September 10-14, 2023

Prague, Czech Republic

Accepted Posters

  1. A Combined Attack on CAPA

    Dilara Toprakhisar; Svetla Nikova; Ventzislav Nikov
    imec-COSIC, ESAT, KU Leuven, Belgium; NXP Semiconductors, Belgium

  2. Threshold Implementations with Non-Uniform Inputs

    Siemen Dhooghe; Artemii Ovchinnikov
    imec-COSIC, ESAT, KU Leuven, Belgium

  3. Python Elliptic Curve Side-Channel Analysis toolkit

    Jan Jancar
    Faculty of Informatics, Masaryk University, Czech Republic

  4. PQC Cloudization: Rapid Prototyping of Scalable NTT/INTT Architecture to Accelerate Kyber

    Mojtaba Bisheh-Niasar; Daniel Lo; Anjana Parthasarathy; Blake Pelton
    Microsoft, USA

  5. Deep Learning-Based Non-Deterministic Compression Method Preserving Mostly Side-Channel Leakage Characteristic

    Sangyun Jung; Sunghyun Jin; HeeSeok Kim
    Department of Cyber Security, Korea University, Republic of Korea; Samsung Electronics

  6. First-order Low-latency Masked SPEEDY Cipher in Hardware

    Zhenda Zhang; Svetla Nikova
    imec-COSIC, ESAT, KU Leuven, Belgium

  7. Optimal and Side-Channel resistant Post-Quantum TLS1.3 as part of wolfSSL for ARMv7-M

    Mila Anastasova; Reza Azarderakhsh; Mehran Mozaffari Kermani
    Florida Atlantic University, USA

  8. Shuffling is not secure in the random probing model

    Siemen Dhooghe; Svetla Nikova
    imec-COSIC, ESAT, KU Leuven, Belgium

  9. A Thorough Evaluation of RAMBAM

    Daniel Lammers; Amir Moradi; Nicolai Müller; Aein Rezaei Shahmirzadi
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany

  10. Proper Evaluation of Glitch-free Masked Circuits

    Nicolai Müller; Daniel Lammers; Amir Moradi
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany

  11. Static Leakage in Dual-Rail Precharge Logics

    Bijan Fadaeinia; Amir Moradi
    Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany

  12. MAFIA: Protecting the Microarchitecture of Embedded Systems Against Fault Injection Attacks

    Thomas Chamelot; Damien Couroussé; Karine Heydemann
    Université Grenoble Alpes, CEA, List, France; Sorbonne Université, CNRS, LIP6, Paris, France; Thales DIS, France

  13. Post-Quantum Cryptography Algorithm improved with a NMC-based Vectorial Co-Processor

    Maria Ramirez Corrales; Emanuele Valea; Jean-Philippe Noel
    Université Grenoble Alpes, CEA, List, France

  14. A Tale of Resilience: On the Practical Security of Masked Software Implementations

    Lorenzo Casalino; Nicolas Belleville; Damien Couroussé; Karine Heydemann
    Université Grenoble Alpes, CEA, List, France; Thales DIS, France; Sorbonne Université, CNRS, LIP6, Paris, France

  15. Secure, Optimized and Agile HW/SW Implementation for Post-quantum Cryptography

    Mikael Carmona; Antoine Loiseau; Simon Pontié; Antonio Ras; Guénaël Renault; Benjamin Smith; Emanuele Valea
    CEA-Leti, Grenoble, France; CEA-List, Grenoble, France; LIX, INRIA, CNRS IP Paris, France; ANSII, Paris, France; Equipe Commune CEA Leti-Mines Saint-Etienne, Gardanne, France