{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:01:11Z","timestamp":1777964471485,"version":"3.51.4"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032018052","type":"print"},{"value":"9783032018069","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-01806-9_6","type":"book-chapter","created":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:05:51Z","timestamp":1761397551000},"page":"101-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Leveled Software Implementation of\u00a0Polka and\u00a0Comparison with\u00a0Uniformly Masked Kyber"],"prefix":"10.1007","author":[{"given":"Thibaud","family":"Schoenauen","sequence":"first","affiliation":[]},{"given":"Cl\u00e9ment","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Momin","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Peters","sequence":"additional","affiliation":[]},{"given":"Fran\u00e7ois-Xavier","family":"Standaert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,26]]},"reference":[{"key":"6_CR1","volume-title":"and Damien Stehl\u00e9","author":"R Avanzi","year":"2022","unstructured":"Avanzi, R., et al.: and Damien Stehl\u00e9. Algorithm specifications and supporting documentation. NIST Post-Quantum Cryptography Standard, CRYSTALS-Kyber (2022)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Azouaoui, M., Bronchain, O., Hoffmann, C., Kuzovkova, Y., Schneider, T., Standaert, F.: Systematic study of decryption and re-encryption leakage: the case of kyber. In: COSADE, volume 13211 of Lecture Notes in Computer Science, pp. 236\u2013256. Springer, 2022","DOI":"10.1007\/978-3-030-99766-3_11"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Balasch, J., Gierlichs, B., Grosso, V., Reparaz, O., Standaert, F.: On the cost of lazy engineering for masked software implementations. In: CARDIS, volume 8968 of Lecture Notes in Computer Science, pp. 64\u201381. Springer, 2014","DOI":"10.1007\/978-3-319-16763-3_5"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Barrett, P.: Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor. In: CRYPTO, volume 263 of Lecture Notes in Computer Science, pp. 311\u2013323. Springer (1986)","DOI":"10.1007\/3-540-47721-7_24"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/978-3-030-56784-2_13","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"D Bellizia","year":"2020","unstructured":"Bellizia, D., et al.: Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12170, pp. 369\u2013400. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56784-2_13"},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"173","DOI":"10.46586\/tches.v2021.i4.173-214","volume":"2021","author":"JW Bos","year":"2021","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T., Vredendaal, C.: Masking kyber: first- and higher-order implementations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 173\u2013214 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"553","DOI":"10.46586\/tches.v2022.i4.553-588","volume":"2022","author":"O Bronchain","year":"2022","unstructured":"Bronchain, O., Cassiers, G.: Bitslicing arithmetic\/boolean masking conversions for fun and profit with application to lattice-based kems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4), 553\u2013588 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s13389-020-00241-8","volume":"11","author":"O Bronchain","year":"2021","unstructured":"Bronchain, O., Schneider, T., Standaert, F.-X.: Reducing risks through simplicity: high side-channel security for lazy engineers. J. Cryptogr. Eng. 11(1), 39\u201355 (2021)","journal-title":"J. Cryptogr. Eng."},{"issue":"S1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"160","DOI":"10.46586\/tosc.v2020.iS1.160-207","volume":"2020","author":"A Canteaut","year":"2020","unstructured":"Canteaut, A., et al.: Saturnin: a suite of lightweight symmetric algorithms for post-quantum security. IACR Trans. Symmetric Cryptol. 2020(S1), 160\u2013207 (2020)","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"90","key":"6_CR10","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"J Cooley","year":"1965","unstructured":"Cooley, J., Tukey, J.: An algorithm for the machine calculation of complex fourier series. Math. Comput. 19(90), 297\u2013301 (1965)","journal-title":"Math. Comput."},{"issue":"1","key":"6_CR11","first-page":"153","volume":"2023","author":"J-S Coron","year":"2023","unstructured":"Coron, J.-S., G\u00e9rard, F., Montoya, S., Zeitoun, R.: High-order polynomial comparison and masking lattice-based encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), 153\u2013192 (2023)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-29912-4_6","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"J-S Coron","year":"2012","unstructured":"Coron, J.