{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:54:18Z","timestamp":1774536858234,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Swedish Civil Contingencies Agency","award":["2020-11632"],"award-info":[{"award-number":["2020-11632"]}]},{"name":"Swedish Research Council","award":["2018-04482"],"award-info":[{"award-number":["2018-04482"]}]},{"name":"Sweden's Innovation Agency Vinnova","award":["2021-02426"],"award-info":[{"award-number":["2021-02426"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605769.3623992","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T08:31:21Z","timestamp":1700728281000},"page":"27-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4973-7412","authenticated-orcid":false,"given":"Yanning","family":"Ji","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7382-9408","authenticated-orcid":false,"given":"Elena","family":"Dubrova","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. CW-Analyzer Tool - Wiki. https:\/\/wiki.newae.com\/CW-Analyzer_Tool  [n. d.]. CW-Analyzer Tool - Wiki. https:\/\/wiki.newae.com\/CW-Analyzer_Tool"},{"key":"e_1_3_2_1_2_1","volume-title":"Announcing the Commercial National Security Algorithm Suite 2.0","year":"2022","unstructured":"2022. Announcing the Commercial National Security Algorithm Suite 2.0 . National Security Agency, U.S Department of Defense (Sep 2022 ). https:\/\/media.defense.gov\/2022\/Sep\/07\/2003071834\/-1\/- 1\/0\/CSA_CNSA_2.0_ALGORITHMS_.PDF. 2022. Announcing the Commercial National Security Algorithm Suite 2.0. National Security Agency, U.S Department of Defense (Sep 2022). https:\/\/media.defense.gov\/2022\/Sep\/07\/2003071834\/-1\/- 1\/0\/CSA_CNSA_2.0_ALGORITHMS_.PDF."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Dakshi Agrawal Bruce Archambeault Josyula R. Rao and Pankaj Rohatgi. 2003. The EM Side-Channel(s). In Crypt. Hardware and Embedded Systems. 29--45.  Dakshi Agrawal Bruce Archambeault Josyula R. Rao and Pankaj Rohatgi. 2003. The EM Side-Channel(s). In Crypt. Hardware and Embedded Systems. 29--45.","DOI":"10.1007\/3-540-36400-5_4"},{"key":"e_1_3_2_1_4_1","unstructured":"Roberto Avanzi Joppe Bos L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky John M. Schanck Peter Schwabe Gregor Seiler and Damien. Stehl\u00e9. 2021. CRYSTALS-Kyber algorithm specifications and supporting documentation. (2021). https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3--20210131.pdf  Roberto Avanzi Joppe Bos L\u00e9o Ducas Eike Kiltz Tancr\u00e8de Lepoint Vadim Lyubashevsky John M. Schanck Peter Schwabe Gregor Seiler and Damien. Stehl\u00e9. 2021. CRYSTALS-Kyber algorithm specifications and supporting documentation. (2021). https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3--20210131.pdf"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Melissa Azouaoui Yulia Kuzovkova Tobias Schneider and Christine van Vredendaal. 2022. Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. Cryptology ePrint Archive Paper 2022\/916.  Melissa Azouaoui Yulia Kuzovkova Tobias Schneider and Christine van Vredendaal. 2022. Post-Quantum Authenticated Encryption against Chosen-Ciphertext Side-Channel Attacks. Cryptology ePrint Archive Paper 2022\/916.","DOI":"10.46586\/tches.v2022.i4.372-396"},{"key":"e_1_3_2_1_6_1","unstructured":"Linus Backlund Kalle Ngo Joel Gartner and Elena Dubrova. 2022. Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. Cryptology ePrint Archive Paper 2022\/1692.  Linus Backlund Kalle Ngo Joel Gartner and Elena Dubrova. 2022. Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber. Cryptology ePrint Archive Paper 2022\/1692."},{"key":"e_1_3_2_1_7_1","article-title":"Automated Software Protection for the Masses Against SideChannel Attacks","volume":"16","author":"Belleville Nicolas","year":"2018","unstructured":"Nicolas Belleville , Damien Courousse , Karine Heydemann , and Henri-Pierre Charles . 2018 . Automated Software Protection for the Masses Against SideChannel Attacks . ACM Trans. Archit. Code Optim. 16 , 4 (2018). Issue 4. Nicolas Belleville, Damien Courousse, Karine Heydemann, and Henri-Pierre Charles. 