@article{DBLP:journals/tches/WoutersAGP20,
  author    = {Lennert Wouters and
               Victor Arribas and
               Benedikt Gierlichs and
               Bart Preneel},
  title     = {Revisiting a Methodology for Efficient {CNN} Architectures in Profiling
               Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {147--168},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.147-168},
  doi       = {10.13154/tches.v2020.i3.147-168},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WoutersAGP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BragaFS20,
  author    = {Daniel De Almeida Braga and
               Pierre{-}Alain Fouque and
               Mohamed Sabt},
  title     = {The Long and Winding Path to Secure Implementation of GlobalPlatform
               {SCP10}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {196--218},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.196-218},
  doi       = {10.13154/tches.v2020.i3.196-218},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/BragaFS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangDF20,
  author    = {Ziyue Zhang and
               A. Adam Ding and
               Yunsi Fei},
  title     = {A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key
               Recovery},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {26--48},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.26-48},
  doi       = {10.13154/tches.v2020.i2.26-48},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ZhangDF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JancarSSS20,
  author    = {Jan Jancar and
               Vladimir Sedlacek and
               Petr Svenda and
               Marek S{\&apos;{y}}s},
  title     = {Minerva: The curse of {ECDSA} nonces Systematic analysis of lattice
               attacks on noisy leakage of bit-length of {ECDSA} nonces},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {281--308},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.281-308},
  doi       = {10.13154/tches.v2020.i4.281-308},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/JancarSSS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NaitoS20,
  author    = {Yusuke Naito and
               Takeshi Sugawara},
  title     = {Lightweight Authenticated Encryption Mode of Operation for Tweakable
               Block Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {66--94},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.66-94},
  doi       = {10.13154/tches.v2020.i1.66-94},
  timestamp = {Fri, 27 Mar 2020 08:34:07 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/NaitoS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WeissmanTMCES20,
  author    = {Zane Weissman and
               Thore Tiemann and
               Daniel Moghimi and
               Evan Custodio and
               Thomas Eisenbarth and
               Berk Sunar},
  title     = {JackHammer: Efficient Rowhammer on Heterogeneous {FPGA-CPU} Platforms},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {169--195},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.169-195},
  doi       = {10.13154/tches.v2020.i3.169-195},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WeissmanTMCES20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaemenDEGMP20,
  author    = {Joan Daemen and
               Christoph Dobraunig and
               Maria Eichlseder and
               Hannes Gro{\ss} and
               Florian Mendel and
               Robert Primas},
  title     = {Protecting against Statistical Ineffective Fault Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {508--543},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.508-543},
  doi       = {10.13154/tches.v2020.i3.508-543},
  timestamp = {Sat, 05 Sep 2020 17:44:11 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SasdrichBHM20,
  author    = {Pascal Sasdrich and
               Beg{\&quot;{u}}l Bilgin and
               Michael Hutter and
               Mark E. Marson},
  title     = {Low-Latency Hardware Masking with Application to {AES}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {300--326},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.300-326},
  doi       = {10.13154/tches.v2020.i2.300-326},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/SasdrichBHM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GenkinPSYZ20,
  author    = {Daniel Genkin and
               Romain Poussier and
               Rui Qi Sim and
               Yuval Yarom and
               Yuanjing Zhao},
  title     = {Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {231--255},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.231-255},
  doi       = {10.13154/tches.v2020.i1.231-255},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/GenkinPSYZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlkimELNP20,
  author    = {Erdem Alkim and
               H{\&quot;{u}}lya Evkan and
               Norman Lahr and
               Ruben Niederhagen and
               Richard Petri},
  title     = {{ISA} Extensions for Finite Field Arithmetic Accelerating Kyber and
               NewHope on {RISC-V}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {219--242},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.219-242},
  doi       = {10.13154/tches.v2020.i3.219-242},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/AlkimELNP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KRRHB20,
  author    = {Keerthi K. and
               Indrani Roy and
               Chester Rebeiro and
               Aritra Hazra and
               Swarup Bhunia},
  title     = {{FEDS:} Comprehensive Fault Attack Exploitability Detection for Software
               Implementations of Block Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {272--299},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.272-299},
  doi       = {10.13154/tches.v2020.i2.272-299},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/KRRHB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GoubinRW20,
  author    = {Louis Goubin and
               Matthieu Rivain and
               Junwei Wang},
  title     = {Defeating State-of-the-Art White-Box Countermeasures with Advanced
               Gray-Box Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {454--482},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.454-482},
  doi       = {10.13154/tches.v2020.i3.454-482},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/GoubinRW20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TanP20,
