Accepted Papers
TCHES 2025, Issue 1
-
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC
Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria Vazquez, Victor Sucasas, Ajith Suresh
Technology Innovation Institute; Ruhr University Bochum
TCHES PDF -
Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
Johann Knechtel, Mohammad Eslami, Peng Zou, Min Wei, Xingyu Tong, Binggang Qiu, Zhijie Cai, Guohao Chen, Benchao Zhu, Jiawei Li, Jun Yu, Jianli Chen, Chun-Wei Chiu, Min-Feng Hsieh, Chia-Hsiu Ou, Ting-Chi Wang, Bangqi Fu, Qijing Wang, Yang Sun, Qin Luo, Anthony W. H. Lau, Fangzhou Wang, Evangeline F. Y. Young, Shunyang Bi, Guangxin Guo, Haonan Wu, Zhengguang Tang, Hailong You, Cong Li, Ramesh Karri, Ozgur Sinanoglu, Samuel Nascimento Pagliarini
New York University Abu Dhabi; Fudan University; National Tsing Hua University; Chinese University of Hong Kong; XiDian University; New York University; Tallinn University of Technology; Carnegie Mellon University
TCHES PDF -
TPUXtract: An Exhaustive Hyperparameter Extraction Framework
Ashley Kurian, Anuj Dubey, Ferhat Yaman, Aydin Aysu
North Carolina State University
TCHES PDF -
Bit t-SNI Secure Multiplication Gadget for Inner Product Masking
-
Trace Copilot: Automatically Locating Cryptographic Operations in Side-Channel Traces by Firmware Binary Instrumenting
Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, Dawu Gu
Shanghai Jiao Tong University
TCHES PDF -
Multiplying Polynomials without Powerful Multiplication Instructions
Vincent Hwang, YoungBeom Kim, Seog Chung Seo
Max Planck Institute for Security and Privacy; Kookmin University
TCHES PDF -
FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation
Yi Ouyang, Yihong Zhu, Wenping Zhu, Bohan Yang, Zirui Zhang, Qichao Tao, Hanning Wang, Min Zhu, Shaojun Wei, Leibo Liu
Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co. Ltd.
TCHES PDF -
Call Rewinding: Efficient Backward Edge Protection
Téo Biton, Olivier Gilles, Daniel Gracia Pérez, Nikolaï Kosmatov, Sébastien Pillement
Thales Research & Technology; Nantes Université
TCHES PDF -
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Haiyue Dong, Qian Guo
Independent Researcher; Lund University
TCHES PDF -
A High-performance NTT/MSM Accelerator for Zero-knowledge Proof Using Load-balanced Fully-pipelined Montgomery Multiplier
Xiangren Chen, Bohan Yang, Wenping Zhu, Hanning Wang, Qichao Tao, Shuying Yin, Min Zhu, Shaojun Wei, Leibo Liu
Tsinghua University; Wuxi Micro Innovation Integrated Circuit Design Co. Ltd.