2018. Automated Software Protection for the Masses Against SideChannel Attacks. ACM Trans. Archit. Code Optim. 16, 4 (2018). Issue 4.","journal-title":"ACM Trans. Archit. Code Optim."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24390"},{"key":"e_1_3_2_1_9_1","volume-title":"Masking Kyber: First- and Higher-Order Implementations. IACR Trans. on Crypt. Hardware and Embedded Systems 4 (Aug.","author":"Bos Joppe W.","year":"2021","unstructured":"Joppe W. Bos , Marc Gourjon , Joost Renes , Tobias Schneider , and Christine van Vredendaal . 2021 . Masking Kyber: First- and Higher-Order Implementations. IACR Trans. on Crypt. Hardware and Embedded Systems 4 (Aug. 2021), 173--214. Joppe W. Bos, Marc Gourjon, Joost Renes, Tobias Schneider, and Christine van Vredendaal. 2021. Masking Kyber: First- and Higher-Order Implementations. IACR Trans. on Crypt. Hardware and Embedded Systems 4 (Aug. 2021), 173--214."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23696-0_11"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_26"},{"key":"e_1_3_2_1_12_1","volume-title":"Crypt. Hardware and Embedded Systems","author":"Coron Jean-S\u00e9bastien","unstructured":"Jean-S\u00e9bastien Coron and Ilya Kizhvatov . 2009. An Efficient Method for Random Delay Generation in Embedded Software . In Crypt. Hardware and Embedded Systems . Springer Berlin Heidelberg , 156--170. Jean-S\u00e9bastien Coron and Ilya Kizhvatov. 2009. An Efficient Method for Random Delay Generation in Embedded Software. In Crypt. Hardware and Embedded Systems. Springer Berlin Heidelberg, 156--170."},{"key":"e_1_3_2_1_13_1","volume-title":"Michiel Van Beirendonck, and Ingrid Verbauwhede","author":"D'Anvers Jan-Pieter","year":"2022","unstructured":"Jan-Pieter D'Anvers , Michiel Van Beirendonck, and Ingrid Verbauwhede . 2022 . Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations. Cryptology ePrint Archive, Paper 2022\/110. Jan-Pieter D'Anvers, Michiel Van Beirendonck, and Ingrid Verbauwhede. 2022. Revisiting Higher-Order Masked Comparison for Lattice-Based Cryptography: Algorithms and Bit-sliced Implementations. Cryptology ePrint Archive, Paper 2022\/110."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591866.3593072"},{"key":"e_1_3_2_1_15_1","volume-title":"Annual international cryptology conference","author":"Fujisaki Eiichiro","unstructured":"Eiichiro Fujisaki and Tatsuaki Okamoto . 1999. Secure integration of asymmetric and symmetric encryption schemes . In Annual international cryptology conference . Springer , 537--554. Eiichiro Fujisaki and Tatsuaki Okamoto. 1999. Secure integration of asymmetric and symmetric encryption schemes. In Annual international cryptology conference. Springer, 537--554."},{"key":"e_1_3_2_1_16_1","volume-title":"NIST Non-Invasive Attack Testing Workshop","volume":"7","author":"Goodwill Gilbert","year":"2011","unstructured":"Gilbert Goodwill , Benjamin Jun , Josh Jaffe , and Pankaj Rohatgi . 2011 . A testing methodology for side-channel resistance validation . In NIST Non-Invasive Attack Testing Workshop , Vol. 7 . 115--136. Gilbert Goodwill, Benjamin Jun, Josh Jaffe, and Pankaj Rohatgi. 2011. A testing methodology for side-channel resistance validation. In NIST Non-Invasive Attack Testing Workshop, Vol. 7. 115--136."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2996366.2996426"},{"key":"e_1_3_2_1_18_1","unstructured":"Cl\u00e9ment Hoffmann Beno\u00eet Libert Charles Momin Thomas Peters and Fran\u00e7oisXavier Standaert. 2022. Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption. Cryptology ePrint Archive Paper 2022\/873.  Cl\u00e9ment Hoffmann Beno\u00eet Libert Charles Momin Thomas Peters and Fran\u00e7oisXavier Standaert. 2022. Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption. Cryptology ePrint Archive Paper 2022\/873."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1587\/elex.17.20200234"},{"key":"e_1_3_2_1_20_1","unstructured":"Arpan Jati Naina Gupta Anupam Chattopadhyay and Somitra Kumar Sanadhya. 2021. A Configurable CRYSTALS-Kyber Hardware Implementation with SideChannel Protection. Cryptology ePrint Archive Paper 2021\/1189.  