Accepted papers
Cycle 1
- Secret in OnePiece: Fault Attack on Masked Kyber with the Vulnerability from Bit Slicing – Jian Wang, Weiqiong Cao, Hua Chen and Haoyuan Li • pre-proceeding version (PDF)
- The Revisited Hidden Weight Bit Function – Pierrick Méaux, Tim Seuré and Deng Tang • pre-proceeding version (PDF)
- Practical Collision Attacks on Reduced-Round Xoodyak Hash Mode – Huina Li, Le He and Weidong Qiu • pre-proceeding version (PDF)
- PIsignHD: A New Structure for the SQIsign Family with Flexible Applicability – Kaizhan Lin, Weize Wang, Chang-An Zhao and Yunlei Zhao • pre-proceeding version (PDF)
- Bit Security of Quantum Key Search – Marc Fischlin and Evangelos Gkoumas • pre-proceeding version (PDF)
- An attack on ML-DSA using an implicit hint – Paco Azevedo-Oliveira, Jordan Beraud and Louis Goubin • pre-proceeding version (PDF)
- Efficient SPA Countermeasures using Redundant Number Representation with Application to ML-KEM – Rishub Nagpal, Vedad Hadzic, Robert Primas and Stefan Mangard • pre-proceeding version (PDF)
- Air-FRI: Acceleration of the FRI Protocol on the GPU for zkSNARK Applications – Tanmayi Jandhyala and Guang Gong • pre-proceeding version (PDF)
- Impossible Differentials Automation: Model Generation and New Techniques – Emanuele Bellini, Alessandro De Piccoli, David Gérault, Paul Huynh, Simone Pelizzola and Andrea Visconti • pre-proceeding version (PDF)