{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:20:29Z","timestamp":1775384429768,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/host55118.2023.10133344","type":"proceedings-article","created":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T17:29:36Z","timestamp":1685035776000},"page":"283-292","source":"Crossref","is-referenced-by-count":11,"title":["Towards Secure Classical-Quantum Systems"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Volya","sequence":"first","affiliation":[{"name":"University of Florida,Department of Computer &#x0026; Information Science &#x0026; Engineering,Gainesville,Florida,USA"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical &#x0026; Computer Engineering,Gainesville,Florida,USA"}]},{"given":"Nashmin","family":"Alam","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical &#x0026; Computer Engineering,Gainesville,Florida,USA"}]},{"given":"Mark","family":"Tehranipoor","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical &#x0026; Computer Engineering,Gainesville,Florida,USA"}]},{"given":"Prabhat","family":"Mishra","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Computer &#x0026; Information Science &#x0026; Engineering,Gainesville,Florida,USA"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Some Notes on Meltdown and Spectre","year":"2023"},{"key":"ref35","article-title":"A side-channel assisted attack on ntru. Cryptology ePrint Archive, Paper 2021\/790","author":"askeland","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3508352.3549417"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"2014","DOI":"10.3390\/app8112014","article-title":"Single trace side channel analysis on ntru implementation","volume":"8","author":"soojung","year":"2018","journal-title":"Applied Sciences"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1109\/ECTC51909.2023.00377","article-title":"FISHI: Fault Injection Detection in Secure Heterogeneous Integration via Power Noise Variation","author":"zhang","year":"2023","journal-title":"In 2023 IEEE 73rd Electronic Components and Technology Conference (ECTC) IEEE"},{"key":"ref37","first-page":"173","article-title":"Masking kyber: First-and higher-order implementations","author":"joppe","year":"2021","journal-title":"IACR Transactions on Cryptographic Hardware and Embedded Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3530054"},{"key":"ref36","first-page":"676","article-title":"A side-channel attack on a masked ind-cca secure saber kem implementation","author":"kalle","year":"2021","journal-title":"IACR Trans Cryptographic Hardware Embedded Syst"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"183175","DOI":"10.1109\/ACCESS.2020.3029521","article-title":"Single-trace attacks on message encoding in lattice-based kems","volume":"8","author":"bo-yeon","year":"2020","journal-title":"IEEE Access"},{"key":"ref30","article-title":"Side-channel analysis of lattice-based post-quantum cryptography: Ex-ploiting polynomial multiplication","author":"catinca","year":"2022","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3357033"},{"key":"ref33","article-title":"Drop by drop you break the rock-exploiting generic vulnerabilities in lattice-based pke\/kems using em-based physical attacks","volume":"549","author":"prasanna","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"ref32","first-page":"2163","article-title":"Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: The case study of kyber","volume":"71","author":"zhuang","year":"2021","journal-title":"IEEE Transactions on Computers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586308"},{"key":"ref1","author":"sparkes","year":"2021","journal-title":"Google demonstrates vital step towards large-scale quantum computers"},{"key":"ref17","first-page":"19","article-title":"One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation","author":"xiao","year":"2016","journal-title":"In USENIX Security Symposium"},{"key":"ref39","first-page":"527","article-title":"Pqc-sep: Power side-channel evaluation platform for post-quantum cryptography algorithms","author":"jungmin","year":"2022","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref38","article-title":"A side channel attack on a higher-order masked software implementation of saber","author":"paulsrud","year":"2022"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1109\/ETS56758.2023.10174155","article-title":"BitFREE: On Significant Speedup and Security Applications of FPGA Bitstream Format Reverse Engineering","author":"zhang","year":"2023","journal-title":"In 2023 IEEE European Test Sympo-sium (ETS) IEEE"},{"key":"ref18","first-page":"348","article-title":"Bitstream Fault Injections (BiFI)--Automated Fault Attacks against SRAM-based FPGAs","volume":"67","author":"pawel","year":"2017","journal-title":"IEEE Transactions on Computers"},{"key":"ref24","first-page":"1","article-title":"Crystals-kyber algorithm specifications and supporting documentation","volume":"2","author":"avanzi","year":"2019","journal-title":"NIST PQC Round"},{"key":"ref46","article-title":"State Preparation on Quantum Computers via Quantum Steering","author":"volya","year":"2023","journal-title":"arXiv preprint 2302 13518"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3524123"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"33347","DOI":"10.1103\/PhysRevResearch.2.033347","article-title":"Measurement-induced steering of quantum systems","volume":"2","author":"sthitadhi","year":"2020","journal-title":"Phys Rev R"},{"key":"ref26","article-title":"A side-channel attack on a hardware implementation of crystals-kyber","author":"yanning","year":"2022","journal-title":"Cryptology ePrint Archive Paper 2022\/719"},{"key":"ref48","article-title":"Qudcom: Towards quantum compilation for qudit systems","author":"volya","year":"2023","journal-title":"ArXiv"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_34"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3566097.3567927"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901949"},{"key":"ref42","first-page":"2279","article-title":"Securing Reset Operations in NISQ Quantum Computers","author":"allen","year":"2022","journal-title":"In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"ref41","first-page":"709","article-title":"Psc-tg: Rtl power side-channel leakage assessment with test pattern generation","author":"tao","year":"2021","journal-title":"ACM\/IEEE Design Automation Conf (DAC)"},{"key":"ref22","first-page":"1","article-title":"Power-based side-channel instruction-level disassembler","author":"park","year":"2018","journal-title":"In Proceedings of the 55th Annual Design Automation Conference"},{"key":"ref44","article-title":"Exploration of Quantum Computer Power Side-Channels","author":"chuanqi","year":"2023","journal-title":"arXiv preprint arXiv 2304 03315"},{"key":"ref21","year":"0"},{"key":"ref43","article-title":"Quantum mea-surement discrimination using cumulative distribution functions","author":"zachery","year":"2023","journal-title":"Proceedings of the Design Automation and Test in Europe (DATE)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_25"},{"key":"ref27","first-page":"450","article-title":"A message recovery attack on lwe\/lwr-based pke\/kems using amplitude-modulated em emanations","author":"ruize","year":"2023","journal-title":"ICISC"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30530-7_7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00049"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36400-5_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3063306"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD56317.2022.00029"},{"key":"ref3","article-title":"Impact of noise on quantum algorithms in noisy intermediate-scale quantum systems","author":"volya","year":"2020","journal-title":"In IEEE International Conference on Computer Design (ICCD)"},{"key":"ref6","first-page":"388","article-title":"Differential Power Analysis","author":"kocher","year":"1999","journal-title":"Crypto"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_9"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.1109\/TVLSI.2022.3175067","article-title":"Power side-channel leakage assessment framework at register-transfer level","volume":"30","author":"nitin","year":"2022","journal-title":"IEEE Transactions on Very Large Scale Integration (VLSI) Systems"}],"event":{"name":"2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"San Jose, CA, USA","start":{"date-parts":[[2023,5,1]]},"end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10132842\/10132914\/10133344.pdf?arnumber=10133344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T01:58:05Z","timestamp":1702519085000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10133344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/host55118.2023.10133344","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}