Arpan Jati Naina Gupta Anupam Chattopadhyay and Somitra Kumar Sanadhya. 2021. A Configurable CRYSTALS-Kyber Hardware Implementation with SideChannel Protection. Cryptology ePrint Archive Paper 2021\/1189."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETS56758.2023.10174000"},{"key":"e_1_3_2_1_22_1","unstructured":"Tendayi Kamucheka Michael Fahr Tristen Teague Alexander Nelson David Andrews and Miaoqing Huang. 2021. Power-based Side Channel Attack Analysis on PQC Algorithms. Cryptology ePrint Archive Paper 2021\/1021.  Tendayi Kamucheka Michael Fahr Tristen Teague Alexander Nelson David Andrews and Miaoqing Huang. 2021. Power-based Side Channel Attack Analysis on PQC Algorithms. Cryptology ePrint Archive Paper 2021\/1021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT56656.2022.9974404"},{"key":"e_1_3_2_1_24_1","volume-title":"Advances in Cryptology - CRYPTO' 99","author":"Kocher Paul","unstructured":"Paul Kocher , Joshua Jaffe , and Benjamin Jun . 1999. Differential Power Analysis . In Advances in Cryptology - CRYPTO' 99 . Springer Berlin Heidelberg , 388--397. Paul Kocher, Joshua Jaffe, and Benjamin Jun. 1999. Differential Power Analysis. In Advances in Cryptology - CRYPTO' 99. Springer Berlin Heidelberg, 388--397."},{"key":"e_1_3_2_1_25_1","volume-title":"RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO '96","author":"Kocher Paul C.","unstructured":"Paul C. Kocher . 1996. Timing Attacks on Implementations of Diffie-Hellman , RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO '96 , Neal Koblitz (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg , 104--113. Paul C. Kocher. 1996. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - CRYPTO '96, Neal Koblitz (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 104--113."},{"key":"e_1_3_2_1_26_1","unstructured":"Paul C. Kocher Joshua Jaffe and Benjamin Jun. [n. d.]. Using unpredictable information to minimize leakage from smartcards and other cryptosystems. US Patent 6 327 661.  Paul C. Kocher Joshua Jaffe and Benjamin Jun. [n. d.]. Using unpredictable information to minimize leakage from smartcards and other cryptosystems. US Patent 6 327 661."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST56390.2022.10022165"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Houssem Maghrebi Victor Servant and Julien Bringer. 2016. There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks. In Fast Software Encryption. 223--243.  Houssem Maghrebi Victor Servant and Julien Bringer. 2016. There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks. In Fast Software Encryption. 223--243.","DOI":"10.1007\/978-3-662-52993-5_12"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process","volume":"8309","author":"Moody Dustin","year":"2022","unstructured":"Dustin Moody . 2022 . Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process . Nistir 8309 (2022), 1 -- 27 . https:\/\/nvlpubs. nist.gov\/nistpubs\/ir\/2022\/NIST.IR.8413.pdf Dustin Moody. 2022. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. Nistir 8309 (2022), 1--27. https:\/\/nvlpubs. nist.gov\/nistpubs\/ir\/2022\/NIST.IR.8413.pdf","journal-title":"Nistir"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2023.3298805"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3526241.3530324"},{"key":"e_1_3_2_1_32_1","volume-title":"A sidechannel attack on a masked IND-CCA secure Saber KEM implementation. IACR Trans. on Cryptographic Hardware and Embedded Systems","author":"Ngo Kalle","year":"2021","unstructured":"Kalle Ngo , Elena Dubrova , Qian Guo , and Thomas Johansson . 2021. A sidechannel attack on a masked IND-CCA secure Saber KEM implementation. IACR Trans. on Cryptographic Hardware and Embedded Systems ( 2021 ), 676--707. Kalle Ngo, Elena Dubrova, Qian Guo, and Thomas Johansson. 2021. A sidechannel attack on a masked IND-CCA secure Saber KEM implementation. IACR Trans. on Cryptographic Hardware and Embedded Systems (2021), 676--707."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_38"},{"key":"e_1_3_2_1_34_1","unstructured":"Rafael Carrera Rodriguez Florent Bruguier Emanuele Valea and Pascal Benoit. 