@article{DBLP:journals/tches/KoppermannSHS18,
  author    = {Philipp Koppermann and
               Fabrizio De Santis and
               Johann Heyszl and
               Georg Sigl},
  title     = {Fast {FPGA} Implementations of Diffie-Hellman on the Kummer Surface
               of a Genus-2 Curve},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {1--17},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.1-17},
  doi       = {10.13154/tches.v2018.i1.1-17},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/KoppermannSHS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NaitoMSS18,
  author    = {Yusuke Naito and
               Mitsuru Matsui and
               Takeshi Sugawara and
               Daisuke Suzuki},
  title     = {{SAEB:} {A} Lightweight Blockcipher-Based {AEAD} Mode of Operation},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {192--217},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.192-217},
  doi       = {10.13154/tches.v2018.i2.192-217},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/NaitoMSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FaustGPPS18,
  author    = {Sebastian Faust and
               Vincent Grosso and
               Santos Merino Del Pozo and
               Clara Paglialonga and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Composable Masking Schemes in the Presence of Physical Defaults {\&amp;}
               the Robust Probing Model},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {89--120},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.89-120},
  doi       = {10.13154/tches.v2018.i3.89-120},
  timestamp = {Mon, 26 Oct 2020 08:25:36 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/FaustGPPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HicksGO18,
  author    = {Christopher Hicks and
               Flavio D. Garcia and
               David Oswald},
  title     = {Dismantling the {AUT64} Automotive Cipher},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {46--69},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.46-69},
  doi       = {10.13154/tches.v2018.i2.46-69},
  timestamp = {Mon, 26 Oct 2020 08:25:36 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/HicksGO18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FyrbiakWDABTP18,
  author    = {Marc Fyrbiak and
               Sebastian Wallat and
               Jonathan D{\&apos;{e}}chelotte and
               Nils Albartus and
               Sinan B{\&quot;{o}}cker and
               Russell Tessier and
               Christof Paar},
  title     = {On the Difficulty of FSM-based Hardware Obfuscation},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {293--330},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.293-330},
  doi       = {10.13154/tches.v2018.i3.293-330},
  timestamp = {Mon, 26 Oct 2020 08:25:37 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/FyrbiakWDABTP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoffmannP18,
  author    = {Max Hoffmann and
               Christof Paar},
  title     = {Stealthy Opaque Predicates in Hardware - Obfuscating Constant Expressions
               at Negligible Overhead},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {277--297},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.277-297},
  doi       = {10.13154/tches.v2018.i2.277-297},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/HoffmannP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChakrabortiDNY18,
  author    = {Avik Chakraborti and
               Nilanjan Datta and
               Mridul Nandi and
               Kan Yasuda},
  title     = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {218--241},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.218-241},
  doi       = {10.13154/tches.v2018.i2.218-241},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ChakrabortiDNY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BreierHL18,
  author    = {Jakub Breier and
               Xiaolu Hou and
               Yang Liu},
  title     = {Fault Attacks Made Easy: Differential Fault Analysis Automation on
               Assembly Code},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {96--122},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.96-122},
  doi       = {10.13154/tches.v2018.i2.96-122},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BreierHL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SekerFES18,
  author    = {Okan Seker and
               Abraham Fernandez{-}Rubio and
               Thomas Eisenbarth and
               Rainer Steinwandt},
  title     = {Extending Glitch-Free Multiparty Protocols to Resist Fault Injection
               Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {394--430},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.394-430},
  doi       = {10.13154/tches.v2018.i3.394-430},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/SekerFES18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SahaMD18,
  author    = {Sayandeep Saha and
               Debdeep Mukhopadhyay and
               Pallab Dasgupta},
  title     = {ExpFault: An Automated Framework for Exploitable Fault Characterization
               in Block Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {242--276},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.242-276},
  doi       = {10.13154/tches.v2018.i2.242-276},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/SahaMD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Park018,
  author    = {Jin Hyung Park and
               Dong Hoon Lee},
  title     = {{FACE:} Fast {AES} {CTR} mode Encryption Techniques based on the Reuse
               of Repetitive Data},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {469--499},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.469-499},
  doi       = {10.13154/tches.v2018.i3.469-499},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Park018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Seo0LH18,
  author    = {Hwajeong Seo and
               Zhe Liu and
               Patrick Longa and
               Zhi Hu},
  title     = {{SIDH} on {ARM:} Faster Modular Multiplications for Faster Post-Quantum
               Supersingular Isogeny Key Exchange},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {1--20},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.1-20},
