@article{DBLP:journals/tches/NguyenSJMRD19,
  author    = {Phuong Ha Nguyen and
               Durga Prasad Sahoo and
               Chenglu Jin and
               Kaleel Mahmood and
               Ulrich R{\&quot;{u}}hrmair and
               Marten van Dijk},
  title     = {The Interpose {PUF:} Secure {PUF} Design against State-of-the-art
               Machine Learning Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {243--290},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.243-290},
  doi       = {10.13154/tches.v2019.i4.243-290},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/NguyenSJMRD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Sugawara19,
  author    = {Takeshi Sugawara},
  title     = {3-Share Threshold Implementation of {AES} S-box without Fresh Randomness},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {123--145},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.123-145},
  doi       = {10.13154/tches.v2019.i1.123-145},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Sugawara19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BronchainSS19,
  author    = {Olivier Bronchain and
               Tobias Schneider and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Multi-Tuple Leakage Detection and the Dependent Signal Issue},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {318--345},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.318-345},
  doi       = {10.13154/tches.v2019.i2.318-345},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BronchainSS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BozzatoFP19,
  author    = {Claudio Bozzato and
               Riccardo Focardi and
               Francesco Palmarini},
  title     = {Shaping the Glitch: Optimizing Voltage Fault Injection Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {199--224},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.199-224},
  doi       = {10.13154/tches.v2019.i2.199-224},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BozzatoFP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/SimKCCPH19,
  author    = {Bo{-}Yeon Sim and
               Jihoon Kwon and
               Kyu Young Choi and
               Jihoon Cho and
               Aesun Park and
               Dong{-}Guk Han},
  title     = {Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {180--212},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.180-212},
  doi       = {10.13154/tches.v2019.i4.180-212},
  timestamp = {Mon, 26 Oct 2020 08:25:36 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/SimKCCPH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AldayaGTB19,
  author    = {Alejandro Cabrera Aldaya and
               Cesar Pereida Garc{\&apos;{\i}}a and
               Luis Manuel Alvarez Tapia and
               Billy Bob Brumley},
  title     = {Cache-Timing Attacks on {RSA} Key Generation},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {213--242},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.213-242},
  doi       = {10.13154/tches.v2019.i4.213-242},
  timestamp = {Fri, 27 Mar 2020 08:34:07 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AldayaGTB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ShakyaSTF19,
  author    = {Bicky Shakya and
               Hao{-}Ting Shen and
               Mark Mohammad Tehranipoor and
               Domenic Forte},
  title     = {Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {86--118},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.86-118},
  doi       = {10.13154/tches.v2019.i3.86-118},
  timestamp = {Wed, 01 Jul 2020 09:09:14 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/ShakyaSTF19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerANNR19,
  author    = {Lauren De Meyer and
               Victor Arribas and
               Svetla Nikova and
               Ventzislav Nikov and
               Vincent Rijmen},
  title     = {M{\&amp;}M: Masks and Macs against Physical Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {25--50},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.25-50},
  doi       = {10.13154/tches.v2019.i1.25-50},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/PicekHJBR19,
  author    = {Stjepan Picek and
               Annelie Heuser and
               Alan Jovic and
               Shivam Bhasin and
               Francesco Regazzoni},
  title     = {The Curse of Class Imbalance and Conflicting Metrics with Machine
               Learning for Side-channel Evaluations},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {209--237},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.209-237},
  doi       = {10.13154/tches.v2019.i1.209-237},
  timestamp = {Tue, 31 Mar 2020 14:49:49 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/PicekHJBR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Papachristodoulou19,
  author    = {Louiza Papachristodoulou and
               Apostolos P. Fournaris and
               Kostas Papagiannopoulos and
               Lejla Batina},
  title     = {Practical Evaluation of Protected Residue Number System Scalar Multiplication},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {259--282},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.259-282},
  doi       = {10.13154/tches.v2019.i1.259-282},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Papachristodoulou19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MentensGVVSDM19,
  author    = {Nele Mentens and
               Jan Genoe and
               Thomas Vandenabeele and
               Lynn Verschueren and
               Dirk Smets and
               Wim Dehaene and
