September 14-18, 2025

Kuala Lumpur, Malaysia

Accepted Papers

TCHES 2025, Issue 1

  1. FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC

    Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria Vazquez, Victor Sucasas, Ajith Suresh
    Technology Innovation Institute; Ruhr University Bochum
    TCHES PDF

  2. Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort

    Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Nascimento Pagliarini
    New York University Abu Dhabi; Fudan University; National Tsing Hua University; Chinese University of Hong Kong; XiDian University; New York University; Tallinn University of Technology; Carnegie Mellon University
    TCHES PDF

  3. TPUXtract: An Exhaustive Hyperparameter Extraction Framework

    Ashley Kurian, Anuj Dubey, Ferhat Yaman, Aydin Aysu
    North Carolina State University
    TCHES PDF

  4. Bit t-SNI Secure Multiplication Gadget for Inner Product Masking

    John Gaspoz, Siemen Dhooghe
    KU Leuven
    TCHES PDF

  5. Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting

    Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu
    Shanghai Jiao Tong University
    TCHES PDF

  6. Multiplying Polynomials without Powerful Multiplication Instructions

    Vincent Hwang, YoungBeom Kim, Seog Chung Seo
    Max Planck Institute for Security and Privacy; Kookmin University
    TCHES PDF

  7. FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation

    Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Qichao Tao, Hanning Wang, Min Zhu, Shaojun Wei, Leibo Liu
    Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co. Ltd.
    TCHES PDF

  8. Call Rewinding: Efficient Backward Edge Protection

    Téo Biton, Olivier Gilles, Daniel Gracia Pérez, Nikolaï Kosmatov, Sébastien Pillement
    Thales Research & Technology; Nantes Université
    TCHES PDF

  9. OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates

    Haiyue Dong, Qian Guo
    Independent Researcher; Lund University
    TCHES PDF

  10. A High-performance NTT/MSM Accelerator for Zero-knowledge Proof Using Load-balanced Fully-pipelined Montgomery Multiplier

    Xiangren Chen, Bohan Yang, Wenping Zhu, Hanning Wang, Qichao Tao, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu
    Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co. Ltd.
    TCHES PDF

  11. GPU Acceleration for FHEW/TFHE Bootstrapping

    Yu Xiao, Feng-Hao Liu, Yu-Te Ku, Ming-Chien Ho, Chih-Fan Hsu, Ming-Ching Chang, Shih-Hao Hung, Wei-Chao Chen
    National Taiwan University; Inventec Corp.; Washington State University; Academia Sinica; University at Albany; Mohamed bin Zayed University of Artificial Intelligence
    TCHES PDF

  12. Extending Randomness-Free First-Order Masking Schemes and Applications to Masking-Friendly S-boxes

    Lixuan Wu, Yanhong Fan, Weijia Wang, Bart Preneel, Meiqin Wang
    Shandong University; KU Leuven
    TCHES PDF

  13. Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

    Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso
    Aurel Vlaicu University of Arad; Université Jean Monnet Saint-Etienne; Centre National de la Recherche Scientifique
    TCHES PDF

  14. PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels

    Pierre AYOUB, Aurélien HERNANDEZ, Romain CAYRE, Aurélien FRANCILLON, Clémentine MAURICE
    EURECOM; Université Lille
    TCHES PDF

  15. Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits

    Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth
    University of Lübeck; Technische Hochschule Lübeck
    TCHES PDF

  16. Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks

    Akira Ito, Rei Ueno, Naofumi Homma
    NTT Social Informatics Laboratories; Kyoto University; Tohoku University
    TCHES PDF

  17. Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

    Xunyue Hu, Quentin Meunier, Emmanuelle Encrenaz
    Sorbonne Université
    TCHES PDF

  18. Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4

    Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez
    Aarhus University; Technology Innovation Institute; Universidade Estadual de Campinas; Radboud University
    TCHES PDF

  19. Random Probing Security with Precomputation

    Bohan Wang, Fanjie Ji, Yiteng Sun, Weijia Wang
    Shandong University
    TCHES PDF

  20. Prover - Toward More Efficient Formal Verification of Masking in Probing Model

    Feng Zhou, Hua Chen, Limin Fan
    University of Chinese Academy of Sciences; Chinese Academy of Sciences
    TCHES PDF

