List of accepted papers
This list only includes accepted papers, conditionally accepted papers should be included once validated by Sherpherd. The order is random.
- Vladimir Sarde (Université de Versailles – Saint-Quentin-en-Yvelines, Idemia) Nicolas Debande (Idemia) Improvement of Side-Channel Attacks on Mitaka
- Lucas David MEIER (CSEM), Damian VIZÁR (CSEM), Felipe VALENCIA (CSEM), Cristian-Alexandru BOTOCAN (CSEM) Taking AI-Based Side-Channel Attacks to a New Dimension
- Julien Toulemont (ANSSI), Geoffrey Chancel (LIRMM), Frederick Mailly (LIRMM), Philippe Maurine (LIRMM), Pascal Nouet (LIRMM) Towards package opening detection at power-up by monitoring thermal dissipation
- Mohamed Abdelmonem (Simula UiB), Lukas Holzbaur (Infineon Technologies AG), Håvard Raddum (Simula UiB), Alexander Zeh (Infineon Technologies AG) Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms
- Stian Husum (Simula UiB), Håvard Raddum (Simula UiB), Martijn Stam (Simula UiB) A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY
- Pierre Galissant (University of Versailles-St-Quentin-en-Yvelines), Louis Goubin (University of Versailles-St-Quentin-en-Yvelines) White-Box Implementation Techniques for the HFE family
- Minghui Zhao (Nanyang Technological University), Trevor Yap (Nanyang Technological University) Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis
- Quinten Norga (COSIC, KU Leuven), Jan-Pieter D'Anvers (COSIC, KU Leuven), Suparna Kundu (COSIC, KU Leuven), Ingrid Verbauwhede (COSIC, KU Leuven) X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware
- Pierugo Pace (Nagra Kudelski Group / EPFL), Hervé Pelletier (Nagra Kudelski Group), Serge Vaudenay (EPFL) Hybrid homomorphic encryption resistance to side-channel attacks
- Antoine Wurcker (SERMA Safety and Security), David Marcais (SERMA Safety and Security) The Dangerous Message/Key Swap in HMAC
- Jonas Schupp (Technical University of Munich, Germany, TUM School of Computation, Information and Technology), Georg Sigl (Technical University of Munich, Germany; TUM School of Computation, Information and Technology and Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany) A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS)
- Linus Mainka (Universiteit van Amsterdam), Kostas Papagiannopoulos (Universiteit van Amsterdam) Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V
- Alexandre Berzati (Thales DIS), Andersson Calle Viera (Lip6 Sorbonne Université, Thales DIS) Maya Chartouny (Université de Versailles Saint-Quentin-en-Yvelines, Thales DIS), David Vigilant (Thales DIS)Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM
- Jonas Schupp (Technical University of Munich, Germany, TUM School of Computation, Information and Technology), Georg Sigl (Technical University of Munich, Germany; TUM School of Computation, Information and Technology and Fraunhofer Institute for Applied and Integrated Security (AISEC), Garching, Germany) A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS)
- Brice Colombier (Laboratoire Hubert Curien, Université Jean Monnet, Saint-Étienne, France), Vincent Grosso (Laboratoire Hubert Curien, CNRS, Saint-Étienne, France), Pierre-Louis Cayrel (Laboratoire Hubert Curien, Université Jean Monnet, Saint-Étienne, France), Vlad-Florin Drăgoi (Aurel Vlaicu University, Arad, Romania) Message-recovery Horizontal Correlation Attack on Classic McEliece
- Julien Devevey (ANSSI (Paris, France)), Morgane Guerreau (CryptoNext Security (Paris, France), Thomas Legavre (Thales (Gennevilliers, France), Université Sorbonne LIP6 (Paris, France), ANSSI (Paris, France)), Ange Martinelli (ANSSI (Paris, France)), Thomas Ricosset (Thales (Gennevilliers, France) Breaking HuFu with 0 Leakage: A Side-Channel Analysis
- Viet Sang Nguyen (Laboratoire Hubert Curien, Universtié Jean Monnet, Saint-Etienne, France), Vincent Grosso (CNRS and Laboratoire Hubert Curien, Universtié Jean Monnet, Saint-Etienne, France), Pierre-Louis Cayrrel (Laboratoire Hubert Curien, Universtié Jean Monnet, Saint-Etienne, France) Practical Second-Order CPA Attack on Ascon with Proper Selection Function
- Dina KAMEL (UCLouvain, ICTEAM, Crypto Group), Françoix-Xavier STANDAERT (UCLouvain, ICTEAM, Crypto Group) Area Efficient Hardware Architecture of a Modular Polynomial Arithmetic Unit for Post-Quantum Digital Signatures and KEMs
- Sven Bauer (Siemens AG), Fabrizio De Santis (Siemens AG), Kristjane Koleci (Siemens AG), Anita Aghaie (Siemens AG) A Fault-Resistant NTT by Polynomial Evaluation and Interpolation
- Gauthier Cler (SERMA Safety & Security, France), Sebastien Ordas (SERMA Safety & Security, France), Philippe Maurine (LIRMM, France) Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks
- Mathieu Escouteloup (Universite de Bordeaux, Bordeaux INP, Laboratoire IMS, UMR CNRS 5218, France), Vincent Migliore (LAAS–CNRS, Univ. Toulouse, CNRS, INSA, Toulouse, France) A hardware design methodology to prevent microarchitectural transition leakages
- Aymeric Hiltenbrand (Inria), Julien Eynard (Rambus, Inc.), Romain Poussier (Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI)) On the asymptotic success rate of simple side-channel attack against masking
- Tomáš Rabas (Czech Technical University in Prague), Jiří Buček (Czech Technical University in Prague), Vincent Grosso (Université Jean Monnet), Karolína Zenknerová (National Cyber and Information Security Agency), Róbert Lórencz (Czech Technical University in Prague) Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods
- Neelam Nasir (Telecom Paris), Julien Béguinot (Télécom Paris), Wei Cheng (Secure-IC S.A.S and Télécom Paris), Ulrich Kühne (Télécom Paris), Jean-Luc Danger (Télécom Paris) Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma
- pcy Sluys (COSIC, KU Leuven), Lennert Wouters (COSIC, KU Leuven), Benedikt Gierlichs (COSIC, KU Leuven), Ingrid Verbauwhede (COSIC, KU Leuven) Partial Key Overwrite attacks in microcontrollers