Abstract is missing.
- HAPPIER: Hash-Based, Aggregatable, Practical Post-quantum Signatures Implemented Efficiently with Risc0Arda Saygan, Muhammed Said Gündogan, Atakan Arslan, Mehmet Emin Gönen. 3-22 [doi]
- Isotropic Quadratic Forms, Diophantine Equations and Digital Signatures, DEFIv2Martin Feussner, Igor Semaev. 23-38 [doi]
- Stealthy Hardware Trojan Attacks on MQ-Based Post-quantum Digital SignaturesAikata Aikata, Anisha Mukherjee, Sujoy Sinha Roy. 39-54 [doi]
- LightNTT: A Tiny NTT/iNTT Core for ML-DSA Featuring a Constant-Geometry Pipelined DesignBardia Taghavi, Reza Azarderakhsh, Mehran Mozaffari Kermani. 57-76 [doi]
- A Comparison of Unified Multiplier Designs for the Falcon Post-quantum Digital Signature - A Case Study of Baseline, Tiling, Comba and Karatsuba Approaches for FPGA and ASICRahul Magesh, Modini Ayyagari, Sharath Pendyala, Aydin Aysu. 77-96 [doi]
- An Optimized FrodoKEM Implementation on Reconfigurable HardwareGiuseppe Manzoni, Shekoufeh Neisarian, Elif Bilge Kavun. 97-113 [doi]
- Optimized FPGA Architecture for Modular Reduction in NTTTolun Tosun, Selim Kirbiyik, Emre Koçer, Ersin Alaybeyoglu. 117-137 [doi]
- Leveraging Smaller Finite Fields for More Efficient ZK-Friendly Hash FunctionsGökçe Düzyol, Kamil Otal. 138-153 [doi]
- tt ARCHER: Architecture-Level Simulator for Side-Channel Analysis in RISC-V ProcessorsAsmita Adhikary, Abraham Basurto-Becerra, Lejla Batina, Ileana Buhan, Durba Chatterjee, Senna van Hoek, Eloi Sanfelix Gonzalez. 157-177 [doi]
- MIDSCAN: Investigating the Portability Problem for Cross-Device DL-SCALizzy Grootjen, Zhuoran Liu 0001, Ileana Buhan. 178-197 [doi]
- Protecting AES-128 Against First-Order Side-Channel Analysis in Micro-Architectures by Enforcing Threshold Implementation PrinciplesCharles-Antoine De Paepe, John Gaspoz, Dilara Toprakhisar, Svetla Nikova. 198-211 [doi]
- On Advancing Pre-silicon Hardware Trojan Detection Against Lightweight Block CiphersCharilaos Memeletzoglou, Evangelia Konstantopoulou, Nicolas Sklavos 0001. 212-230 [doi]
- Hardware Circuits for the Legendre PRFSubhadeep Banik, Francesco Regazzoni 0001. 231-243 [doi]
- Lightweight Fault Detection Architecture for Modular Exponentiation in Cryptography on ARM and FPGASaeed Aghapour, Kasra Ahmadi, Mehran Mozaffari Kermani, Reza Azarderakhsh. 244-260 [doi]
- Cube-Attack-Like Cryptanalysis of Keccak-Based Constructions Exploiting State DifferencesMohammad Vaziri, Vesselin Velichkov. 263-284 [doi]
- Differential and Linear Analyses of DIZY Through MILP ModelingMurat Burhan Ilter, Onur Koçak, Orhun Kara, Fatih Sulak. 285-305 [doi]
- Automated Tool for Meet-in-the-Middle Attacks with Very Low Data and Memory ComplexityMohammad Vaziri. 306-327 [doi]
- JWT Back to the Future on the (Ab)use of JWTs in IoT TransactionsAlberto Battistello, Guido Bertoni, Filippo Melzani, Maria Chiara Molteni. 328-343 [doi]