Abstract is missing.
- Hardware Security: State of the ArtIngrid Verbauwhede. 1 [doi]
- SANTA: A Spatial Accelerator Design for Efficient Number Theoretic Transform (NTT) on Heterogeneous System-on-ChipsFahim Ahmed, Md Tanvir Arafin. 2-10 [doi]
- Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation TechniquesTinghung Chiu, Jason LeGrow, Wenjie Xiong 0001. 11-22 [doi]
- Acoustic Eavesdropping Attack Using Self-Mixing Laser InterferometerKohei Doi, Kunihiko Ooi, Takeshi Sugawara 0001. 23-35 [doi]
- PHIDIAS: Power Signature Host-based Intrusion Detection in Automotive MicrocontrollersStefan Gehrer, Jorge Guajardo. 36-47 [doi]
- The Quantum Imitation Game: Reverse Engineering of Quantum Machine Learning ModelsArchisman Ghosh, Swaroop Ghosh. 48-57 [doi]
- When Data Shines - Leaking Data from Microcontrollers Through Photon Emission AnalysisRodrigo Silva Lima, Raphael Viera 0001, Jean-Max Dutertre, William Magrini, Matthieu Pommies, Anthony Bertrand. 58-67 [doi]
- BackMon: IC Backside Tamper Detection using On-Chip Impedance MonitoringTahoura Mosavirik, Shahin Tajik. 68-77 [doi]
- FaultFinder: Lightning-fast, Multi-architectural Fault Injection SimulationKit Murdock, Martin Thompson, David F. Oswald. 78-88 [doi]
- Patching FPGAs: The Security Implications of Bitstream ModificationsEndres Puschner, Maik Ender, Steffen Becker 0003, Christof Paar. 89-99 [doi]
- High-Performance NTT Hardware Accelerator to Support ML-KEM and ML-DSADur-e-Shahwar Kundi, Jose M. Bermudo Mera, Pierre-Yves Strub, Michael Hutter. 100-105 [doi]