               Kris Myny},
  title     = {Security on Plastics: Fake or Real?},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {1--16},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.1-16},
  doi       = {10.13154/tches.v2019.i4.1-16},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MentensGVVSDM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/NilssonJS19,
  author    = {Alexander Nilsson and
               Thomas Johansson and
               Paul Stankovski},
  title     = {Error Amplification in Code-based Cryptography},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {238--258},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.238-258},
  doi       = {10.13154/tches.v2019.i1.238-258},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/NilssonJS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AzarKHS19,
  author    = {Kimia Zamiri Azar and
               Hadi Mardani Kamali and
               Houman Homayoun and
               Avesta Sasan},
  title     = {{SMT} Attack: Next Generation Attack on Obfuscated Circuits with Capabilities
               and Performance Beyond the {SAT} Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {97--122},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.97-122},
  doi       = {10.13154/tches.v2019.i1.97-122},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AzarKHS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RobynsQL19,
  author    = {Pieter Robyns and
               Peter Quax and
               Wim Lamotte},
  title     = {Improving {CEMA} using Correlation Optimization},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {1--24},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.1-24},
  doi       = {10.13154/tches.v2019.i1.1-24},
  timestamp = {Sat, 05 Sep 2020 17:44:11 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/RobynsQL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KarimiMM19,
  author    = {Naghmeh Karimi and
               Thorben Moos and
               Amir Moradi},
  title     = {Exploring the Effect of Device Aging on Static Power Analysis Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {233--256},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.233-256},
  doi       = {10.13154/tches.v2019.i3.233-256},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/KarimiMM19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MoosMSS19,
  author    = {Thorben Moos and
               Amir Moradi and
               Tobias Schneider and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Glitch-Resistant Masking Revisited or Why Proofs in the Robust Probing
               Model are Needed},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {256--292},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.256-292},
  doi       = {10.13154/tches.v2019.i2.256-292},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MoosMSS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LeviBS19,
  author    = {Itamar Levi and
               Davide Bellizia and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Reducing a Masked Implementation's Effective Security Order with Setup
               Manipulations And an Explanation Based on Externally-Amplified Couplings},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {293--317},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.293-317},
  doi       = {10.13154/tches.v2019.i2.293-317},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/LeviBS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/LyubashevskyS19,
  author    = {Vadim Lyubashevsky and
               Gregor Seiler},
  title     = {{NTTRU:} Truly Fast {NTRU} Using {NTT}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {180--201},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.180-201},
  doi       = {10.13154/tches.v2019.i3.180-201},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/LyubashevskyS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HouBZL19,
  author    = {Xiaolu Hou and
               Jakub Breier and
               Fuyuan Zhang and
               Yang Liu},
  title     = {Fully Automated Differential Fault Analysis on Software Implementations
               of Block Ciphers},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {1--29},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.1-29},
  doi       = {10.13154/tches.v2019.i3.1-29},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/HouBZL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AlbrechtHHPVW19,
  author    = {Martin R. Albrecht and
               Christian Hanser and
               Andrea H{\&quot;{o}}ller and
               Thomas P{\&quot;{o}}ppelmann and
               Fernando Virdia and
               Andreas Wallner},
  title     = {Implementing RLWE-based Schemes Using an {RSA} Co-Processor},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {169--208},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.169-208},
  doi       = {10.13154/tches.v2019.i1.169-208},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AlbrechtHHPVW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AkaviaFS19,
  author    = {Adi Akavia and
               Dan Feldman and
               Hayim Shaul},
  title     = {Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {80--106},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.80-106},
  doi       = {10.13154/tches.v2019.i2.80-106},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/AkaviaFS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ImmlerU19,
  author    = {Vincent Immler and
               Karthik Uppund},
