Transactions on Cryptographic Hardware and Embedded Systems 2025
TCHES 2025 Artifacts
Badges
- IACR CHES Artifacts Available: To earn this badge, the AEC must judge that artifacts associated with the paper have been made available for retrieval. Other than making the artifacts available, this badge does not mandate any further requirements on functionality, correctness, or documentation. This is intended for authors who simply wish to make some supplementary material available that supports their paper. Examples include data sets, large appendices, and other documentation.
- 
      IACR CHES Artifacts Functional: To earn this badge, the AEC must
      judge that the artifacts conform to the expectations set by the paper
      in terms of functionality, usability, and relevance. The AEC will
      consider four aspects of the artifacts in particular.
      - Documentation: are the artifacts sufficiently documented to enable them to be exercised by readers of the paper?
- Completeness: do the submitted artifacts include all of the key components described in the paper?
- Exercisability: do the submitted artifacts include the scripts and data needed to run the experiments described in the paper, and can the software be successfully executed?
- Reusability: means that the artifacts are not just functional but of sufficient quality that they could be extended and reused by others.
 
For more information, please see the TCHES 2025 Call for Artifacts.
Volume 2025, Issue 1
  Multiplying Polynomials without Powerful Multiplication Instructions
  
  Vincent Hwang, YoungBeom Kim, and Seog Chung Seo.
  
💡 IACR CHES Artifacts Functional
   TraceCopilot: A framwork for integrating binary firmware and side-channel information of embedded cryptographic device
  
  Shipei Qu, Yuxuan Wang, Jintong Yu, Chi Zhang, and Dawu Gu.
  
✅  IACR CHES Artifacts Available
  Dash: Accelerating Distributed Private Convolutional Neural Network Inference with Arithmetic Garbled Circuits
  
  Jonas Sander, Sebastian Berndt, Ida Bruhns, and Thomas Eisenbarth.
  
💡 IACR CHES Artifacts Functional
  Optimized Software Implementation of Keccak, Kyber, and Dilithium on RV{32,64}IM{B}{V}
  
  Jipeng Zhang, Yuxing Yan, Junhao Huang, Çetin Kaya Koç.
  
💡 IACR CHES Artifacts Functional
  FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC
  
  Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, and Ajith Suresh.
  
💡 IACR CHES Artifacts Functional
  Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
  
  Vlad-Florin Drăgoi, Brice Colombier, Nicolas Vallet, Pierre-Louis Cayrel, and Vincent Grosso.
  
💡 IACR CHES Artifacts Functional
  A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
  
  Yongjin Jeon, Seungjun Baek, Giyoon Kim, and Jongsung Kim.
  
💡 IACR CHES Artifacts Functional
  Trojan Insertion versus Layout Defenses for Modern ICs: Red-versus-Blue Teaming in a Competitive Community Effort
  
  Johann Knechtel, Mohammad Eslami, and Samuel Nascimento Pagliarini.
  
💡 IACR CHES Artifacts Functional
  PhaseSCA: Exploiting Phase-Modulated Emanations in Side Channels
  
  Pierre Ayoub, Aurélien Hernandez, Romain Cayre, Aurélien Francillon, and Clémentine Maurice.
  
💡 IACR CHES Artifacts Functional
Volume 2025, Issue 2
  KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
  
  Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales B. Paiva, Prasanna Ravi, and Goutam Tamvada.
  
💡 IACR CHES Artifacts Functional
  A TRAP for SAT: On the Imperviousness of a Transistor-Level Programmable Fabric to Satisfiability-Based Attacks
  
  Aric Fowler, Shayan Mohammed, Mustafa Shihab, Thomas Broadfoot, Peter Beerel, Carl Sechen, and Yiorgos Makris.
  
💡 IACR CHES Artifacts Functional
  SimdMSM: SIMD-accelerated Multi-Scalar Multiplication Framework for zkSNARKs
  
  Rui Jiang, Cong Peng, Min Luo, Rongmao Chen, and Debiao He.
  
💡 IACR CHES Artifacts Functional
  Designing a General-Purpose 8-bit (T)FHE Processor Abstraction
  
  Daphné Trama, Aymen Boudguiga, Pierre-Emmanuel Clet, Renaud Sirdey, and Nicolas Ye.  
  
💡 IACR CHES Artifacts Functional
  Constant time lattice reduction in dimension 4 with application to SQIsign
  
  Otto Hanyecz, Alexander Karenin, Elena Kirshanova, Péter Kutas, and Sina Schaeffler.
  
💡 IACR CHES Artifacts Functional
  CHERI-Crypt: Transparent Memory Encryption on Capability Architectures
  
  Jennifer Jackson, Minmin Jiang, and David Oswald.
  
💡 IACR CHES Artifacts Functional
  Higher-Order Time Sharing Masking
  
  Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, and Ingrid Verbauwhede.
  
💡 IACR CHES Artifacts Functional
  TFHE Gets Real: an Efficient and Flexible Homomorphic Floating-Point Arithmetic
  
  Loris Bergerat, Ilaria Chillotti, Damien Ligier, Jean-Baptiste Orfila and Samuel Tap.
  
