| 2017 | A Side-Channel Assisted Cryptanalytic Attack Against QcBits. Melissa Rossi, Mike Hamburg, Michael Hutter, Mark E. Marson |
| 2017 | A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks. Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert |
| 2017 | Back to Massey: Impressively Fast, Scalable and Tight Security Evaluation Tools. Marios O. Choudary, Pantelimon George Popescu |
| 2017 | Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives - Applications to AES, PRESENT and SKINNY. Jérémy Jean, Amir Moradi, Thomas Peyrin, Pascal Sasdrich |
| 2017 | Blockcipher-Based Authenticated Encryption: How Small Can We Go? Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi |
| 2017 | CacheZoom: How SGX Amplifies the Power of Cache Attacks. Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth |
| 2017 | Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing. Joan Daemen |
| 2017 | Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. Eleonora Cagli, Cécile Dumas, Emmanuel Prouff |
| 2017 | Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings Wieland Fischer, Naofumi Homma |
| 2017 | FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes. Wen Wang, Jakub Szefer, Ruben Niederhagen |
| 2017 | Fast Leakage Assessment. Oscar Reparaz, Benedikt Gierlichs, Ingrid Verbauwhede |
| 2017 | Faster Homomorphic Function Evaluation Using Non-integral Base Encoding. Charlotte Bonte, Carl Bootland, Joppe W. Bos, Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren |
| 2017 | Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo |
| 2017 | GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo |
| 2017 | Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures. Dahmun Goudarzi, Matthieu Rivain, Damien Vergnaud, Srinivas Vivek |
| 2017 | Gimli : A Cross-Platform Permutation. Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier |
| 2017 | Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks. Luka Malisa, Kari Kostiainen, Thomas Knell, David M. Sommer, Srdjan Capkun |
| 2017 | Hiding Secrecy Leakage in Leaky Helper Data. Matthias Hiller, Aysun Gurur Önalan |
| 2017 | High-Order Conversion from Boolean to Arithmetic Masking. Jean-Sébastien Coron |
| 2017 | High-Speed Key Encapsulation from NTRU. Andreas Hülsing, Joost Rijneveld, John M. Schanck, Peter Schwabe |
| 2017 | How to Break Secure Boot on FPGA SoCs Through Malicious Hardware. Nisha Jacob, Johann Heyszl, Andreas Zankl, Carsten Rolfes, Georg Sigl |
| 2017 | Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. Hocheol Shin, Dohyun Kim, Yujin Kwon, Yongdae Kim |
| 2017 | Improved Blind Side-Channel Analysis by Exploitation of Joint Distributions of Leakages. Christophe Clavier, Léo Reynaud |
| 2017 | Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices. Björn Haase, Benoît Labrique |
| 2017 | McBits Revisited. Tung Chou |
| 2017 | Nanofocused X-Ray Beam to Reprogram Secure Circuits. Stéphanie Anceau, Pierre Bleuet, Jessy Clédière, Laurent Maingault, Jean-Luc Rainard, Rémi Tucoulou |
| 2017 | Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks. Xiaolin Xu, Bicky Shakya, Mark Tehranipoor, Domenic Forte |
| 2017 | On the Security of Carrier Phase-Based Ranging. Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun |
| 2017 | PRESENT Runs Fast - Efficient and Secure Implementation in Software. Tiago B. S. Reis, Diego F. Aranha, Julio López |
| 2017 | Reconciling d+1 Masking in Hardware and Software. Hannes Groß, Stefan Mangard |
| 2017 | Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. Robert Primas, Peter Pessl, Stefan Mangard |
| 2017 | Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom |
| 2017 | Very High Order Masking: Efficient Implementation and Security Evaluation. Anthony Journault, François-Xavier Standaert |
| 2017 | Your Rails Cannot Hide from Localized EM: How Dual-Rail Logic Fails on FPGAs. Vincent Immler, Robert Specht, Florian Unterstein |