  title     = {New Insights to Key Derivation for Tamper-Evident Physical Unclonable
               Functions},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {30--65},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.30-65},
  doi       = {10.13154/tches.v2019.i3.30-65},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ImmlerU19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CarboneCCDDDPV19,
  author    = {Mathieu Carbone and
               Vincent Conin and
               Marie{-}Angela Cornelie and
               Fran{\c{c}}ois Dassance and
               Guillaume Dufresne and
               C{\&apos;{e}}cile Dumas and
               Emmanuel Prouff and
               Alexandre Venelli},
  title     = {Deep Learning to Evaluate Secure {RSA} Implementations},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {132--161},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.132-161},
  doi       = {10.13154/tches.v2019.i2.132-161},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/CarboneCCDDDPV19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/RivainW19,
  author    = {Matthieu Rivain and
               Junwei Wang},
  title     = {Analysis and Improvement of Differential Computation Attacks against
               Internally-Encoded White-Box Implementations},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {225--255},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.225-255},
  doi       = {10.13154/tches.v2019.i2.225-255},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/RivainW19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WoutersMAGP19,
  author    = {Lennert Wouters and
               Eduard Marin and
               Tomer Ashur and
               Benedikt Gierlichs and
               Bart Preneel},
  title     = {Fast, Furious and Insecure: Passive Keyless Entry and Start Systems
               in Modern Supercars},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {66--85},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.66-85},
  doi       = {10.13154/tches.v2019.i3.66-85},
  timestamp = {Mon, 26 Oct 2020 08:25:36 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/WoutersMAGP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CassiersS19,
  author    = {Ga{\&quot;{e}}tan Cassiers and
               Fran{\c{c}}ois{-}Xavier Standaert},
  title     = {Towards Globally Optimized Masking: From Low Randomness to Low Noise
               Rate or Probe Isolating Multiplications with Reduced Randomness and
               Security against Horizontal Attacks},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {162--198},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.162-198},
  doi       = {10.13154/tches.v2019.i2.162-198},
  timestamp = {Tue, 04 Aug 2020 13:15:50 +0200},
  biburl    = {https://dblp.org/rec/journals/tches/CassiersS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/FaugerePR19,
  author    = {Jean{-}Charles Faug{\`{e}}re and
               Ludovic Perret and
               Jocelyn Ryckeghem},
  title     = {Software Toolkit for HFE-based Multivariate Schemes},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {257--304},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.257-304},
  doi       = {10.13154/tches.v2019.i3.257-304},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/FaugerePR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BernsteinY19,
  author    = {Daniel J. Bernstein and
               Bo{-}Yin Yang},
  title     = {Fast constant-time gcd computation and modular inversion},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {340--398},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.340-398},
  doi       = {10.13154/tches.v2019.i3.340-398},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BernsteinY19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MaximovE19,
  author    = {Alexander Maximov and
               Patrik Ekdahl},
  title     = {New Circuit Minimization Techniques for Smaller and Faster {AES} SBoxes},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {91--125},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.91-125},
  doi       = {10.13154/tches.v2019.i4.91-125},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MaximovE19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Moos19,
  author    = {Thorben Moos},
  title     = {Static Power {SCA} of Sub-100 nm {CMOS} ASICs and the Insecurity of
               Masking Schemes in Low-Noise Environments},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {202--232},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.202-232},
  doi       = {10.13154/tches.v2019.i3.202-232},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Moos19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/HaaseL19,
  author    = {Bj{\&quot;{o}}rn Haase and
               Beno{\^{\i}}t Labrique},
  title     = {AuCPace: Efficient verifier-based {PAKE} protocol tailored for the
               IIoT},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {1--48},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.1-48},
  doi       = {10.13154/tches.v2019.i2.1-48},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/HaaseL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BanerjeeUC19,
  author    = {Utsav Banerjee and
               Tenzin S. Ukyab and
               Anantha P. Chandrakasan},
  title     = {Sapphire: {A} Configurable Crypto-Processor for Post-Quantum Lattice-based
               Protocols},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {17--61},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.17-61},