TCHES PDF -
GPU Acceleration for FHEW/TFHE Bootstrapping
Yu Xiao, Feng-Hao Liu, Yu-Te Ku, Ming-Chien Ho, Chih-Fan Hsu, Ming-Ching Chang, Shih-Hao Hung, Wei-Chao Chen
National Taiwan University; Inventec Corp.; Washington State University; Academia Sinica; University at Albany; Mohamed bin Zayed University of Artificial Intelligence
TCHES PDF -
Extending Randomness-Free First-Order Masking Schemes and Applications to Masking-Friendly S-boxes
Lixuan Wu, Yanhong Fan, Weijia Wang, Bart Preneel, Meiqin Wang
Shandong University; KU Leuven
TCHES PDF -
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, Vincent Grosso
Aurel Vlaicu University of Arad; Université Jean Monnet Saint-Etienne; Centre National de la Recherche Scientifique
TCHES PDF -
PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels
Pierre AYOUB, Aurélien HERNANDEZ, Romain CAYRE, Aurélien FRANCILLON, Clémentine MAURICE
EURECOM; Université Lille
TCHES PDF -
Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits
Jonas Sander, Sebastian Berndt, Ida Bruhns, Thomas Eisenbarth
University of Lübeck; Technische Hochschule Lübeck
TCHES PDF -
Perceived Information Revisited II: Information-Theoretical Analysis of Deep-Learning Based Side-Channel Attacks
Akira Ito, Rei Ueno, Naofumi Homma
NTT Social Informatics Laboratories; Kyoto University; Tohoku University
TCHES PDF -
Blind-Folded: Simple Power Analysis Attacks using Data with a Single Trace and no Training
Xunyue Hu, Quentin Meunier, Emmanuelle Encrenaz
Sorbonne Université
TCHES PDF -
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
Marius A. Aardal, Gora Adj, Arwa Alblooshi, Diego F. Aranha, Isaac A. Canales-Martínez, Jorge Chavez-Saab, Décio Luiz Gazzoni Filho, Krijn Reijnders, Francisco Rodríguez-Henríquez
Aarhus University; Technology Innovation Institute; Universidade Estadual de Campinas; Radboud University
TCHES PDF -
Random Probing Security with Precomputation
Bohan Wang, Fanjie Ji, Yiteng Sun, Weijia Wang
Shandong University
TCHES PDF -
Prover - Toward More Efficient Formal Verification of Masking in Probing Model
Feng Zhou, Hua Chen, Limin Fan
University of Chinese Academy of Sciences; Chinese Academy of Sciences
TCHES PDF -
A Framework for Generating S-Box Circuits with Boyar–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
Jongsung Kim, Yongjin Jeon, Seungjun Baek, Giyoon Kim
Kookmin University
TCHES PDF -
Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
Jipeng Zhang, Yuxing Yan, Junhao Huang, Cetin Kaya Koc
Nanjing University of Aeronautics and Astronautics; Shanghai Aerospace Electronic Technology Institute; Hong Kong Baptist University; Iğdır University; University of California Santa Barbara
TCHES PDF -
Efficient and Composable Masked AES S-Box Designs Using Optimized Inverters
Vedad Hadžić, Roderick Bloem
Graz University of Technology
TCHES PDF
TCHES 2025, Issue 2
-
Improving MPCitH with Preprocessing: Mask Is All You Need
Guowei Liu, Guoxiao Liu, Kaijie Jiang, Qingyuan Yu, Keting Jia, Puwen Wei, Meiqin Wang
Shandong University; Tsinghua University
TCHES PDF -
MulLeak: Exploiting Multiply Instruction Leakage to Attack the Stack-optimized Kyber Implementation on Cortex-M4
Fan Huang, Xiaolin Duan, Chengcong Hu, Mengce Zheng, Honggang Hu
University of Science and Technology of China; Zhejiang Wanli University
TCHES PDF -
SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities
Jinling Tang, Haixia Xu, Huimei Liao, Yinchang Zhou
Chinese Academy of Sciences; University of Chinese Academy of Sciences
TCHES PDF -
Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information
Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom
Ruhr University Bochum; University of Klagenfurt
TCHES PDF -
TFHE Gets Real: An Efficient and Flexible Homomorphic Floating-Point Arithmetic
Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila, Samuel Tap
Centre National de la Recherche Scientifique; Zama
TCHES PDF -
REED: Chiplet-based Accelerator for Fully Homomorphic Encryption
