September 14-18, 2025

Kuala Lumpur, Malaysia

Accepted Posters

  1. Coefficient Classification Template Attack on the NTT Accelerator for ML-KEM

    Munkhbaatar Chinbat; Liji Wu; Xiangmin Zhang
    School of Integrated Circuits, Tsinghua University, Beijing, China; Beijing National Research Center for Information Science and Technology, Beijing, China

  2. Cracking the AI Nut: From Output Extraction to Shuffling Countermeasure

    Le Wu; Liji Wu; Xiangming Zhang; Yuyang Pan; Jian Wu
    School of Integrated Circuits, Tsinghua University, Beijing, China; Beijing Unionpay Card Technology Co., Ltd; Beijing Pairui Micro Technology Co., Ltd.

  3. A Low-Latency HPC Gadget for 3-Input Finite Field Multiplication at Arbitrary Order

    Frederik Reiter; Amir Moradi
    TU Darmstadt, Germany

  4. High-Order and Cortex-M4 First-Order Implementations of Masked FrodoKEM

    François Gérard; Morgane Guerreau
    University of Luxembourg, Luxembourg; PQShield

  5. A Lightweight PUF-Based Mutual Authentication Protocol Using a Modeling-Resistant Dynamic Refresh Strategy

    Jiang Li; Yijun Cui; Chenghua Wang; Weiqiang Liu
    College of Integrated Circuits, Nanjing University of Aeronautics and Astronautics, Nanjing, China

  6. SSIMA: Scalable Side-Channel Immune Micro-Architecture

    Niels Wieser; Amir Moradi
    TU Darmstadt, Germany

  7. High Throughput GPU Implementation of HQC Key Encapsulation Mechanism

    Wai-Kong Lee; Ramachandra Achar; Eddie Chen; Wijdene Mootamri
    Universiti Tunku Abdul Rahman, Malaysia; Carleton University, Canada; Institut Supérieur d’Informatique et de Mathématiques de l’Université de Monastir, Tunisie

  8. Efficient Deep Learning-based Side-Channel Attack on DIZY Stream Cipher

    George Attia; Shekoufeh Neisarian; Martin Schmid; Elif Bilge Kavun
    Barkhausen Institut, Dresden, Germany; University of Passau, Passau, Germany; TU Dresden, Dresden, Germany

  9. High-Performance Implementation of ML-DSA on Armv9-A Architecture

    Hanyu Wei; Wenqian Li; Shiyu Shen; Hao Yang; Yunlei Zhao
    Fudan University; City University of Hong Kong; State Key Laboratory of Cryptology

  10. A Unified Yet Efficient Parallel Hardware Architecture for FrodoKEM

    Giuseppe Manzoni; Aydın Aysu; Elif Bilge Kavun
    Barkhausen Institut, Dresden, Germany; North Carolina State University, Raleigh, NC, USA; TU Dresden, Dresden, Germany

  11. FHEMaLe:Framework for Homomorphic Encrypted Machine Learning

    B. Pradeep Kumar Reddy; Sameeksha Goyal; Ruchika Meel; Ayantika Chatterjee
    Indian Institute of Technology, Kharagpur, India

  12. Efficient FPGA Architecture for GF(256) Multiplication Using Log-Antilog LUTs in Lightweight Cryptography

    Yasir Amer Abbas; Saad Al-Azawi; Norziana Jamil; Muhammad Reza Z’aba
    University of Diyala, Iraq; UAE University, UAE; National Cryptography Center, Malaysia

  13. Exploring the Performance of BERT Transformers on ASCAD Variable-Key Dataset

    Ali Alper Sakar; Elif Bilge Kavun
    Barkhausen Institut, Dresden, Germany; University of Passau, Passau, Germany; TU Dresden, Dresden, Germany

  14. Fault Attacks on Seed Pointers and Their Effects on Post-Quantum Algorithms

    Hariprasad K V; Prasanna Ravi; Shivam Bhasin
    Nanyang Technological University, Singapore

  15. Secure Sparse Polynomial Multiplier for HQC: Parallelism and Leakage Analysis

    Jaeho Jeon; Young-Sik Kim
    Department of Electrical Engineering and Computer Science, DGIST, Republic of Korea