  21. A Framework for Generating S-Box Circuits with Boyar–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin

    Jongsung Kim, Yongjin Jeon, Seungjun Baek, Giyoon Kim
    Kookmin University
    TCHES PDF

  22. Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

    Jipeng Zhang, Yuxing Yan, Junhao Huang, Cetin Kaya Koc
    Nanjing University of Aeronautics and Astronautics; Shanghai Aerospace Electronic Technology Institute; Hong Kong Baptist University; Iğdır University; University of California Santa Barbara
    TCHES PDF

  23. Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters

    Vedad Hadžić, Roderick Bloem
    Graz University of Technology
    TCHES PDF

TCHES 2025, Issue 2

  1. Improving MPCitH with Preprocessing: Mask Is All You Need

    Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang
    Shandong University; Tsinghua University
    TCHES PDF

  2. MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4

    Fan Huang, Xiaolin Duan, Chengcong Hu, Mengce Zheng, Honggang Hu
    University of Science and Technology of China; Zhejiang Wanli University
    TCHES PDF

  3. SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities

    Jinling Tang, Haixia Xu, Huimei Liao, Yinchang Zhou
    Chinese Academy of Sciences; University of Chinese Academy of Sciences
    TCHES PDF

  4. Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information

    Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
    Ruhr University Bochum; University of Klagenfurt
    TCHES PDF

  5. TFHE Gets Real: An Efficient and Flexible Homomorphic Floating-Point Arithmetic

    Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
    Centre National de la Recherche Scientifique; Zama
    TCHES PDF

  6. REED: Chiplet-based Accelerator for Fully Homomorphic Encryption

    Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
    Graz University of Technology; Samsung Advanced Institute of Technology
    TCHES PDF

  7. KyberSlash: Exploiting Secret-Dependent Division Timings in Kyber Implementations

    Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada
    University of Illinois at Chicago; Academia Sinica; Inria; Cryspen; Nanyang Technological University; Quantum Safe Migration Center; Chelpis Quantum Corp; University of Sao Paulo
    TCHES PDF

  8. Higher-Order Time Sharing Masking

    Dilip Kumar Shanmugasundaram Veeraraghavan, Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
    KU Leuven
    TCHES PDF

  9. CHERI-Crypt: Transparent Memory Encryption on Capability Architectures

    Jennifer Jackson, Minmin Jiang, David Oswald
    University of Birmingham
    TCHES PDF

  10. A Code-Based ISE to Protect Boolean Masking in Software

    Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weijia Wang
    Shandong University; University of Bristol
    TCHES PDF

  11. Leading Degree: A Metric for Model Performance Evaluation and Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis

    Junfan Zhu, Jiqiang Lu
    Beihang University
    TCHES PDF

  12. Sieving with Streaming Memory Access

    Ziyu Zhao, Jintai Ding, Bo-Yin Yang
    Tsinghua University; Xi'an Jiaotong-Liverpool University; Basque Center For Applied Mathematics; Academia Sinica
    TCHES PDF

  13. Shortcut2Secrets: A Table-based Differential Fault Attack Framework

    Weizhe Wang, Pierrick Méaux, Deng Tang
    Shanghai Jiao Tong University; University of Luxembourg
    TCHES PDF

  14. All-You-Can-Compute: Packed Secret Sharing for Combined Resilience

    Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao
    Technical University of Darmstadt
    TCHES PDF

  15. Protection of Oscillator-Based PUFs against Side Channel Analyses by Random Interruption

    Holger Mandry, Jonas Ruchti, Julius Nowakowski, Michael Pehl, Maurits Ortmanns
    University of Ulm; University of Munich
    TCHES PDF

  16. OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM

    Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, Ingrid Verbauwhede
    KU Leuven
    TCHES PDF

  17. Constant time lattice reduction in dimension 4 with application to SQIsign

    Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler
    Eötvös Loránd University; Technology Innovation Institute; University of Birmingham; ETH Zürich; IBM Research Europe
    TCHES PDF

  18. Designing a General-Purpose 8-bit (T)FHE Processor Abstraction

    Daphné Trama, Renaud Sirdey, Aymen Boudguiga, Pierre-Emmanuel Clet, Nicolas Ye
    CEA LIST; Université Paris-Saclay
    TCHES PDF

