Results
Issue 1
| Title | Artifact | Badge |
|---|---|---|
| Who Watches the Watchers: Attacking Glitch Detection Circuits | Artifact | 🏆 |
| Smooth Passage with the Guards: Second-Order Hardware Masking of the AES with Low Randomness and Low Latency | Artifact | 🏆 |
| A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps | Artifact | 💡 |
| Low Cost and Precise Jitter Measurement Method for TRNG Entropy Assessment | Artifact | 🏆 |
| Gadget-based Masking of Streamlined NTRU Prime Decapsulation in Hardware | Artifact | 🏆 |
| Fast and Clean: Auditable high-performance assembly via constraint solving | Artifact | 🏆 |
| CalyPSO: An Enhanced Search Optimization based Framework to Model Delay-based PUFs | Artifact | ✅ |
Issue 2
| Title | Artifact | Badge |
|---|---|---|
| Revisiting Keccak and Dilithium Implementations on ARMv7-M | Artifact | 🏆 |
| Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm | Artifact | 💡 |
| Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays | Artifact | ✅ |
| Impact of the Flicker Noise on the Ring Oscillator-based TRNGs | Artifact | 🏆 |
| A Low-Latency High-Order Arithmetic to Boolean Masking Conversion | Artifact | 🏆 |
| High-Performance Design Patterns and File Formats for Side-Channel Analysis | Artifact | 💡 |
| Nibbling MAYO: Optimized Implementations for AVX2 and Cortex-M4 | Artifact | 🏆 |
| OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element | Artifact | 💡 |
| JustSTART: How to Find an RSA Authentication Bypass on Xilinx UltraScale(+) with Fuzzing | Artifact | 💡 |
| TPMScan: A wide-scale study of security-relevant properties of TPM 2.0 chips | Artifact | 🏆 |
Issue 3
| Title | Artifact | Badge |
|---|---|---|
| Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA | Artifact | ✅ |
| Correction Fault Attacks on Randomized CRYSTALS-Dilithium | Artifact | 💡 |
| Time Sharing - A Novel Approach to Low-Latency Masking | Artifact | 💡 |
| Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications | Artifact | ✅ |
| Low-Latency Masked Gadgets Robust against Physical Defaults with Application to Ascon | Artifact | 🏆 |
| COMPRESS: Generate Small and Fast Masked Pipelined Circuits | Artifact | 🏆 |
Issue 4
| Title | Artifact | Badge |
|---|---|---|
| SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning | Artifact | ✅ |
| Breaking Ground: A New Area Record for Low-Latency First-Order Masked SHA-3 | Artifact | 🏆 |
| pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis | Artifact | 🏆 🥇 |
| Fault-Resistant Partitioning of Secure CPUs for System Co-Verification against Faults | Artifact | 🏆 |
| Improved Circuit Synthesis with Multi-Value Bootstrapping for FHEW-like Schemes | Artifact | 💡 |
| Phase Modulation Side Channels: Jittery JTAG for On-Chip Voltage Measurements | Artifact | 🏆 |
| Robust but Relaxed Probing Model | Artifact | 🏆 |