Results
Issue 1
| Title | Artifact | Badge |
|---|---|---|
| Multiplying Polynomials without Powerful Multiplication Instructions | Artifact | π‘ |
| TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device | Artifact | β |
| Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits | Artifact | π‘ |
| Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} | Artifact | π‘ |
| FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC | Artifact | π‘ |
| Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation | Artifact | π‘ |
| A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin | Artifact | π‘ |
| Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort | Artifact | π‘ |
| PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels | Artifact | π‘ |
Issue 2
| Title | Artifact | Badge |
|---|---|---|
| KyberSlash: Exploiting secret-dependent division timings in Kyber implementations | Artifact | π‘ |
| A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks | Artifact | π‘ |
| SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs | Artifact | π‘ |
| Designing a General-Purpose 8-bit (T)FHE Processor Abstraction | Artifact | π‘ |
| Constant time lattice reduction in dimension 4 with application to SQIsign | Artifact | π‘ |
| CHERI-Crypt: Transparent Memory Encryption on Capability Architectures | Artifact | π‘ |
| Higher-Order Time Sharing Masking | Artifact | π‘ |
| TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic | Artifact | π‘ |
Issue 3
| Title | Artifact | Badge |
|---|---|---|
| Optimal Dimensionality Reduction using Conditional Variational AutoEncoder | Artifact | π‘ |
| Adaptive Template Attacks on the Kyber Binomial Sampler | Artifact | π‘ |
| Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis | Artifact | β |
| Hardware IP Protection through Low-Overhead Fine-Grain Redaction | Artifact | β |
| KeyVisor Γ’ΒΒ A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies | Artifact | β |
| Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations | Artifact | π‘ |
| On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design | Artifact | π‘ |
| Accelerating EdDSA Signature Verification with Faster Scalar Size Halving | Artifact | π‘ |
| dCTIDH: Fast & Deterministic CTIDH | Artifact | π‘ |
| Letβs DOIT: Using Intelβs Extended HW/SW Contract for Secure Compilation of Crypto Code | Artifact | π‘ |
| ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials | Artifact | π‘ |
| Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking | Artifact | π‘ |
| Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs | Artifact | π‘ |
| Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography | Artifact | π‘ |
Issue 4
| Title | Artifact | Badge |
|---|---|---|
| XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering | Artifact | π‘ |
| Accelerating NTT with RISC-V Vector Extension for Fully Homomorphic Encryption | Artifact | π‘ |
| Entropy extractor based high-throughput post-processings for True Random Number Generators | Artifact | π‘ |
| A Fast Heuristic for Mapping Boolean Circuits to Functional Bootstrapping | Artifact | π‘ |
| ABE Cubed: Advanced Benchmarking Extensions for ABE Squared | Artifact | π‘ |
| pracy: A Practical Compiler for Attribute-Based Encryption in Python | Artifact | π‘ |
| Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time | Artifact | π‘ |
| ECTester: Reverse-engineering side-channel countermeasures of ECC implementations | Artifact | π‘ |
| HADES: Automated Hardware Design Exploration for Cryptographic Primitives | Artifact | π‘ |
| Fault Attacks on ECC Signature Verification | Artifact | π‘ |
| Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications Artifacts Functional | Artifact | π‘ |
| Fault Injection Evaluation with Statistical Analysis - How to Deal with Nearly Fabricated Large Circuits | Artifact | π‘ |
| Let us walk on the 3-isogeny graph: efficient, fast, and simple | Artifact | π‘ |
| Sharing the Mask: TFHE Bootstrapping on Packed Messages | Artifact | π‘ |
| Constant-Cycle Hardware Private Circuits | Artifact | β |
| Avengers assemble! Supervised learning meets lattice reduction --- A single power trace attack against CRYSTALS-Kyber key generation | Artifact | π‘ |
| Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework | Artifact | π‘ |
| Faster amortized bootstrapping using the incomplete NTT for free | Artifact | π‘ |
| A New Perspective on Key Switching for BGV-like Schemes | Artifact | π‘ |
| BASTION: A Framework for Secure Third-Party IP Integration in NoC-based SoC Platforms | Artifact | π‘ |
| mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software | Artifact | β |