  19. A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks

    Aric Fowler, Shayan Mohammed, Mustafa Shihab, Thomas Broadfoot, Peter Beerel, Carl Sechen, Yiorgos Makris
    University of Texas at Dallas; University of Southern California
    TCHES PDF

  20. Information Theoretic Analysis of PUF-Based Tamper Protection

    Georg Maringer, Matthias Hiller
    Technical University of Munich; Fraunhofer AISEC
    TCHES PDF

  21. Rudraksh: A Compact and Lightweight Post-Quantum Key-Encapsulation Mechanism

    Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede
    KU Leuven; Purdue University; Indian Institute of Technology Kanpur
    TCHES PDF

  22. SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs

    Rui Jiang, Cong Peng, Min Luo, Rongmao Chen, Debiao He
    Wuhan University; National University of Defense Technology
    TCHES PDF

  23. AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme

    Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mustafizar Rahman, Kosei Sakamoto
    University of Lugano; lowRISC C.I.C.; University of Hyogo; Mitsubishi Electric Corporation
    TCHES PDF

  24. Skyscraper: Fast Hashing on Big Primes

    Fabian Schmid, Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger
    University of Technology Graz; Ruhr University Bochum; Ethereum Foundation; Fabric Cryptography
    TCHES PDF

  25. New Quantum Cryptanalysis of Binary Elliptic Curves

    Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo
    Hansung University; Indian Institute of Technology Madras; Nanyang Technological University
    TCHES PDF

TCHES 2025, Issue 3

  1. KeyVisor – A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies

    Fabian Schwarz, Jan Philipp Thoma, Christian Rossow, Tim Güneysu
    CISPA Helmholtz Center for Information Security; Ruhr University Bochum
    TCHES PDF

  2. On the Average Random Probing Model

    Julien Béguinot, Loïc Masure
    Institut Polytechnique de Paris; Montpellier Laboratory of Computer Science, Robotics, and Microelectronics
    TCHES PDF

  3. Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking

    Nathan Rousselot, Karine Heydemann, Loïc Masure, Vincent Migairou
    Thales; Montpellier Laboratory of Computer Science, Robotics, and Microelectronics
    TCHES PDF

  4. VeloFHE: GPU Acceleration for FHEW and TFHE Bootstrapping

    Shiyu Shen, Hao Yang, Zhe Liu, Ying Liu, Xianhui Lu, Wangchen Dai, Lu Zhou, Yunlei Zhao, Ray C. C. Cheung
    City University of Hong Kong; Zhejiang Lab; Chinese Academy of Sciences; Sun Yat-sen University; Nanjing University of Aeronautics and Astronautics; Fudan University
    TCHES PDF

  5. TREE: Bridging the gap between reconfigurable computing and secure execution

    Sérgio Pereira, Tiago Gomes, Jorge Cabral, Sandro Pinto
    University of Minho
    TCHES PDF

  6. Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations

    Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, Henrique S. Ogawa
    LG Electronics; Universidade de Sao Paulo
    TCHES PDF

  7. Optimal Dimensionality Reduction using Conditional Variational AutoEncoder

    Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, Gabriel Zaid
    Institut Polytechnique de Paris; Thales; Inria; ANSSI
    TCHES PDF

  8. Code-based Masking: From Fields to Bits Bitsliced Higher-Order Masked SKINNY

    John Gaspoz, Siemen Dhooghe
    KU Leuven
    TCHES PDF

  9. On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design

    Ziheng Ma, Bohan Yang, Wenping Zhu, Hanning Wang, Yi Ouyang, Min Zhu, Leibo Liu
    Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co., Ltd.
    TCHES PDF

  10. POTA: A Pipelined Oblivious Transfer Acceleration Architecture for Secure Multi-Party Computation

    Xiaolin Li, Wei Yan, Yong Zhang, Hongwei Liu, Qinfen Hao, Yong Liu, Ninghui Sun
    Chinese Academy of Sciences; Zhongguancun Laboratory
    TCHES PDF

  11. FINAL bootstrap acceleration on FPGA using DSP-free constant-multiplier NTTs

    Jonas Bertels, Hilder V. L. Pereira, Ingrid Verbauwhede
    KU Leuven; University of Campinas
    TCHES PDF

