Results

Title Artifact
Compact Dilithium Implementations on Cortex-M3 and Cortex-M4 Artifact
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Artifact
The design of scalar AES Instruction Set Extensions for RISC-V Artifact
Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4 Artifact
The Area-Latency Symbiosis: Towards Improved Serial Encryption Circuits Artifact
Fixslicing AES-like ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V Artifact
NTT Multiplication for NTT-unfriendly Rings: New Speed Records for Saber and NTRU on Cortex-M4 and AVX2 Artifact
Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification Artifact
MFault Attacks on CCA-secure Lattice KEMs Artifact
Time-Memory Analysis of Parallel Collision Search Algorithms Artifact
Online Template Attacks: Revisited: PoC: emulated single-trace attack on wolfSSL scalar multiplication Artifact
Optimizing BIKE for the Intel Haswell and ARM Cortex-M4 Artifact
Breaking Masked Implementations with Many Shares on 32-bit Software Platforms: or When the Security Order Does Not Matter Artifact
Breaking CAS-Lock and Its Variants by Exploiting Structural Traces Artifact
ROTed: Random Oblivious Transfer for embedded devices Artifact
FIVER – Robust Verification of Countermeasures against Fault Injections Artifact
Side-Channel Protections for Picnic Signatures Artifact
Rainbow on Cortex-M4 Artifact
Higher-Order Lookup Table Masking in Essentially Constant Memory Artifact
CTIDH: faster constant-time CSIDH Artifact