September 14-18, 2025

Kuala Lumpur, Malaysia

Accepted Papers

TCHES 2025, Issue 1

  1. FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC

    Najwa Aaraj, abdelrahaman aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria Vazquez, Victor Sucasas, Ajith Suresh
    Technology Innovation Institute; Ruhr University Bochum
    TCHES PDF

  2. Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort

    Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Nascimento Pagliarini
    New York University Abu Dhabi; Fudan University; National Tsing Hua University; Chinese University of Hong Kong; XiDian University; New York University; Tallinn University of Technology; Carnegie Mellon University
    TCHES PDF

  3. TPUXtract: An Exhaustive Hyperparameter Extraction Framework

    Ashley Kurian, Anuj Dubey, Ferhat Yaman, Aydin Aysu
    North Carolina State University
    TCHES PDF

  4. Bit t-SNI Secure Multiplication Gadget for Inner Product Masking

    John Gaspoz, Siemen Dhooghe
    KU Leuven
    TCHES PDF

  5. Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting

    Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu
    Shanghai Jiao Tong University
    TCHES PDF

  6. Multiplying Polynomials without Powerful Multiplication Instructions

    Vincent Hwang, YoungBeom Kim, Seog Chung Seo
    Max Planck Institute for Security and Privacy; Kookmin University
    TCHES PDF

  7. FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation

    Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Qichao Tao, Hanning Wang, Min Zhu, Shaojun Wei, Leibo Liu
    Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co. Ltd.
    TCHES PDF

  8. Call Rewinding: Efficient Backward Edge Protection

    Téo Biton, Olivier Gilles, Daniel Gracia Pérez, Nikolaï Kosmatov, Sébastien Pillement
    Thales Research & Technology; Nantes Université
    TCHES PDF

  9. OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates

    Haiyue Dong, Qian Guo
    Independent Researcher; Lund University
    TCHES PDF

  10. A High-performance NTT/MSM Accelerator for Zero-knowledge Proof Using Load-balanced Fully-pipelined Montgomery Multiplier

    Xiangren Chen, Bohan Yang, Wenping Zhu, Hanning Wang, Qichao Tao, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu
    Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co. Ltd.
    TCHES PDF

  11. GPU Acceleration for FHEW/TFHE Bootstrapping

    Yu Xiao, Feng-Hao Liu, Yu-Te Ku, Ming-Chien Ho, Chih-Fan Hsu, Ming-Ching Chang, Shih-Hao Hung, Wei-Chao Chen
    National Taiwan University; Inventec Corp.; Washington State University; Academia Sinica; University at Albany; Mohamed bin Zayed University of Artificial Intelligence
    TCHES PDF

  12. Extending Randomness-Free First-Order Masking Schemes and Applications to Masking-Friendly S-boxes

    Lixuan Wu, Yanhong Fan, Weijia Wang, Bart Preneel, Meiqin Wang
    Shandong University; KU Leuven
    TCHES PDF

  13. Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation

    Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso
    Aurel Vlaicu University of Arad; Université Jean Monnet Saint-Etienne; Centre National de la Recherche Scientifique
    TCHES PDF

  14. PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels

    Pierre AYOUB, Aurélien HERNANDEZ, Romain CAYRE, Aurélien FRANCILLON, Clémentine MAURICE
    EURECOM; Université Lille
    TCHES PDF

  15. Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits

    Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth
    University of Lübeck; Technische Hochschule Lübeck
    TCHES PDF

  16. Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks

    Akira Ito, Rei Ueno, Naofumi Homma
    NTT Social Informatics Laboratories; Kyoto University; Tohoku University
    TCHES PDF

  17. Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training

    Xunyue Hu, Quentin Meunier, Emmanuelle Encrenaz
    Sorbonne Université
    TCHES PDF

  18. Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4

    Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez
    Aarhus University; Technology Innovation Institute; Universidade Estadual de Campinas; Radboud University
    TCHES PDF

  19. Random Probing Security with Precomputation

    Bohan Wang, Fanjie Ji, Yiteng Sun, Weijia Wang
    Shandong University
    TCHES PDF

  20. Prover - Toward More Efficient Formal Verification of Masking in Probing Model

    Feng Zhou, Hua Chen, Limin Fan
    University of Chinese Academy of Sciences; Chinese Academy of Sciences
    TCHES PDF

  21. A Framework for Generating S-Box Circuits with Boyer–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin

    Jongsung Kim, Yongjin Jeon, Seungjun Baek, Giyoon Kim
    Kookmin University
    TCHES PDF

  22. Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}

    Jipeng Zhang, Yuxing Yan, Junhao Huang, Cetin Kaya Koc
    Nanjing University of Aeronautics and Astronautics; Shanghai Aerospace Electronic Technology Institute; Hong Kong Baptist University; Iğdır University; University of California Santa Barbara
    TCHES PDF

  23. Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters

    Vedad Hadžić, Roderick Bloem
    Graz University of Technology
    TCHES PDF