Results

Issue 1

Title Artifact
A Faster Third-Order Masking of Lookup Tables Artifact
MCRank: Monte Carlo Key Rank Estimation for Side-Channel Security Evaluations Artifact
SoK: SCA-secure ECC in software – mission impossible? Artifact

Issue 2

Title Artifact
On Protecting SPHINCS+ Against Fault Attacks Artifact
RDS: FPGA Routing Delay Sensors for Effective Remote Power Analysis Attacks Artifact
A Closer Look at the Chaotic Ring Oscillators based TRNG Design Artifact
"Whispering MLaaS" – Exploiting Timing Channels to Compromise User Privacy in Deep Neural Networks Artifact

Issue 3

Title Artifact
Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography Artifact
Oil and Vinegar: Modern Parameters and Implementations Artifact
Formally verifying Kyber – Episode IV: Implementation correctness Artifact
Pasta: A Case for Hybrid Homomorphic Encryption Artifact
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2 Artifact
Separating Oil and Vinegar with a Single Trace – Side-Channel Assisted Kipnis-Shamir Attack on UOV Artifact
Faster Montgomery multiplication and Multi-Scalar-Multiplication for SNARKs Artifact
PROLEAD_SW – Probing-Based Software Leakage Detection for ARM Binaries Artifact
Efficient Regression-Based Linear Discriminant Analysis for Side-Channel Security Evaluations – Towards Analytical Attacks against 32-bit Implementations Artifact