  author    = {Quan Quan Tan and
               Thomas Peyrin},
  title     = {Improved Heuristics for Short Linear Programs},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {203--230},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.203-230},
  doi       = {10.13154/tches.v2020.i1.203-230},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/TanP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RaviRCB20,
  author    = {Prasanna Ravi and
               Sujoy Sinha Roy and
               Anupam Chattopadhyay and
               Shivam Bhasin},
  title     = {Generic Side-channel attacks on CCA-secure lattice-based {PKE} and
               KEMs},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {307--335},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.307-335},
  doi       = {10.13154/tches.v2020.i3.307-335},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/RaviRCB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoangHO20,
  author    = {Anh{-}Tuan Hoang and
               Neil Hanley and
               M{\&apos;{a}}ire O'Neill},
  title     = {Plaintext: {A} Missing Feature for Enhancing the Power of Deep Learning
               in Side-Channel Analysis? Breaking multiple layers of side-channel
               countermeasures},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {49--85},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.49-85},
  doi       = {10.13154/tches.v2020.i4.49-85},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/HoangHO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainS20,
  author    = {Olivier Bronchain and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Side-Channel Countermeasures' Dissection and the Limits of Closed
               Source Security Evaluations},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {1--25},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.1-25},
  doi       = {10.13154/tches.v2020.i2.1-25},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/BronchainS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangL20,
  author    = {Zhendong Zhang and
               Peng Liu},
  title     = {A Hybrid-CPU-FPGA-based Solution to the Recovery of Sha256crypt-hashed
               Passwords},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {1--23},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.1-23},
  doi       = {10.13154/tches.v2020.i4.1-23},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ZhangL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AdomnicaiNP20,
  author    = {Alexandre Adomnicai and
               Zakaria Najm and
               Thomas Peyrin},
  title     = {Fixslicing: {A} New {GIFT} Representation Fast Constant-Time Implementations
               of {GIFT} and {GIFT-COFB} on {ARM} Cortex-M},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {402--427},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.402-427},
  doi       = {10.13154/tches.v2020.i3.402-427},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/AdomnicaiNP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersHGOGP20,
  author    = {Lennert Wouters and
               Jan Van den Herrewegen and
               Flavio D. Garcia and
               David Oswald and
               Benedikt Gierlichs and
               Bart Preneel},
  title     = {Dismantling DST80-based Immobiliser Systems},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {99--127},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.99-127},
  doi       = {10.13154/tches.v2020.i2.99-127},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WoutersHGOGP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaoMPO20,
  author    = {Si Gao and
               Ben Marshall and
               Dan Page and
               Elisabeth Oswald},
  title     = {Share-slicing: Friend or Foe?},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {152--174},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.152-174},
  doi       = {10.13154/tches.v2020.i1.152-174},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/GaoMPO20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RoyB20,
  author    = {Sujoy Sinha Roy and
               Andrea Basso},
  title     = {High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation
               Mechanism: Saber in Hardware},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {443--466},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.443-466},
  doi       = {10.13154/tches.v2020.i4.443-466},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/RoyB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KalesZ20,
  author    = {Daniel Kales and
               Greg Zaverucha},
  title     = {Improving the Performance of the Picnic Signature Scheme},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {154--188},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.154-188},
  doi       = {10.13154/tches.v2020.i4.154-188},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/KalesZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShakyaXTF20,
  author    = {Bicky Shakya and
               Xiaolin Xu and
               Mark Mohammad Tehranipoor and
               Domenic Forte},
  title     = {CAS-Lock: {A} Security-Corruptibility Trade-off Resilient Logic Locking
               Scheme},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {175--202},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.175-202},
  doi       = {10.13154/tches.v2020.i1.175-202},
  timestamp = {Wed, 01 Jul 2020 09:09:14 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ShakyaXTF20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KannwischerPP20,
  author    = {Matthias J. Kannwischer and
               Peter Pessl and
               Robert Primas},
  title     = {Single-Trace Attacks on Keccak},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {243--268},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.243-268},
  doi       = {10.13154/tches.v2020.i3.243-268},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/KannwischerPP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangYCYWL20,
  author    = {Neng Zhang and
               Bohan Yang and
               Chen Chen and
               Shouyi Yin and
               Shaojun Wei and
               Leibo Liu},
  title     = {Highly Efficient Architecture of NewHope-NIST on {FPGA} using Low-Complexity
               {NTT/INTT}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {49--72},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.49-72},