-S., Giraud, C., Prouff, E., Renner, S., Rivain, M., Vadnala, P.K.: Conversion of Security Proofs from One Leakage Model to Another: A New Issue. In: Schindler, W., Huss, S.A. (eds.) COSADE 2012. LNCS, vol. 7275, pp. 69\u201381. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29912-4_6"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"D\u2019Anvers, J.: One-hot conversion:towards faster table-based A2B conversion. In: EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, pp. 628\u2013657. Springer (2023)","DOI":"10.1007\/978-3-031-30634-1_21"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"115","DOI":"10.46586\/tches.v2022.i2.115-139","volume":"2022","author":"J-P D\u2019Anvers","year":"2022","unstructured":"D\u2019Anvers, J.-P., Heinz, D., Pessl, P., Beirendonck, M., Verbauwhede, I.: Higher-order masked ciphertext comparison for lattice-based cryptography. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2), 115\u2013139 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Dubrova, E., Ngo, K., G\u00e4rtner, J., Wang, R.: Breaking a fifth-order masked implementation of crystals-kyber by copy-paste. In APKCAsiaCCS, pp. 10\u201320. ACM (2023)","DOI":"10.1145\/3591866.3593072"},{"issue":"1","key":"6_CR16","first-page":"373","volume":"2021","author":"S Duval","year":"2021","unstructured":"Duval, S., M\u00e9aux, P., Momin, C., Standaert, F.-X.: Exploring crypto-physical dark matter and learning with physical rounding towards secure and efficient fresh re-keying. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1), 373\u2013401 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: CRYPTO, volume 1666 of Lecture Notes in Computer Science, pp. 537\u2013554. Springer (1999)","DOI":"10.1007\/3-540-48405-1_34"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Gentleman,M.W., Sande. G.: Fast fourier transforms: for fun and profit. In: AFIPS Fall Joint Computing Conference, volume\u00a029 of AFIPS Conference Proceedings, pp. 563\u2013578. AFIPS \/ ACM \/ Spartan Books, Washington D.C., 1966","DOI":"10.1145\/1464291.1464352"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-30530-7_8","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2019","author":"C Guo","year":"2019","unstructured":"Guo, C., Pereira, O., Peters, T., Standaert, F.-X.: Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction. In: Schwabe, P., Th\u00e9riault, N. (eds.) LATINCRYPT 2019. LNCS, vol. 11774, pp. 150\u2013172. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_8"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Hoffmann, C., Libert, B., Momin, C., Peters, T., Standaert, F.: POLKA: towards leakage-resistant post-quantum CCA-secure public key encryption. In: Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, pp. 114\u2013144. Springer, 2023","DOI":"10.1007\/978-3-031-31368-4_5"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Hoffmann, C., M\u00e9aux, P., Momin, C., Rotella, Y., Standaert, F., Udvarhelyi, B.: Learning with physical rounding for linear and quadratic leakage functions. In: CRYPTO (3), volume 14083 of Lecture Notes in Computer Science, pp. 410\u2013439. Springer, 2023","DOI":"10.1007\/978-3-031-38548-3_14"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"H\u00f6velmanns, K., H\u00fclsing, A., Majenz, C., Sisinni, F.: (un)breakable curses - re-encryption in the fujisaki-okamoto transform. In: EUROCRYPT (2), volume 15602 of Lecture Notes in Computer Science, pp. 245\u2013274. Springer, 2025","DOI":"10.1007\/978-3-031-91124-8_9"},{"key":"6_CR23","unstructured":"Kannwischer, M.J., Petri, R., Rijneveld, J., Schwabe, P., Stoffelen, K.: PQM4: post-quantum crypto library for the ARM Cortex-M4. https:\/\/github.com\/mupq\/pqm4"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky, V., Peikert, C., Regev, O.: On Ideal Lattices and Learning with Errors over Rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1\u201323. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_1"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/11545262_12","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"S Mangard","year":"2005","unstructured":"Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking Masked AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157\u2013171. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_12"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. comput. 