Results
Issue 1
Title | Artifact | Badge |
---|---|---|
Multiplying Polynomials without Powerful Multiplication Instructions | Artifact | π‘ |
TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device | Artifact | β |
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits | Artifact | π‘ |
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} | Artifact | π‘ |
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC | Artifact | π‘ |
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation | Artifact | π‘ |
A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin | Artifact | π‘ |
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort | Artifact | π‘ |
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels | Artifact | π‘ |
Issue 2
Title | Artifact | Badge |
---|---|---|
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations | Artifact | π‘ |
A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks | Artifact | π‘ |
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs | Artifact | π‘ |
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction | Artifact | π‘ |
Constant time lattice reduction in dimension 4 with application to SQIsign | Artifact | π‘ |
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures | Artifact | π‘ |
Higher-Order Time Sharing Masking | Artifact | π‘ |
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic | Artifact | π‘ |
Issue 3
Title | Artifact | Badge |
---|---|---|
Optimal Dimensionality Reduction using Conditional Variational AutoEncoder | Artifact | π‘ |
Adaptive Template Attacks on the Kyber Binomial Sampler | Artifact | π‘ |
Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis | Artifact | β |
Hardware IP Protection through Low-Overhead Fine-Grain Redaction | Artifact | β |
KeyVisor Γ’ΒΒ A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies | Artifact | β |
Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations | Artifact | π‘ |
On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design | Artifact | π‘ |
Accelerating EdDSA Signature Verification with Faster Scalar Size Halving | Artifact | π‘ |
dCTIDH: Fast & Deterministic CTIDH | Artifact | π‘ |
Letβs DOIT: Using Intelβs Extended HW/SW Contract for Secure Compilation of Crypto Code | Artifact | π‘ |
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials | Artifact | π‘ |
Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking | Artifact | π‘ |
Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs | Artifact | π‘ |
Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography | Artifact | π‘ |