{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T21:34:43Z","timestamp":1774906483758,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001858","name":"Vinnova","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,22]]},"DOI":"10.1109\/ets56758.2023.10174000","type":"proceedings-article","created":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T17:20:34Z","timestamp":1689182434000},"page":"1-5","source":"Crossref","is-referenced-by-count":24,"title":["A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber"],"prefix":"10.1109","author":[{"given":"Yanning","family":"Ji","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Ruize","family":"Wang","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Kalle","family":"Ngo","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Linus","family":"Backlund","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23696-0_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1587\/elex.17.20200234"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"ref14","article-title":"CRYSTALS-Kyber algorithm specifications and supporting documentation","author":"schwabe","year":"2020"},{"key":"ref11","article-title":"A message recovery attack on LWE\/LWR-based PKE\/KEMs using amplitude-modulated EM emanations","author":"wang","year":"2022","journal-title":"Proc of 25th Annual Int Conf on Information Security and Cryptology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"ref2","article-title":"Announcing the commercial national security algorithm suite 2.0","year":"0"},{"key":"ref1","first-page":"1","article-title":"Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process","author":"moody","year":"0","journal-title":"Nistir 8309"},{"key":"ref17","first-page":"28","article-title":"The generalization of &#x2018;student&#x2019;s&#x2019;problem when several different population varlances are involved","volume":"34","author":"welch","year":"1947","journal-title":"Biometrika"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.676-707"},{"key":"ref8","first-page":"2022\/1361","article-title":"Correlation electromagnetic analysis on an fpga implementation of crystals-kyber","author":"rodriguez","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref7","first-page":"2021\/1021","article-title":"Power-based side channel attack analysis on PQC algorithms","author":"kamucheka","year":"2021","journal-title":"Cryptology ePrint Archive"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i2.328-356"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.173-214"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref6","first-page":"2022\/058","article-title":"First-order masked Kyber on ARM Cortex-M4","author":"heinz","year":"2022","journal-title":"Cryptology ePrint Archive"},{"key":"ref5","first-page":"2022\/110","article-title":"Revisiting higher-order masked comparison for lattice-based cryptography: Algorithms and bit-sliced implementations","author":"d\u2019anvers","year":"2022","journal-title":"Cryptology ePrint Archive"}],"event":{"name":"2023 IEEE European Test Symposium (ETS)","location":"Venezia, Italy","start":{"date-parts":[[2023,5,22]]},"end":{"date-parts":[[2023,5,26]]}},"container-title":["2023 IEEE European Test Symposium (ETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10173930\/10173940\/10174000.pdf?arnumber=10174000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T17:56:04Z","timestamp":1690912564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10174000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,22]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ets56758.2023.10174000","relation":{},"subject":[],"published":{"date-parts":[[2023,5,22]]}}}