{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:17:50Z","timestamp":1771341470545,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T00:00:00Z","timestamp":1714953600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,6]]},"DOI":"10.1109\/host55342.2024.10545390","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:21:52Z","timestamp":1717694512000},"page":"70-73","source":"Crossref","is-referenced-by-count":4,"title":["Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace"],"prefix":"10.1109","author":[{"given":"S\u00f6nke","family":"Jendral","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Kalle","family":"Ngo","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Ruize","family":"Wang","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]},{"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology,Stockholm,Sweden"}]}],"member":"263","reference":[{"key":"ref1","article-title":"PQC standardization process: Announcing four candidates to be standardized, plus fourth round candidates","volume-title":"NIST Computer Security Resource Center","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3530054"},{"issue":"2","key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/cryptography4020015","article-title":"Power side-channel attack analysis: A review of 20 years of study for the layman","volume":"4","author":"Randolph","year":"2020","journal-title":"Cryptography"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3517810","article-title":"A review and comparison of AI-enhanced side channel analysis","volume":"18","author":"Panoff","year":"2022","journal-title":"ACM Journal on Emerging Technologies in Computing Systems (JETC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.676-707"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.307-335"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2023.3298805"},{"key":"ref9","first-page":"158","article-title":"Bitslicing arithmetic\/boolean masking conversions for fun and profit with application to lattice-based KEMs","author":"Bronchain","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref10","first-page":"810","article-title":"Fault injection using crowbars on embedded systems","author":"OFlynn","year":"2016","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"ref11","first-page":"1042","article-title":"A side-channel attack on a bitsliced higher-order masked CRYSTALS-Kyber implementation","author":"Wang","year":"2023","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-41181-6_9"},{"key":"ref13","volume-title":"Statistical tables for biological, agricultural and medical research","author":"Fisher","year":"1948"},{"key":"ref14","author":"Ravi","journal-title":"Side-channel attack resistant implementation of Kyber key-exchange scheme"},{"key":"ref15","author":"Ravi","journal-title":"Configurable SCA countermeasures for the NTT against single trace attacks"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3474376.3487277"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref18","first-page":"737","article-title":"Side-channel and faultinjection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): Survey and new results","author":"Ravi","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."}],"event":{"name":"2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Tysons Corner, VA, USA","start":{"date-parts":[[2024,5,6]]},"end":{"date-parts":[[2024,5,9]]}},"container-title":["2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10545333\/10545347\/10545390.pdf?arnumber=10545390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T18:29:11Z","timestamp":1719340151000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10545390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,6]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/host55342.2024.10545390","relation":{},"subject":[],"published":{"date-parts":[[2024,5,6]]}}}