Accepted Posters
Coefficient Classification Template Attack on the NTT Accelerator for ML-KEM
Munkhbaatar Chinbat; Liji Wu; Xiangmin Zhang
School of Integrated Circuits, Tsinghua University, Beijing, China; Beijing National Research Center for Information Science and Technology, Beijing, ChinaCracking the AI Nut: From Output Extraction to Shuffling Countermeasure
Le Wu; Liji Wu; Xiangming Zhang; Yuyang Pan; Jian Wu
School of Integrated Circuits, Tsinghua University, Beijing, China; Beijing Unionpay Card Technology Co., Ltd; Beijing Pairui Micro Technology Co., Ltd.A Low-Latency HPC Gadget for 3-Input Finite Field Multiplication at Arbitrary Order
Frederik Reiter; Amir Moradi
TU Darmstadt, GermanyHigh-Order and Cortex-M4 First-Order Implementations of Masked FrodoKEM
François Gérard; Morgane Guerreau
University of Luxembourg, Luxembourg; PQShieldA Lightweight PUF-Based Mutual Authentication Protocol Using a Modeling-Resistant Dynamic Refresh Strategy
Jiang Li; Yijun Cui; Chenghua Wang; Weiqiang Liu
College of Integrated Circuits, Nanjing University of Aeronautics and Astronautics, Nanjing, ChinaSSIMA: Scalable Side-Channel Immune Micro-Architecture
Niels Wieser; Amir Moradi
TU Darmstadt, GermanyHigh Throughput GPU Implementation of HQC Key Encapsulation Mechanism
Wai-Kong Lee; Ramachandra Achar; Eddie Chen; Wijdene Mootamri
Universiti Tunku Abdul Rahman, Malaysia; Carleton University, Canada; Institut Supérieur d’Informatique et de Mathématiques de l’Université de Monastir, TunisieEfficient Deep Learning-based Side-Channel Attack on DIZY Stream Cipher
George Attia; Shekoufeh Neisarian; Martin Schmid; Elif Bilge Kavun
Barkhausen Institut, Dresden, Germany; University of Passau, Passau, Germany; TU Dresden, Dresden, GermanyHigh-Performance Implementation of ML-DSA on Armv9-A Architecture
Hanyu Wei; Wenqian Li; Shiyu Shen; Hao Yang; Yunlei Zhao
Fudan University; City University of Hong Kong; State Key Laboratory of CryptologyA Unified Yet Efficient Parallel Hardware Architecture for FrodoKEM
Giuseppe Manzoni; Aydın Aysu; Elif Bilge Kavun
Barkhausen Institut, Dresden, Germany; North Carolina State University, Raleigh, NC, USA; TU Dresden, Dresden, GermanyFHEMaLe:Framework for Homomorphic Encrypted Machine Learning
B. Pradeep Kumar Reddy; Sameeksha Goyal; Ruchika Meel; Ayantika Chatterjee
Indian Institute of Technology, Kharagpur, IndiaEfficient FPGA Architecture for GF(256) Multiplication Using Log-Antilog LUTs in Lightweight Cryptography
Yasir Amer Abbas; Saad Al-Azawi; Norziana Jamil; Muhammad Reza Z’aba
University of Diyala, Iraq; UAE University, UAE; National Cryptography Center, MalaysiaExploring the Performance of BERT Transformers on ASCAD Variable-Key Dataset
Ali Alper Sakar; Elif Bilge Kavun
Barkhausen Institut, Dresden, Germany; University of Passau, Passau, Germany; TU Dresden, Dresden, GermanyFault Attacks on Seed Pointers and Their Effects on Post-Quantum Algorithms
Hariprasad K V; Prasanna Ravi; Shivam Bhasin
Nanyang Technological University, SingaporeSecure Sparse Polynomial Multiplier for HQC: Parallelism and Leakage Analysis
Jaeho Jeon; Young-Sik Kim
Department of Electrical Engineering and Computer Science, DGIST, Republic of Korea