  doi       = {10.13154/tches.v2020.i2.49-72},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ZhangYCYWL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoKH20,
  author    = {Rei Ueno and
               Kohei Kazumori and
               Naofumi Homma},
  title     = {Rejection Sampling Schemes for Extracting Uniform Distribution from
               Biased PUFs},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {86--128},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.86-128},
  doi       = {10.13154/tches.v2020.i4.86-128},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/UenoKH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HeyszlMUSWGFDKK20,
  author    = {Johann Heyszl and
               Katja Miller and
               Florian Unterstein and
               Marc Schink and
               Alexander Wagner and
               Horst A. Gieser and
               Sven Freud and
               Tobias Damm and
               Dominik Klein and
               Dennis K{\&quot;{u}}gler},
  title     = {Investigating Profiled Side-Channel Attacks Against the {DES} Key
               Schedule},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {22--72},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.22-72},
  doi       = {10.13154/tches.v2020.i3.22-72},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/HeyszlMUSWGFDKK20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FrittoliBMCRFSB20,
  author    = {Luca Frittoli and
               Matteo Bocchi and
               Silvia Mella and
               Diego Carrera and
               Beatrice Rossi and
               Pasqualina Fragneto and
               Ruggero Susella and
               Giacomo Boracchi},
  title     = {Strengthening Sequential Side-Channel Attacks Through Change Detection},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {1--21},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.1-21},
  doi       = {10.13154/tches.v2020.i3.1-21},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/FrittoliBMCRFSB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangZJZBZLGR20,
  author    = {Fan Zhang and
               Yiran Zhang and
               Huilong Jiang and
               Xiang Zhu and
               Shivam Bhasin and
               Xinjie Zhao and
               Zhe Liu and
               Dawu Gu and
               Kui Ren},
  title     = {Persistent Fault Attack in Practice},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {172--195},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.172-195},
  doi       = {10.13154/tches.v2020.i2.172-195},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ZhangZJZBZLGR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BertiGPPS20,
  author    = {Francesco Berti and
               Chun Guo and
               Olivier Pereira and
               Thomas Peters and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {TEDT, a Leakage-Resist {AEAD} Mode for High Physical Security Applications},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {256--320},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.256-320},
  doi       = {10.13154/tches.v2020.i1.256-320},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BertiGPPS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WisiolMPNMSDR20,
  author    = {Nils Wisiol and
               Christopher M{\&quot;{u}}hl and
               Niklas Pirnay and
               Phuong Ha Nguyen and
               Marian Margraf and
               Jean{-}Pierre Seifert and
               Marten van Dijk and
               Ulrich R{\&quot;{u}}hrmair},
  title     = {Splitting the Interpose {PUF:} {A} Novel Modeling Attack Strategy},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {97--120},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.97-120},
  doi       = {10.13154/tches.v2020.i3.97-120},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WisiolMPNMSDR20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangTJBLS20,
  author    = {Wen Wang and
               Shanquan Tian and
               Bernhard Jungk and
               Nina Bindel and
               Patrick Longa and
               Jakub Szefer},
  title     = {Parameterized Hardware Accelerators for Lattice-Based Cryptography
               and Their Application to the {HW/SW} Co-Design of qTESLA},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {269--306},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.269-306},
  doi       = {10.13154/tches.v2020.i3.269-306},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WangTJBLS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaGB20,
  author    = {Alejandro Cabrera Aldaya and
               Cesar Pereida Garc{\&apos;{\i}}a and
               Billy Bob Brumley},
  title     = {From {A} to {Z:} Projective coordinates leakage in the wild},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {428--453},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.428-453},
  doi       = {10.13154/tches.v2020.i3.428-453},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/AldayaGB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MasureDP20,
  author    = {Lo{\&quot;{\i}}c Masure and
               C{\&apos;{e}}cile Dumas and
               Emmanuel Prouff},
  title     = {A Comprehensive Study of Deep Learning for Side-Channel Analysis},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {348--375},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.348-375},
  doi       = {10.13154/tches.v2020.i1.348-375},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MasureDP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaB20,
  author    = {Alejandro Cabrera Aldaya and
               Billy Bob Brumley},
  title     = {When one vulnerable primitive turns viral: Novel single-trace attacks
               on {ECDSA} and {RSA}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {196--221},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.196-221},
  doi       = {10.13154/tches.v2020.i2.196-221},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/AldayaB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuangCY20,
  author    = {Wei{-}Lun Huang and
               Jiun{-}Peng Chen and
               Bo{-}Yin Yang},
  title     = {Power Analysis on {NTRU} Prime},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {123--151},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.123-151},