  doi       = {10.13154/tches.v2018.i3.1-20},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Seo0LH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/JungkPS18,
  author    = {Bernhard Jungk and
               Richard Petri and
               Marc St{\&quot;{o}}ttinger},
  title     = {Efficient Side-Channel Protections of {ARX} Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {627--653},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.627-653},
  doi       = {10.13154/tches.v2018.i3.627-653},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/JungkPS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GrossIB18,
  author    = {Hannes Gro{\ss} and
               Rinat Iusupov and
               Roderick Bloem},
  title     = {Generic Low-Latency Masking in Hardware},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {1--21},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.1-21},
  doi       = {10.13154/tches.v2018.i2.1-21},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/GrossIB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/0001RGMV18,
  author    = {Bohan Yang and
               Vladimir Rozic and
               Milos Grujic and
               Nele Mentens and
               Ingrid Verbauwhede},
  title     = {{ES-TRNG:} {A} High-throughput, Low-area True Random Number Generator
               based on Edge Sampling},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {267--292},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.267-292},
  doi       = {10.13154/tches.v2018.i3.267-292},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/0001RGMV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BettaleCZ18,
  author    = {Luk Bettale and
               Jean{-}S{\&apos;{e}}bastien Coron and
               Rina Zeitoun},
  title     = {Improved High-Order Conversion From Boolean to Arithmetic Masking},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {22--45},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.22-45},
  doi       = {10.13154/tches.v2018.i2.22-45},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BettaleCZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CnuddeEM18,
  author    = {Thomas De Cnudde and
               Maik Ender and
               Amir Moradi},
  title     = {Hardware Masking, Revisited},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {123--148},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.123-148},
  doi       = {10.13154/tches.v2018.i2.123-148},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/CnuddeEM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BadawiVMA18,
  author    = {Ahmad Al Badawi and
               Bharadwaj Veeravalli and
               Chan Fook Mun and
               Khin Mi Mi Aung},
  title     = {High-Performance {FV} Somewhat Homomorphic Encryption on GPUs: An
               Implementation using {CUDA}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {70--95},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.70-95},
  doi       = {10.13154/tches.v2018.i2.70-95},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BadawiVMA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoradiRSS18,
  author    = {Amir Moradi and
               Bastian Richter and
               Tobias Schneider and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Leakage Detection with the x2-Test},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {209--237},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.209-237},
  doi       = {10.13154/tches.v2018.i1.209-237},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MoradiRSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PageR18,
  author    = {Daniel Page and
               Matthieu Rivain},
  title     = {Preface to {TCHES} 2018},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {I--IV},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.I-IV},
  doi       = {10.13154/tches.v2018.i1.I-IV},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/PageR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerRB18,
  author    = {Lauren De Meyer and
               Oscar Reparaz and
               Beg{\&quot;{u}}l Bilgin},
  title     = {Multiplicative Masking for {AES} in Hardware},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {431--468},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.431-468},
  doi       = {10.13154/tches.v2018.i3.431-468},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MeyerRB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChuangDFGLV18,
  author    = {Kai{-}Hsin Chuang and
               Robin Degraeve and
               Andrea Fantini and
               Guido Groeseneken and
               Dimitri Linten and
               Ingrid Verbauwhede},
  title     = {A Cautionary Note When Looking for a Truly Reconfigurable Resistive
               {RAM} {PUF}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {98--117},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.98-117},
  doi       = {10.13154/tches.v2018.i1.98-117},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ChuangDFGLV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ArribasBPNR18,
  author    = {Victor Arribas and
               Beg{\&quot;{u}}l Bilgin and
               George Petrides and
               Svetla Nikova and
               Vincent Rijmen},
  title     = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {269--290},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.269-290},
  doi       = {10.13154/tches.v2018.i1.269-290},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AvoineF18,
  author    = {Gildas Avoine and
               Lo{\&quot;{\i}}c Ferreira},
  title     = {Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding
               Oracle Attack},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {149--170},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.149-170},
  doi       = {10.13154/tches.v2018.i2.149-170},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AvoineF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BruinderinkP18,
  author    = {Leon Groot Bruinderink and
               Peter Pessl},
  title     = {Differential Fault Attacks on Deterministic Lattice Signatures},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {21--43},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.21-43},