💡 IACR CHES Artifacts Functional
Volume 2025, Issue 3
  Optimal Dimensionality Reduction using Conditional Variational AutoEncoder
  
  Sana Boussam, Mathieu Carbone, Benoît Gérard, Guénaël Renault, and Gabriel Zaid.
  
💡 IACR CHES Artifacts Functional
  Adaptive Template Attacks on the Kyber Binomial Sampler
  
  Eric Chun-Yu Peng, and Markus G. Kuhn.
  
💡 IACR CHES Artifacts Functional
  
🥇 CHES 2025 Best Artifact Award
  Chameleon: A Dataset for Segmenting and Attacking Obfuscated Power Traces in Side-Channel Analysis
  
  Davide Galli, Giuseppe Chiari, and Davide Zoni.
  
✅ IACR CHES Artifacts Available
  Hardware IP Protection through Low-Overhead Fine-Grain Redaction
  
  Aritra Dasgupta, Sudipta Paria, and Swarup Bhunia.
  
✅ IACR CHES Artifacts Available
  KeyVisor – A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies
  
  Fabian Schwarz, Jan Philipp Thoma, Christian Rossow, and Tim Güneysu.
  
✅ IACR CHES Artifacts Available
  Tailorable codes for lattice-based KEMs with applications to compact ML-KEM instantiations
  
  Thales B. Paiva, Marcos A. Simplicio Jr, Syed Mahbub Hafiz, Bahattin Yildiz, Eduardo L. Cominetti, and Henrique S. Ogawa.
  
💡 IACR CHES Artifacts Functional
  On the Characterization of Phase Noise for the Robust and Resilient PLL-TRNG Design
  
  Ziheng Ma, Bohan Yang, Wenping Zhu, Hanning Wang, Yi Ouyang, Min Zhu, and Leibo Liu.
  
💡 IACR CHES Artifacts Functional
  Accelerating EdDSA Signature Verification with Faster Scalar Size Halving
  
  Muhammad ElSheikh, İrem Keskinkurt Paksoy, Murat Cenk, and  M. Anwar Hasan.
  
💡 IACR CHES Artifacts Functional
  dCTIDH: Fast & Deterministic CTIDH
  
  Fabio Campos, Andreas Hellenbrand, Michael Meyer, and Krijn Reijnders.
  
💡 IACR CHES Artifacts Functional
  Let’s DOIT: Using Intel’s Extended HW/SW Contract for Secure Compilation of Crypto Code
  
  Santiago Arranz-Olmos, Gilles Barthe, Benjamin Grégoire, Jan Jancar, Vincent Laporte, Tiago Oliveira, and Peter Schwabe.
  
💡 IACR CHES Artifacts Functional
  ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
  
  Anup Kumar Kundu, Shibam Ghosh, Aikata Aikata, and Dhiman Saha.
  
💡 IACR CHES Artifacts Functional
  Scoop: An Optimization Algorithm for Profiling Attacks against Higher-Order Masking
  
  Nathan Rousselot, Karine Heydemann, Loïc Masure, and Vincent Migairou.
  
💡 IACR CHES Artifacts Functional
  Cymric: Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs
  
  Alexandre Adomnicăi, Wonseok Choi, Yeongmin Lee, Kazuhiko Minematsu, and Yusuke Naito.
  
💡 IACR CHES Artifacts Functional
  Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography
  
  Chun-Ming Chiu, Jiaxiang Liu, Ming-Hsien Tsai, Xiaomu Shi, Bow-Yaw Wang, and Bo-Yin Yang.
  
💡 IACR CHES Artifacts Functional
TCHES 2025 Artifact Review Committee
Artifact Review Chair:
- Lennert Wouters (KU Leuven)
Artifact Review Committee Members:
- Aikata (Graz University of Technology)
- Amund Askeland (Nasjonal Sikkerhetsmyndighet)
- Joppe W. Bos (NXP Semiconductors)
- Florian Hirner (Graz University of Technology)
- Junhao Huang (BNU-HKBU United International College)
- Vincent Hwang (Max Planck Institute for Security and Privacy (MPI-SP))
- Jan Jancar (Masaryk University)
- Aaron Kaiser (Max Planck Institute for Security and Privacy (MPI-SP))
- Kris Kwiatkowski (PQShield)
- Ben Marshall (PQShield)
- Jesse De Meulemeester (KU Leuven)
- Alyssa Milburn (Intel)
- Nicolai Müller (Ruhr University Bochum)
- Quinten Norga (KU Leuven)
- Colin O’Flynn (Dalhousie University)
- Brian Peters (Dalhousie University)
- Fabrizio De Santis (Siemens AG)
- Shubhi Shukla (IIT Kharagpur)
- Kavya Sreedhar (Google)
- Philippe Teuwen (Quarkslab)
- Monika Trimoska (Eindhoven University of Technology)
- Nils Wisiol (AMD)
External reviewers:
- Alicia Andries (KU Leuven)
- YoungBeom Kim (Kookmin University)
- Wouter Legiest (KU Leuven)
- Jonas Roels (KU Leuven)
