
Welcome to GE Wars: The Deep Learning SCA battle!
This challenge is a deep learning-based side-channel analysis contest hosted by PACE@TL from Nanyang Technological University. This is part of the CHES 2025 challenge.
Since 2015, CHES has hosted annual crypto-engineering challenges pushing the boundaries of applied cryptographic research. The 2025 edition introduces a new Deep Learning Side-Channel Analysis (DL-SCA) challenge targeting a real-world AES implementation! Think your model can recover secret keys from noisy electromagnetic traces? Want to benchmark your DL-SCA techniques against the community? This challenge is for you!
The CHES 2025 SCA Challenge focuses on profiled attacks (template or deep learning-based) against an unprotected AES-C implementation running on a Raspberry Pi 4B. This introduces jitter and noise, raising the bar for traditional attack strategies and inviting novel DL-based solutions.
As in previous challenges, participants can join in the following way:
Attackers develop models to extract the secret key using fewer traces than the provided baseline.
The challenge runs from June 15 to August 15, 2025 and includes:
A provided EM trace dataset (500K profiling, 100K attack traces)
A shared task: Recovering one AES S-box output byte with minimal traces (using Guessing Entropy)
Continuous public leaderboard
Final results and possible Rump Session spotlight at CHES 2025
Winners earn recognition in the community—and cash award.
The dataset will be made available at the following link.
The detailed rules are available!!!
Jump right in
Last updated