  doi       = {10.13154/tches.v2018.i3.21-43},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BruinderinkP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KarmakarMRV18,
  author    = {Angshuman Karmakar and
               Jose Maria Bermudo Mera and
               Sujoy Sinha Roy and
               Ingrid Verbauwhede},
  title     = {Saber on {ARM} CCA-secure module lattice-based key encapsulation on
               {ARM}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {243--266},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.243-266},
  doi       = {10.13154/tches.v2018.i3.243-266},
  timestamp = {Sat, 28 Mar 2020 14:59:45 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/KarmakarMRV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KrautterGT18,
  author    = {Jonas Krautter and
               Dennis R. E. Gnad and
               Mehdi Baradaran Tahoori},
  title     = {FPGAhammer: Remote Voltage Fault Attacks on Shared FPGAs, suitable
               for {DFA} on {AES}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {44--68},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.44-68},
  doi       = {10.13154/tches.v2018.i3.44-68},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/KrautterGT18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlliniSPBLF18,
  author    = {Elie Noumon Allini and
               Maciej Sk{\&apos;{o}}rski and
               Oto Petura and
               Florent Bernard and
               Marek Laban and
               Viktor Fischer},
  title     = {Evaluation and Monitoring of Free Running Oscillators Serving as Source
               of Randomness},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {214--242},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.214-242},
  doi       = {10.13154/tches.v2018.i3.214-242},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AlliniSPBLF18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/OderSPG18,
  author    = {Tobias Oder and
               Tobias Schneider and
               Thomas P{\&quot;{o}}ppelmann and
               Tim G{\&quot;{u}}neysu},
  title     = {Practical CCA2-Secure and Masked Ring-LWE Implementation},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {142--174},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.142-174},
  doi       = {10.13154/tches.v2018.i1.142-174},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/OderSPG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CathebrasCMSV18,
  author    = {Jo{\&quot;{e}}l Cath{\&apos;{e}}bras and
               Alexandre Carbon and
               Peter A. Milder and
               Renaud Sirdey and
               Nicolas Ventroux},
  title     = {Data Flow Oriented Hardware Design of RNS-based Polynomial Multiplication
               for {SHE} Acceleration},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {69--88},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.69-88},
  doi       = {10.13154/tches.v2018.i3.69-88},
  timestamp = {Sat, 05 Sep 2020 17:44:11 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/CathebrasCMSV18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Reyhani-Masoleh18,
  author    = {Arash Reyhani{-}Masoleh and
               Mostafa M. I. Taha and
               Doaa Ashmawy},
  title     = {Smashing the Implementation Records of {AES} S-box},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {298--336},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.298-336},
  doi       = {10.13154/tches.v2018.i2.298-336},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Reyhani-Masoleh18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DallMEGHMY18,
  author    = {Fergus Dall and
               Gabrielle De Micheli and
               Thomas Eisenbarth and
               Daniel Genkin and
               Nadia Heninger and
               Ahmad Moghimi and
               Yuval Yarom},
  title     = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID}
               via Cache Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {2},
  pages     = {171--191},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i2.171-191},
  doi       = {10.13154/tches.v2018.i2.171-191},
  timestamp = {Mon, 26 Oct 2020 08:25:36 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Mathieu-MahiasQ18,
  author    = {Axel Mathieu{-}Mahias and
               Micha{\&quot;{e}}l Quisquater},
  title     = {Mixing Additive and Multiplicative Masking for Probing Secure Polynomial
               Evaluation Methods},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {175--208},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.175-208},
  doi       = {10.13154/tches.v2018.i1.175-208},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Mathieu-MahiasQ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AmietCZ18,
  author    = {Dorian Amiet and
               Andreas Curiger and
               Paul Zbinden},
  title     = {FPGA-based Accelerator for Post-Quantum Signature Scheme {SPHINCS-256}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {18--39},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.18-39},
  doi       = {10.13154/tches.v2018.i1.18-39},
  timestamp = {Mon, 26 Oct 2020 08:25:37 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AmietCZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Papagiannopoulos18,
  author    = {Kostas Papagiannopoulos},
  title     = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {524--546},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.524-546},
  doi       = {10.13154/tches.v2018.i3.524-546},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Papagiannopoulos18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CoronRZ18,
  author    = {Jean{-}S{\&apos;{e}}bastien Coron and
               Franck Rondepierre and
               Rina Zeitoun},
  title     = {High Order Masking of Look-up Tables with Common Shares},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {40--72},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.40-72},
  doi       = {10.13154/tches.v2018.i1.40-72},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/CoronRZ18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Meyer0W18,
  author    = {Lauren De Meyer and
               Amir Moradi and
               Felix Wegener},
  title     = {Spin Me Right Round Rotational Symmetry for FPGA-Specific {AES}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {596--626},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.596-626},