Aikata Aikata, Ahmet Can Mert, Sunmin Kwon, Maxim Deryabin, Sujoy Sinha Roy
Graz University of Technology; Samsung Advanced Institute of Technology
TCHES PDF -
KyberSlash: Exploiting Secret-Dependent Division Timings in Kyber Implementations
Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales Paiva, Prasanna Ravi, Goutam Tamvada
University of Illinois at Chicago; Academia Sinica; Inria; Cryspen; Nanyang Technological University; Quantum Safe Migration Center; Chelpis Quantum Corp; University of Sao Paulo
TCHES PDF -
Higher-Order Time Sharing Masking
Dilip Kumar Shanmugasundaram Veeraraghavan, Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
KU Leuven
TCHES PDF -
CHERI-Crypt: Transparent Memory Encryption on Capability Architectures
Jennifer Jackson, Minmin Jiang, David Oswald
University of Birmingham
TCHES PDF -
A Code-Based ISE to Protect Boolean Masking in Software
Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weijia Wang
Shandong University; University of Bristol
TCHES PDF -
Leading Degree: A Metric for Model Performance Evaluation and Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis
-
Sieving with Streaming Memory Access
Ziyu Zhao, Jintai Ding, Bo-Yin Yang
Tsinghua University; Xi'an Jiaotong-Liverpool University; Basque Center For Applied Mathematics; Academia Sinica
TCHES PDF -
Shortcut2Secrets: A Table-based Differential Fault Attack Framework
Weizhe Wang, Pierrick Méaux, Deng Tang
Shanghai Jiao Tong University; University of Luxembourg
TCHES PDF -
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
Sebastian Faust, Maximilian Orlt, Kathrin Wirschem, Liang Zhao
Technical University of Darmstadt
TCHES PDF -
Protection of Oscillator-Based PUFs against Side Channel Analyses by Random Interruption
Holger Mandry, Jonas Ruchti, Julius Nowakowski, Michael Pehl, Maurits Ortmanns
University of Ulm; University of Munich
TCHES PDF -
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
Xander Pottier, Thomas de Ruijter, Jonas Bertels, Wouter Legiest, Michiel Van Beirendonck, Ingrid Verbauwhede
KU Leuven
TCHES PDF -
Constant time lattice reduction in dimension 4 with application to SQIsign
Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, Sina Schaeffler
Eötvös Loránd University; Technology Innovation Institute; University of Birmingham; ETH Zürich; IBM Research Europe
TCHES PDF -
Designing a General-Purpose 8-bit (T)FHE Processor Abstraction
Daphné Trama, Renaud Sirdey, Aymen Boudguiga, Pierre-Emmanuel Clet, Nicolas Ye
CEA LIST; Université Paris-Saclay
TCHES PDF -
A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks
Aric Fowler, Shayan Mohammed, Mustafa Shihab, Thomas Broadfoot, Peter Beerel, Carl Sechen, Yiorgos Makris
University of Texas at Dallas; University of Southern California
TCHES PDF -
Information Theoretic Analysis of PUF-Based Tamper Protection
Georg Maringer, Matthias Hiller
Technical University of Munich; Fraunhofer AISEC
TCHES PDF -
Rudraksh: A Compact and Lightweight Post-Quantum Key-Encapsulation Mechanism
Suparna Kundu, Archisman Ghosh, Angshuman Karmakar, Shreyas Sen, Ingrid Verbauwhede
KU Leuven; Purdue University; Indian Institute of Technology Kanpur
TCHES PDF -
SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs
Rui Jiang, Cong Peng, Min Luo, Rongmao Chen, Debiao He
Wuhan University; National University of Defense Technology
TCHES PDF -
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mustafizar Rahman, Kosei Sakamoto
University of Lugano; lowRISC C.I.C.; University of Hyogo; Mitsubishi Electric Corporation
TCHES PDF -
Skyscraper: Fast Hashing on Big Primes
Fabian Schmid, Clémence Bouvier, Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger
University of Technology Graz; Ruhr University Bochum; Ethereum Foundation; Fabric Cryptography
TCHES PDF -
New Quantum Cryptanalysis of Binary Elliptic Curves
Kyungbae Jang, Vikas Srivastava, Anubhab Baksi, Santanu Sarkar, Hwajeong Seo
Hansung University; Indian Institute of Technology Madras; Nanyang Technological University
TCHES PDF