44(170):519\u2013521, 1985","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"issue":"4","key":"6_CR27","doi-asserted-by":"publisher","first-page":"676","DOI":"10.46586\/tches.v2021.i4.676-707","volume":"2021","author":"K Ngo","year":"2021","unstructured":"Ngo, K., Dubrova, E., Guo, Q., Johansson, T.: A side-channel attack on a masked IND-CCA secure saber KEM implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 676\u2013707 (2021)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"2","key":"6_CR28","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/s00145-010-9085-7","volume":"24","author":"S Nikova","year":"2011","unstructured":"Nikova, S., Rijmen, V., Schl\u00e4ffer, M.: Secure hardware implementation of nonlinear functions in the presence of glitches. J. Cryptol. 24(2), 292\u2013321 (2011)","journal-title":"J. Cryptol."},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-30530-7_7","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2019","author":"P Pessl","year":"2019","unstructured":"Pessl, P., Primas, R.: More Practical Single-Trace Attacks on the Number Theoretic Transform. In: Schwabe, P., Th\u00e9riault, N. (eds.) LATINCRYPT 2019. LNCS, vol. 11774, pp. 130\u2013149. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_7"},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-66787-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"R Primas","year":"2017","unstructured":"Primas, R., Pessl, P., Mangard, S.: Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 513\u2013533. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_25"},{"issue":"2","key":"6_CR31","doi-asserted-by":"publisher","first-page":"418","DOI":"10.46586\/tches.v2023.i2.418-446","volume":"2023","author":"G Rajendran","year":"2023","unstructured":"Rajendran, G., Ravi, P., D\u2019Anvers, J.-P., Bhasin, S., Chattopadhyay, A.: Pushing the limits of generic side-channel attacks on lwe-based kems - parallel PC oracle attacks on kyber KEM and beyond. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2), 418\u2013446 (2023)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Ravi, P., Roy, S.S., Chattopadhyay, A., Bhasin, S.: Generic side-channel attacks on CCA-secure lattice-based PKE and kems. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020(3):307\u2013335 (2020)","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"6_CR33","unstructured":"Seiler, G.: Faster AVX2 optimized NTT multiplication for ring-lwe lattice cryptography. IACR Cryptol. ePrint Arch, page\u00a039, 2018"},{"key":"6_CR34","unstructured":"Standaert, F.: Towards and Open Approach to Secure Cryptographic Implementations (Invited Talk). In: EUROCRYPT I, volume 11476 of LNCS, pages xv 2019. https:\/\/www.youtube.com\/watch?v=KdhrsuJT1sE"},{"issue":"3","key":"6_CR35","doi-asserted-by":"publisher","first-page":"473","DOI":"10.46586\/tches.v2023.i3.473-503","volume":"2023","author":"Y Tanaka","year":"2023","unstructured":"Tanaka, Y., Ueno, R., Xagawa, K., Ito, A., Takahashi, J., Homma, N.: Multiple-valued plaintext-checking side-channel attacks on post-quantum kems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3), 473\u2013503 (2023)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"issue":"1","key":"6_CR36","first-page":"296","volume":"2022","author":"R Ueno","year":"2022","unstructured":"Ueno, R., Xagawa, K., Tanaka, Y., Ito, A., Takahashi, J., Homma, N.: Curse of re-encryption: A generic power\/em analysis on post-quantum kems. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), 296\u2013322 (2022)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"6_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-642-34961-4_44","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"N Veyrat-Charvillon","year":"2012","unstructured":"Veyrat-Charvillon, N., Medwed, M., Kerckhof, S., Standaert, F.-X.: Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 740\u2013757. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_44"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Xu, Z., Pemberton, O., Roy, S., Oswald, D.F., Yao, W., Zheng, Z.: Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: the case study of kyber. IEEE Trans. Computers, 71(9):2163\u20132176, 2022","DOI":"10.1109\/TC.2021.3122997"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01806-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:05:59Z","timestamp":1761397559000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01806-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,26]]},"ISBN":["9783032018052","9783032018069"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01806-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,26]]},"assertion":[{"value":"26 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}