  doi       = {10.13154/tches.v2018.i3.596-626},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Meyer0W18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DinuK18,
  author    = {Daniel Dinu and
               Ilya Kizhvatov},
  title     = {{EM} Analysis in the IoT Context: Lessons Learned from an Attack on
               Thread},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {73--97},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.73-97},
  doi       = {10.13154/tches.v2018.i1.73-97},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/DinuK18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HoweOKG18,
  author    = {James Howe and
               Tobias Oder and
               Markus Krausz and
               Tim G{\&quot;{u}}neysu},
  title     = {Standard Lattice-Based Key Encapsulation on Embedded Devices},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {372--393},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.372-393},
  doi       = {10.13154/tches.v2018.i3.372-393},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/HoweOKG18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TakahashiTA18,
  author    = {Akira Takahashi and
               Mehdi Tibouchi and
               Masayuki Abe},
  title     = {New Bleichenbacher Records: Fault Attacks on qDSA Signatures},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {331--371},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.331-371},
  doi       = {10.13154/tches.v2018.i3.331-371},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/TakahashiTA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LohrkeTKBS18,
  author    = {Heiko Lohrke and
               Shahin Tajik and
               Thilo Krachenfels and
               Christian Boit and
               Jean{-}Pierre Seifert},
  title     = {Key Extraction Using Thermal Laser Stimulation {A} Case Study on Xilinx
               Ultrascale FPGAs},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {573--595},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.573-595},
  doi       = {10.13154/tches.v2018.i3.573-595},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/LohrkeTKBS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbrechtDP18,
  author    = {Martin R. Albrecht and
               Amit Deo and
               Kenneth G. Paterson},
  title     = {Cold Boot Attacks on Ring and Module {LWE} Keys Under the {NTT}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {173--213},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.173-213},
  doi       = {10.13154/tches.v2018.i3.173-213},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AlbrechtDP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/0010L0BHDQR18,
  author    = {Fan Zhang and
               Xiaoxuan Lou and
               Xinjie Zhao and
               Shivam Bhasin and
               Wei He and
               Ruyi Ding and
               Samiya Qureshi and
               Kui Ren},
  title     = {Persistent Fault Analysis on Block Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {150--172},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.150-172},
  doi       = {10.13154/tches.v2018.i3.150-172},
  timestamp = {Tue, 13 Oct 2020 09:23:28 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/0010L0BHDQR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChabanneMP18,
  author    = {Herv{\&apos;{e}} Chabanne and
               Houssem Maghrebi and
               Emmanuel Prouff},
  title     = {Linear Repairing Codes and Side-Channel Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {118--141},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.118-141},
  doi       = {10.13154/tches.v2018.i1.118-141},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ChabanneMP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DobraunigEKMMP18,
  author    = {Christoph Dobraunig and
               Maria Eichlseder and
               Thomas Korak and
               Stefan Mangard and
               Florian Mendel and
               Robert Primas},
  title     = {{SIFA:} Exploiting Ineffective Fault Inductions on Symmetric Cryptography},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {547--572},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.547-572},
  doi       = {10.13154/tches.v2018.i3.547-572},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/DobraunigEKMMP18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DucasKLLSSS18,
  author    = {L{\&apos;{e}}o Ducas and
               Eike Kiltz and
               Tancr{\`{e}}de Lepoint and
               Vadim Lyubashevsky and
               Peter Schwabe and
               Gregor Seiler and
               Damien Stehl{\&apos;{e}}},
  title     = {CRYSTALS-Dilithium: {A} Lattice-Based Digital Signature Scheme},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {1},
  pages     = {238--268},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i1.238-268},
  doi       = {10.13154/tches.v2018.i1.238-268},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/DucasKLLSSS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DerbezFLM18,
  author    = {Patrick Derbez and
               Pierre{-}Alain Fouque and
               Baptiste Lambin and
               Brice Minaud},
  title     = {On Recovering Affine Encodings in White-Box Implementations},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {121--149},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.121-149},
  doi       = {10.13154/tches.v2018.i3.121-149},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/DerbezFLM18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ParkSKH18,
  author    = {Aesun Park and
               Kyung{-}Ah Shim and
               Namhun Koo and
               Dong{-}Guk Han},
  title     = {Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate
               Quadratic Equations - Rainbow and {UOV} -},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2018},
  number    = {3},
  pages     = {500--523},
  year      = {2018},
  url       = {https://doi.org/10.13154/tches.v2018.i3.500-523},
  doi       = {10.13154/tches.v2018.i3.500-523},
  timestamp = {Fri, 27 Mar 2020 08:34:07 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ParkSKH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}