  doi       = {10.13154/tches.v2020.i1.123-151},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/HuangCY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KrautterGT20,
  author    = {Jonas Krautter and
               Dennis Gnad and
               Mehdi Baradaran Tahoori},
  title     = {CPAmap: On the Complexity of Secure {FPGA} Virtualization, Multi-Tenancy,
               and Physical Design},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {121--146},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.121-146},
  doi       = {10.13154/tches.v2020.i3.121-146},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/KrautterGT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WuP20,
  author    = {Lichao Wu and
               Stjepan Picek},
  title     = {Remove Some Noise: On Pre-processing of Side-channel Measurements
               with Autoencoders},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {389--415},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.389-415},
  doi       = {10.13154/tches.v2020.i4.389-415},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WuP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GaoMPP20,
  author    = {Si Gao and
               Ben Marshall and
               Dan Page and
               Thinh Hung Pham},
  title     = {{FENL:} an {ISE} to mitigate analogue micro-architectural leakage},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {73--98},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.73-98},
  doi       = {10.13154/tches.v2020.i2.73-98},
  timestamp = {Tue, 16 Jun 2020 16:36:37 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/GaoMPP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GuoGSB20,
  author    = {Qian Guo and
               Vincent Grosso and
               Fran{\c{c}}ois{-}Xavier Standaert and
               Olivier Bronchain},
  title     = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory
               Viewpoint},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {209--238},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.209-238},
  doi       = {10.13154/tches.v2020.i4.209-238},
  timestamp = {Fri, 04 Sep 2020 11:09:33 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/GuoGSB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Moos20,
  author    = {Thorben Moos},
  title     = {Unrolled Cryptography on Silicon {A} Physical Security Analysis},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {416--442},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.416-442},
  doi       = {10.13154/tches.v2020.i4.416-442},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/Moos20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeraKV20,
  author    = {Jose Maria Bermudo Mera and
               Angshuman Karmakar and
               Ingrid Verbauwhede},
  title     = {Time-memory trade-off in Toom-Cook multiplication: an application
               to module-lattice based cryptography},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {222--244},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.222-244},
  doi       = {10.13154/tches.v2020.i2.222-244},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/MeraKV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BachePOSG20,
  author    = {Florian Bache and
               Clara Paglialonga and
               Tobias Oder and
               Tobias Schneider and
               Tim G{\&quot;{u}}neysu},
  title     = {High-Speed Masking for Polynomial Comparison in Lattice-based KEMs},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {483--507},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.483-507},
  doi       = {10.13154/tches.v2020.i3.483-507},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/BachePOSG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WangMCS20,
  author    = {Weijia Wang and
               Pierrick M{\&apos;{e}}aux and
               Ga{\&quot;{e}}tan Cassiers and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Efficient and Private Computations with Code-Based Masking},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {128--171},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.128-171},
  doi       = {10.13154/tches.v2020.i2.128-171},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/WangMCS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FritzmannSS20,
  author    = {Tim Fritzmann and
               Georg Sigl and
               Johanna Sep{\&apos;{u}}lveda},
  title     = {{RISQ-V:} Tightly Coupled {RISC-V} Accelerators for Post-Quantum Cryptography},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {239--280},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.239-280},
  doi       = {10.13154/tches.v2020.i4.239-280},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/FritzmannSS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UntersteinSSTIH20,
  author    = {Florian Unterstein and
               Marc Schink and
               Thomas Schamberger and
               Lars Tebelmann and
               Manuel Ilg and
               Johann Heyszl},
  title     = {Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {365--388},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.365-388},
  doi       = {10.13154/tches.v2020.i4.365-388},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/UntersteinSSTIH20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ValivetiV20,
  author    = {Annapurna Valiveti and
               Srinivas Vivek},
  title     = {Second-Order Masked Lookup Table Compression Scheme},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {129--153},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.129-153},
  doi       = {10.13154/tches.v2020.i4.129-153},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ValivetiV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZaidBHV20,
  author    = {Gabriel Zaid and
               Lilian Bossuet and
               Amaury Habrard and
               Alexandre Venelli},
  title     = {Methodology for Efficient {CNN} Architectures in Profiling Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {1--36},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.1-36},
  doi       = {10.13154/tches.v2020.i1.1-36},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ZaidBHV20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MassolinoLRB20,
  author    = {Pedro Maat C. Massolino and
               Patrick Longa and
               Joost Renes and
               Lejla Batina},