  12. All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions

    Rei Ueno, Akira Ito, Yosuke Todo, Akiko Inoue, Kazuhiko Minematsu, Hibiki Ishikawa, Naofumi Homma
    Kyoto University; NTT Social Informatics Laboratories; NEC; Tohoku University
    TCHES PDF

  13. A5/3 make or break: A massively parallel FPGA architecture for exhaustive key search

    Konstantina Miteloudi, Lejla Batina, Nele Mentens
    Radboud University; KU Leuven; Leiden University
    TCHES PDF

  14. Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis

    Davide Galli, Giuseppe Chiari, Davide Zoni
    Politecnico di Milano
    TCHES PDF

  15. HRaccoon: A High-performance Configurable SCA Resilient Raccoon Hardware Accelerator

    Ziying Ni, Ayesha Khalid, Zhaoyu Zhang, Yijun Cui, Weiqiang Liu, Maire O'Neill
    Queen's University Belfast; Nanjing University of Aeronautics and Astronautics
    TCHES PDF

  16. Cymric: Short-tailed but MightyBeyond-birthday-bound Secure Authenticated Encryption for Short Inputs

    Alexandre Adomnicăi, Wonseok Choi, Yeongmin Lee, Kazuhiko Minematsu, Yusuke Naito
    Purdue University West Lafayette; Georgia Institute of Technology; DESILO Inc.; NEC Corporation; Mitsubishi Electric Corporation
    TCHES PDF

  17. Adaptive Template Attacks on the Kyber Binomial Sampler

    Eric Chun-Yu Peng, Markus G. Kuhn
    University of Cambridge
    TCHES PDF

  18. Accelerating EdDSA Signature Verification with Faster Scalar Size Halving

    Muhammad ElSheikh, Irem Keskinkurt Paksoy, Murat Cenk, M. Anwar Hasan
    University of Waterloo; National Institute of Standards; Ripple Labs Inc.
    TCHES PDF

  19. dCTIDH: Fast & Deterministic CTIDH

    Fabio Campos, Andreas Hellenbrand, Michael Meyer, Krijn Reijnders
    Darmstadt University of Applied Sciences; RheinMain University of Applied Sciences; University of Regensburg; Radboud University
    TCHES PDF

  20. Design and Implementation of a Physically Secure Open-Source FPGA and Toolchain

    Sergej Meschkov, Daniel Lammers, Mehdi Tahoori, Amir Moradi
    Karlsruhe Institute of Technology; Ruhr University Bochum; TU Darmstadt
    TCHES PDF

  21. SoK: FHE-Friendly Symmetric Ciphers and Transciphering

    Chao Niu, Benqiang Wei, Zhicong Huang, Zhaomin Yang, Cheng Hong, Meiqin Wang, Tao Wei
    Ant Group; Shandong University
    TCHES PDF

  22. ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials

    Anup Kumar Kundu, Shibam Ghosh, Aikata Aikata, Dhiman Saha
    Indian Statistical Institute; University Of Haifa; Graz University of Technology; Indian Institute of Technology
    TCHES PDF

  23. Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code

    Santiago Arranz Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, Peter Schwabe
    Max Planck Institute for Security and Privacy; IMDEA Software Institute; Inria; Masaryk University; SandboxAQ; Radboud University
    TCHES PDF

  24. Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography

    Chun-Ming Chiu, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
    National Taiwan University; Chinese Academy of Sciences; National Taiwan University of Science and Technology; Academia Sinica
    TCHES PDF

  25. Practical Opcode-based Fault Attack on AES-NI

    Xue Gong, Xin Zhang, Qianmei Wu, Fan Zhang, Junge Xu, Qingni Shen, Zhi Zhang
    Zhejiang University; Peking University; University of Western Australia
    TCHES PDF

  26. Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study

    Corentin Verhamme, Charles Momin, Francois-Xavier Standaert
    UCLouvain
    TCHES PDF

  27. Secure and efficient transciphering for FHE-based MPC

    Diego F. Aranha, Antonio Guimarães, Clément Hoffmann, Pierrick Méaux
    Aarhus University; IMDEA Software Institute; UCLouvain; University of Luxembourg
    TCHES PDF

  28. HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction

    Aritra Dasgupta, Sudipta Paria, Swarup Bhunia
    University of Florida
    TCHES PDF