Results

Issue 1

Title Artifact Badge
Multiplying Polynomials without Powerful Multiplication Instructions Artifact πŸ’‘
TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device Artifact βœ…
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits Artifact πŸ’‘
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V} Artifact πŸ’‘
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC Artifact πŸ’‘
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation Artifact πŸ’‘
A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin Artifact πŸ’‘
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort Artifact πŸ’‘
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels Artifact πŸ’‘

Issue 2

Title Artifact Badge
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations Artifact πŸ’‘
A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks Artifact πŸ’‘
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs Artifact πŸ’‘
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction Artifact πŸ’‘
Constant time lattice reduction in dimension 4 with application to SQIsign Artifact πŸ’‘
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures Artifact πŸ’‘
Higher-Order Time Sharing Masking Artifact πŸ’‘
TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic Artifact πŸ’‘

Issue 3

Title Artifact Badge
Optimal Dimensionality Reduction using Conditional Variational AutoEncoder Artifact πŸ’‘
Adaptive Template Attacks on the Kyber Binomial Sampler Artifact πŸ’‘
Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis Artifact βœ…
Hardware IP Protection through Low-Overhead Fine-Grain Redaction Artifact βœ…
KeyVisor Ҁ“ A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies Artifact βœ…
Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations Artifact πŸ’‘
On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design Artifact πŸ’‘
Accelerating EdDSA Signature Verification with Faster Scalar Size Halving Artifact πŸ’‘
dCTIDH: Fast & Deterministic CTIDH Artifact πŸ’‘
Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code Artifact πŸ’‘
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials Artifact πŸ’‘
Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking Artifact πŸ’‘
Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs Artifact πŸ’‘
Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography Artifact πŸ’‘