Results

Issue 1

Title Artifact Badge
Multiplying Polynomials without Powerful Multiplication Instructions Artifact πŸ’‘
TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device Artifact βœ…
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits Artifact πŸ’‘
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} Artifact πŸ’‘
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC Artifact πŸ’‘
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation Artifact πŸ’‘
A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin Artifact πŸ’‘
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort Artifact πŸ’‘
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels Artifact πŸ’‘

Issue 2

Title Artifact Badge
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations Artifact πŸ’‘
A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks Artifact πŸ’‘
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs Artifact πŸ’‘
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction Artifact πŸ’‘
Constant time lattice reduction in dimension 4 with application to SQIsign Artifact πŸ’‘
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures Artifact πŸ’‘
Higher-Order Time Sharing Masking Artifact πŸ’‘
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic Artifact πŸ’‘

Issue 3

Title Artifact Badge
Optimal Dimensionality Reduction using Conditional Variational AutoEncoder Artifact πŸ’‘
Adaptive Template Attacks on the Kyber Binomial Sampler Artifact πŸ’‘
Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis Artifact βœ…
Hardware IP Protection through Low-Overhead Fine-Grain Redaction Artifact βœ…
KeyVisor Ҁ“ A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies Artifact βœ…
Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations Artifact πŸ’‘
On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design Artifact πŸ’‘
Accelerating EdDSA Signature Verification with Faster Scalar Size Halving Artifact πŸ’‘
dCTIDH: Fast & Deterministic CTIDH Artifact πŸ’‘
Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code Artifact πŸ’‘
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials Artifact πŸ’‘
Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking Artifact πŸ’‘
Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs Artifact πŸ’‘
Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography Artifact πŸ’‘

Issue 4

Title Artifact Badge
XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering Artifact πŸ’‘
Accelerating NTT with RISC-V Vector Extension for Fully Homomorphic Encryption Artifact πŸ’‘
Entropy extractor based high-throughput post-processings for True Random Number Generators Artifact πŸ’‘
A Fast Heuristic for Mapping Boolean Circuits to Functional Bootstrapping Artifact πŸ’‘
ABE Cubed: Advanced Benchmarking Extensions for ABE Squared Artifact πŸ’‘
pracy: A Practical Compiler for Attribute-Based Encryption in Python Artifact πŸ’‘
Accelerating Hash-Based Polynomial Commitment Schemes with Linear Prover Time Artifact πŸ’‘
ECTester: Reverse-engineering side-channel countermeasures of ECC implementations Artifact πŸ’‘
HADES: Automated Hardware Design Exploration for Cryptographic Primitives Artifact πŸ’‘
Fault Attacks on ECC Signature Verification Artifact πŸ’‘
Generation of Fast Finite Field Arithmetic for Cortex-M4 with ECDH and SQIsign Applications Artifacts Functional Artifact πŸ’‘
Fault Injection Evaluation with Statistical Analysis - How to Deal with Nearly Fabricated Large Circuits Artifact πŸ’‘
Let us walk on the 3-isogeny graph: efficient, fast, and simple Artifact πŸ’‘
Sharing the Mask: TFHE Bootstrapping on Packed Messages Artifact πŸ’‘
Constant-Cycle Hardware Private Circuits Artifact βœ…
Avengers assemble! Supervised learning meets lattice reduction --- A single power trace attack against CRYSTALS-Kyber key generation Artifact πŸ’‘
Masking-Friendly Post-Quantum Signatures in the Threshold-Computation-in-the-Head Framework Artifact πŸ’‘
Faster amortized bootstrapping using the incomplete NTT for free Artifact πŸ’‘
A New Perspective on Key Switching for BGV-like Schemes Artifact πŸ’‘
BASTION: A Framework for Secure Third-Party IP Integration in NoC-based SoC Platforms Artifact πŸ’‘
mid-pSquare: Leveraging the Strong Side-Channel Security of Prime-Field Masking in Software Artifact βœ