  title     = {A Compact and Scalable Hardware/Software Co-design of {SIKE}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {245--271},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.245-271},
  doi       = {10.13154/tches.v2020.i2.245-271},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/MassolinoLRB20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HuoMWHZZL20,
  author    = {Tianlin Huo and
               Xiaoni Meng and
               Wenhao Wang and
               Chunliang Hao and
               Pei Zhao and
               Jian Zhai and
               Mingshu Li},
  title     = {Bluethunder: {A} 2-level Directional Predictor Based Side-Channel
               Attack against {SGX}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {321--347},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.321-347},
  doi       = {10.13154/tches.v2020.i1.321-347},
  timestamp = {Thu, 20 Aug 2020 17:55:03 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/HuoMWHZZL20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ZhangZNHY20,
  author    = {Jiajia Zhang and
               Mengce Zheng and
               Jiehui Nan and
               Honggang Hu and
               Nenghai Yu},
  title     = {A Novel Evaluation Metric for Deep Learning-Based Side Channel Analysis
               and Its Extended Application to Imbalanced Data},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {73--96},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.73-96},
  doi       = {10.13154/tches.v2020.i3.73-96},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ZhangZNHY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Meyer20,
  author    = {Lauren De Meyer},
  title     = {Recovering the CTR{\_}DRBG state in 256 traces},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {37--65},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.37-65},
  doi       = {10.13154/tches.v2020.i1.37-65},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Meyer20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbartusHTAP20,
  author    = {Nils Albartus and
               Max Hoffmann and
               Sebastian Temme and
               Leonid Azriel and
               Christof Paar},
  title     = {{DANA} Universal Dataflow Analysis for Gate-Level Netlist Reverse
               Engineering},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {309--336},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.309-336},
  doi       = {10.13154/tches.v2020.i4.309-336},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/AlbartusHTAP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BockABM20,
  author    = {Estuardo Alpirez Bock and
               Alessandro Amadori and
               Chris Brzuska and
               Wil Michiels},
  title     = {On the Security Goals of White-Box Cryptography},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {2},
  pages     = {327--357},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i2.327-357},
  doi       = {10.13154/tches.v2020.i2.327-357},
  timestamp = {Mon, 30 Mar 2020 14:15:59 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/BockABM20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BhasinBHJPS20,
  author    = {Shivam Bhasin and
               Jakub Breier and
               Xiaolu Hou and
               Dirmanto Jap and
               Romain Poussier and
               Siang Meng Sim},
  title     = {{SITM:} See-In-The-Middle Side-Channel Assisted Middle Round Differential
               Cryptanalysis on {SPN} Block Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {1},
  pages     = {95--122},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i1.95-122},
  doi       = {10.13154/tches.v2020.i1.95-122},
  timestamp = {Mon, 26 Oct 2020 08:25:36 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BhasinBHJPS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlkimBCG20,
  author    = {Erdem Alkim and
               Yusuf Alper Bilgin and
               Murat Cenk and
               Fran{\c{c}}ois G{\&apos;{e}}rard},
  title     = {Cortex-M4 optimizations for \{R, M\} {LWE} schemes},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {336--357},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.336-357},
  doi       = {10.13154/tches.v2020.i3.336-357},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/AlkimBCG20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PerinCP20,
  author    = {Guilherme Perin and
               Lukasz Chmielewski and
               Stjepan Picek},
  title     = {Strength in Numbers: Improving Generalization with Ensembles in Machine
               Learning-based Profiled Side-channel Analysis},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {337--364},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.337-364},
  doi       = {10.13154/tches.v2020.i4.337-364},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/PerinCP20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CamuratiFS20,
  author    = {Giovanni Camurati and
               Aur{\&apos;{e}}lien Francillon and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Understanding Screaming Channels: From a Detailed Analysis to Improved
               Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {3},
  pages     = {358--401},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i3.358-401},
  doi       = {10.13154/tches.v2020.i3.358-401},
  timestamp = {Thu, 02 Jul 2020 16:41:27 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/CamuratiFS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MolteniZ20,
  author    = {Maria Chiara Molteni and
               Vittorio Zaccaria},
  title     = {On the spectral features of robust probing security},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {24--48},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.24-48},
  doi       = {10.13154/tches.v2020.i4.24-48},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/MolteniZ20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Hamburg20,
  author    = {Mike Hamburg},
  title     = {Faster Montgomery and double-add ladders for short Weierstrass curves},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2020},
  number    = {4},
  pages     = {189--208},
  year      = {2020},
  url       = {https://doi.org/10.13154/tches.v2020.i4.189-208},
  doi       = {10.13154/tches.v2020.i4.189-208},
  timestamp = {Wed, 02 Sep 2020 15:21:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/Hamburg20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}