2022. Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber. Cryptology ePrint Archive Paper 2022\/1361.  Rafael Carrera Rodriguez Florent Bruguier Emanuele Valea and Pascal Benoit. 2022. Correlation Electromagnetic Analysis on an FPGA Implementation of CRYSTALS-Kyber. Cryptology ePrint Archive Paper 2022\/1361."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Muyan Shen Chi Cheng Xiaohan Zhang Qian Guo and Tao Jiang. 2022. Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles -- A case study of Kyber. Cryptology ePrint Archive Paper 2022\/563.  Muyan Shen Chi Cheng Xiaohan Zhang Qian Guo and Tao Jiang. 2022. Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles -- A case study of Kyber. Cryptology ePrint Archive Paper 2022\/563.","DOI":"10.46586\/tches.v2023.i1.89-112"},{"key":"e_1_3_2_1_36_1","volume-title":"Formal Evaluation and Construction of Glitchresistant Masked Functions. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST'2021)","author":"Takarabt Sofiane","year":"2021","unstructured":"Sofiane Takarabt , Sylvain Guilley , Youssef Souissi , Khaled Karray , Laurent Sauvage , and Yves Mathieu . 2021 . Formal Evaluation and Construction of Glitchresistant Masked Functions. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST'2021) . 304--313. Sofiane Takarabt, Sylvain Guilley, Youssef Souissi, Khaled Karray, Laurent Sauvage, and Yves Mathieu. 2021. Formal Evaluation and Construction of Glitchresistant Masked Functions. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST'2021). 304--313."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3198073"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"Curse of Re-encryption: A Generic Power\/EM Analysis on PostQuantum KEMs","volume":"2022","author":"Ueno Rei","year":"2021","unstructured":"Rei Ueno , Keita Xagawa , Yutaro Tanaka , Akira Ito , Junko Takahashi , and Naofumi Homma . 2021 . Curse of Re-encryption: A Generic Power\/EM Analysis on PostQuantum KEMs . IACR Tran. on Cryptographic Hardware and Embedded Systems 2022 , 1 (Nov. 2021), 296--322. Rei Ueno, Keita Xagawa, Yutaro Tanaka, Akira Ito, Junko Takahashi, and Naofumi Homma. 2021. Curse of Re-encryption: A Generic Power\/EM Analysis on PostQuantum KEMs. IACR Tran. on Cryptographic Hardware and Embedded Systems 2022, 1 (Nov. 2021), 296--322.","journal-title":"IACR Tran. on Cryptographic Hardware and Embedded Systems"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Veyrat-Charvillon et al. 2012. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. In Advances in Cryptology -- ASIACRYPT 2012. Springer Berlin Heidelberg 740--757.  Veyrat-Charvillon et al. 2012. Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note. In Advances in Cryptology -- ASIACRYPT 2012. Springer Berlin Heidelberg 740--757.","DOI":"10.1007\/978-3-642-34961-4_44"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMVL49045.2020.00-29"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/34.1-2.1"},{"key":"e_1_3_2_1_42_1","volume-title":"A compact hardware implementation of CCAsecure key exchange mechanism CRYSTALS-Kyber on FPGA. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Xing Yufei","year":"2021","unstructured":"Yufei Xing and Shuguo Li. 2021. A compact hardware implementation of CCAsecure key exchange mechanism CRYSTALS-Kyber on FPGA. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2021 ), 328--356. Yufei Xing and Shuguo Li. 2021. A compact hardware implementation of CCAsecure key exchange mechanism CRYSTALS-Kyber on FPGA. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 328--356."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623992","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605769.3623992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:12Z","timestamp":1750178772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605769.3623992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":42,"alternative-id":["10.1145\/3605769.3623992","10.1145\/3605769"],"URL":"https:\/\/doi.org\/10.1145\/3605769.3623992","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}