  doi       = {10.13154/tches.v2019.i4.17-61},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/BanerjeeUC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Ryan19,
  author    = {Keegan Ryan},
  title     = {Return of the Hidden Number Problem. {A} Widespread and Novel Key
               Extraction Attack on {ECDSA} and {DSA}},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {146--168},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.146-168},
  doi       = {10.13154/tches.v2019.i1.146-168},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Ryan19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/GnadKT19,
  author    = {Dennis R. E. Gnad and
               Jonas Krautter and
               Mehdi Baradaran Tahoori},
  title     = {Leaky Noise: New Side-Channel Attack Vectors in Mixed-Signal IoT Devices},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {305--339},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.305-339},
  doi       = {10.13154/tches.v2019.i3.305-339},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/GnadKT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ImmlerONKLLOWS19,
  author    = {Vincent Immler and
               Johannes Obermaier and
               Kuan Kuan Ng and
               Fei Xiang Ke and
               JinYu Lee and
               Yak Peng Lim and
               Wei Koon Oh and
               Keng Hoong Wee and
               Georg Sigl},
  title     = {Secure Physical Enclosures from Covers with Tamper-Resistance},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {1},
  pages     = {51--96},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i1.51-96},
  doi       = {10.13154/tches.v2019.i1.51-96},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/ImmlerONKLLOWS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/OFlynnD19,
  author    = {Colin O'Flynn and
               Alex Dewar},
  title     = {On-Device Power Analysis Across Hardware Security Domains. Stop Hitting
               Yourself},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {126--153},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.126-153},
  doi       = {10.13154/tches.v2019.i4.126-153},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/OFlynnD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/Timon19,
  author    = {Benjamin Timon},
  title     = {Non-Profiled Deep Learning-based Side-Channel attacks with Sensitivity
               Analysis},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {107--131},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.107-131},
  doi       = {10.13154/tches.v2019.i2.107-131},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/Timon19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KimPHBH19,
  author    = {Jaehun Kim and
               Stjepan Picek and
               Annelie Heuser and
               Shivam Bhasin and
               Alan Hanjalic},
  title     = {Make Some Noise. Unleashing the Power of Convolutional Neural Networks
               for Profiled Side-channel Analysis},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {148--179},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.148-179},
  doi       = {10.13154/tches.v2019.i3.148-179},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/KimPHBH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/WahbyB19,
  author    = {Riad S. Wahby and
               Dan Boneh},
  title     = {Fast and simple constant-time hashing to the {BLS12-381} elliptic
               curve},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {154--179},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.154-179},
  doi       = {10.13154/tches.v2019.i4.154-179},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/WahbyB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/KinugawaFH19,
  author    = {Masahiro Kinugawa and
               Daisuke Fujimoto and
               Yu{-}ichi Hayashi},
  title     = {Electromagnetic Information Extortion from Electronic Devices Using
               Interceptor and Its Countermeasure},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {4},
  pages     = {62--90},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i4.62-90},
  doi       = {10.13154/tches.v2019.i4.62-90},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/KinugawaFH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerBR19,
  author    = {Lauren De Meyer and
               Beg{\&quot;{u}}l Bilgin and
               Oscar Reparaz},
  title     = {Consolidating Security Notions in Hardware Masking},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {3},
  pages     = {119--147},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i3.119-147},
  doi       = {10.13154/tches.v2019.i3.119-147},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/MeyerBR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/CheriseyGRP19,
  author    = {Eloi de Ch{\&apos;{e}}risey and
               Sylvain Guilley and
               Olivier Rioul and
               Pablo Piantanida},
  title     = {Best Information is Most Successful Mutual Information and Success
               Rate in Side-Channel Analysis},
  journal   = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume    = {2019},
  number    = {2},
  pages     = {49--79},
  year      = {2019},
  url       = {https://doi.org/10.13154/tches.v2019.i2.49-79},
  doi       = {10.13154/tches.v2019.i2.49-79},
  timestamp = {Thu, 06 Feb 2020 14:52:31 +0100},
  biburl    = {https://dblp.org/rec/journals/tches/CheriseyGRP19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}