Results
Issue 1
| Title | Artifact | Badge |
|---|---|---|
| Multiplying Polynomials without Powerful Multiplication Instructions | Artifact | π‘ |
| TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device | Artifact | β |
| Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits | Artifact | π‘ |
| Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} | Artifact | π‘ |
| FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC | Artifact | π‘ |
| Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation | Artifact | π‘ |
| A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin | Artifact | π‘ |
| Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort | Artifact | π‘ |
| PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels | Artifact | π‘ |
Issue 2
| Title | Artifact | Badge |
|---|---|---|
| KyberSlash: Exploiting secret-dependent division timings in Kyber implementations | Artifact | π‘ |
| A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks | Artifact | π‘ |
| SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs | Artifact | π‘ |
| Designing a General-Purpose 8-bit (T)FHE Processor Abstraction | Artifact | π‘ |
| Constant time lattice reduction in dimension 4 with application to SQIsign | Artifact | π‘ |
| CHERI-Crypt: Transparent Memory Encryption on Capability Architectures | Artifact | π‘ |
| Higher-Order Time Sharing Masking | Artifact | π‘ |
| TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic | Artifact | π‘ |
Issue 3
| Title | Artifact | Badge |
|---|---|---|
| Optimal Dimensionality Reduction using Conditional Variational AutoEncoder | Artifact | π‘ |
| Adaptive Template Attacks on the Kyber Binomial Sampler | Artifact | π‘ |
| Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis | Artifact | β |
| Hardware IP Protection through Low-Overhead Fine-Grain Redaction | Artifact | β |
| KeyVisor Γ’ΒΒ A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies | Artifact | β |
| Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations | Artifact | π‘ |
| On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design | Artifact | π‘ |
| Accelerating EdDSA Signature Verification with Faster Scalar Size Halving | Artifact | π‘ |
| dCTIDH: Fast & Deterministic CTIDH | Artifact | π‘ |
| Letβs DOIT: Using Intelβs Extended HW/SW Contract for Secure Compilation of Crypto Code | Artifact | π‘ |
| ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials | Artifact | π‘ |
| Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking | Artifact | π‘ |
| Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs | Artifact | π‘ |
| Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography | Artifact | π‘ |