCHES 2022 aimed at ensuring sufficient functionality of the artifact to enable a research team to attempt to reproduce the results. The artifact review process for TCHES 2022 also aimed to improve reusability, meaning that the artifacts are not just functional, but of sufficient quality that they could be extended and reused by others.

For more information, please see the TCHES 2022 Call for Artifacts.




Volume 2022, Issue 1

Practical Multiple Persistent Faults Analysis
Hosein Hadipour,Hadi Soleimany, Nasour Bagheri, Prasanna Ravi, Shivam Bhasin and Sara Mansouri.

Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1
Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Bo-Yin Yang and Shang-Yi Yang.

Multi-moduli NTTs for Saber on Cortex-M3 and Cortex-M4
Amin Abdulrahman, Jiun-Peng Chen, Yu-Jia Chen, Vincent Hwang, Matthias J. Kannwischer and Bo-Yin Yang

Racing BIKE: Improved Polynomial Multiplication and Inversion in Hardware
Jan Richter-Brockmann, Ming-Shing Chen, Santosh Ghosh and Tim Güneysu

VITI: A Tiny Self-Calibrating Sensor for Power-Variation Measurement in FPGAs
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic and Sri Parameswaran

Quantum Period Finding against Symmetric Primitives in Practice
Xavier Bonnetain and Samuel Jaques

Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Rei Ueno, Keita Kusagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi and Naofumi Homma

Semi-Automatic Locating of Cryptographic Operations in Side-Channel Traces
Jens Trautmann, Arthur Beckers, Lennert Wouters, Benedikt Gierlichs, Stefan Wildermann, Ingrid Verbauwhede and Jürgen Teich

Will You Cross the Threshold for Me? - Generic Side-Channel Assisted Chosen-Ciphertext Attacks on NTRU-based KEMs
Prasanna Ravi, Martianus Frederic Ezerman, Shivam Bhasin, Anupam Chattopadhyay and Sujoy Sinha Roy




Volume 2022, Issue 2

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery
Satyam Kumar, Vishnu Asutosh Dasu, Anubhab Baksi, Santanu Sarkar, Dirmanto Jap, Jakub Breier and Shivam Bhasin




Volume 2022, Issue 3

BreakMi: Reversing, Exploiting, and Fixing Xiaomi Fitness Tracking Ecosystem
Marco Casagrande, Eleonora Losiouk, Mauro Conti, Mathias Payer and Daniele Antonioli

Don’t Reject This: Key-Recovery Timing Attacks Due to Rejection-Sampling in HQC and BIKE
Norman Lahr, Qian Guo, Clemens Hlauschek, Robin Leander Schröder, Thomas Johansson and Alexander Nilsson

A Security Model for Randomization-based Protected Caches
Jordi Ribes-González, Oriol Farràs, Carles Hernández, Vatistas Kostalabros and Miquel Moretó

On Efficient and Secure Code-based Masking: A Pragmatic Evaluation
Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang and Wei Fu




Volume 2022, Issue 4

VERICA - Verification of Combined Attacks
Jan Richter-Brockmann, Jakob Feldtkeller, Pascal Sasdrich and Tim Güneysu

Improved Plantard Arithmetic for Lattice-based Cryptography
Junhao Huang, Jipeng Zhang, Haosong Zhao, Zhe Liu, Ray C. C. Cheung, Çetin Kaya Koç and Donglong Chen

A Power to Pulse Width Modulation Sensor for Remote Power Analysis Attacks
Brian Udugama, Darshana Jayasinghe, Hassaan Saadat, Aleksandar Ignjatovic and Sri Parameswaran

Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis
Aron Gohr, Friederike Laus and Werner Schindler

PROLEAD - A Probing-Based Hardware Leakage Detection Tool
Nicolai Mueller and Amir Moradi

Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, Saber, and NTRU
Vincent Hwang, Jiaxiang Liu, Gregor Seiler, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang and Bo-Yin Yang

Multi-Parameter Support with NTTs for NTRU and NTRU Prime on Cortex-M4
Erdem Alkim, Vincent Hwang and Bo-Yin Yang

Faster constant-time decoder for MDPC codes and applications to BIKE KEM
Thales Paiva and Routo Terada

Roulette: A Diverse Family of Feasible Fault Attacks on Masked Kyber
Jeroen Delvaux

A Fast Large-Integer Extended GCD Algorithm and Hardware Design for Verifiable Delay Functions and Modular Inversion
Kavya Sreedhar, Mark Horowitz and Christopher Torng

SoC Root Canal!
Pantea Kiaei and Patrick Schaumont




TCHES 2022 Artifact Review Committee

Artifact Review Chair:

Artifact Review Committee Members: