{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:37:50Z","timestamp":1771519070947,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T00:00:00Z","timestamp":1718150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,12]]},"DOI":"10.1145\/3649476.3660373","type":"proceedings-article","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T12:29:41Z","timestamp":1718022581000},"page":"216-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0201-3705","authenticated-orcid":false,"given":"Prasanna","family":"Ravi","sequence":"first","affiliation":[{"name":"Temasek Labs@NTU, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6903-5127","authenticated-orcid":false,"given":"Shivam","family":"Bhasin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8818-6983","authenticated-orcid":false,"given":"Anupam","family":"Chattopadhyay","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0934-2982","authenticated-orcid":false,"given":"Aikata","family":"Aikata","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Austria, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9805-5389","authenticated-orcid":false,"given":"Sujoy","family":"Sinha Roy","sequence":"additional","affiliation":[{"name":"IAIK, Graz University of Technology, Austria, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_6"},{"key":"e_1_3_2_1_2_1","volume-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","author":"Alagic Gorjan","year":"2022","unstructured":"Gorjan Alagic, Daniel Apon, David Cooper, Quynh Dang, Thinh Dang, John Kelsey, Jacob Lichtinger, Carl Miller, Dustin Moody, Rene Peralta, 2022. Status report on the third round of the NIST post-quantum cryptography standardization process. National Institute of Standards and Technology, Gaithersburg (2022)."},{"key":"e_1_3_2_1_3_1","volume-title":"d.]. CRYSTALS-Kyber (version 3.02) - Algorithm Specifications And Supporting Documentation (August 4","author":"Avanzi Roberto","year":"2021","unstructured":"Roberto Avanzi, Joppe Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. [n. d.]. CRYSTALS-Kyber (version 3.02) - Algorithm Specifications And Supporting Documentation (August 4, 2021). https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3-20210804.pdf. ([n. d.])."},{"key":"e_1_3_2_1_4_1","volume-title":"Algorithm specifications and supporting documentation (October 1","author":"Avanzi Roberto","year":"2020","unstructured":"Roberto Avanzi, Joppe\u00a0W. Bos, Leo Ducas, Eike Kiltz, Tancrede Lepoint, Vadim Lyubashevsky, John Schanck, Peter Schwabe, Gregor Seiler, and Damien Stehl\u00e9. 2020. CRYSTALS-Kyber (version 3.0): Algorithm specifications and supporting documentation (October 1, 2020). https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3.pdf. (2020)."},{"key":"e_1_3_2_1_5_1","volume-title":"Classic McEliece: conservative code-based cryptography. NIST submissions","author":"Bernstein J","year":"2021","unstructured":"Daniel\u00a0J Bernstein, Tung Chou, Tanja Lange, Ingo von Maurich, Rafael Misoczki, Ruben Niederhagen, Edoardo Persichetti, Christiane Peters, Peter Schwabe, Nicolas Sendrier, 2021. Classic McEliece: conservative code-based cryptography. NIST submissions (2021)."},{"key":"e_1_3_2_1_6_1","volume-title":"RSA Conference. Springer, 250\u2013265","author":"Brown Michael","year":"2001","unstructured":"Michael Brown, Darrel Hankerson, Julio L\u00f3pez, and Alfred Menezes. 2001. Software implementation of the NIST elliptic curves over prime fields. In Cryptographers\u2019 Track at the RSA Conference. Springer, 250\u2013265."},{"key":"e_1_3_2_1_7_1","first-page":"1381","article-title":"How to backdoor LWE-like cryptosystems","volume":"2022","author":"Hemmert Tobias","year":"2022","unstructured":"Tobias Hemmert. 2022. How to backdoor LWE-like cryptosystems. Cryptology ePrint Archive 2022 (2022), 1381.","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 336\u2013354","author":"Kwant Robin","year":"2017","unstructured":"Robin Kwant, Tanja Lange, and Kimberley Thissen. 2017. Lattice klepto. In International Conference on Selected Areas in Cryptography. Springer, 336\u2013354."},{"key":"e_1_3_2_1_9_1","unstructured":"Michele Mosca and Douglas Stebila. 2017. Open Quantum Safe. (2017)."},{"key":"e_1_3_2_1_10_1","volume-title":"Recommendation for Random Number Generation Using Deterministic Random Bit Generators","author":"SP NIST.","year":"2007","unstructured":"SP NIST. 2007. 800-90. Recommendation for Random Number Generation Using Deterministic Random Bit Generators (2007)."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"NSA able to foil basic safeguards of privacy on web. http:\/\/www.nytimes.com\/2013\/09\/06\/us\/nsa-foils-much-internet-encryption.html","volume":"5","author":"Perlroth Nicole","year":"2013","unstructured":"Nicole Perlroth, Jeff Larson, and Scott Shane. 2013. NSA able to foil basic safeguards of privacy on web. http:\/\/www.nytimes.com\/2013\/09\/06\/us\/nsa-foils-much-internet-encryption.html. The New York Times 5 (2013), 1\u20138.","journal-title":"The New York Times"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy060"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxz084"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384768"},{"key":"e_1_3_2_1_15_1","volume-title":"The new codebreakers","author":"Young Adam","unstructured":"Adam Young and Moti Yung. 2016. Cryptography as an attack technology: Proving the RSA\/factoring kleptographic attack. In The new codebreakers. Springer, 243\u2013255."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502676"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052241"}],"event":{"name":"GLSVLSI '24: Great Lakes Symposium on VLSI 2024","location":"Clearwater FL USA","acronym":"GLSVLSI '24","sponsor":["SIGDA ACM Special Interest Group on Design Automation"]},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3660373","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649476.3660373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T02:31:18Z","timestamp":1755829878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649476.3660373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,12]]},"references-count":17,"alternative-id":["10.1145\/3649476.3660373","10.1145\/3649476"],"URL":"https:\/\/doi.org\/10.1145\/3649476.3660373","relation":{},"subject":[],"published":{"date-parts":[[2024,6,12]]},"assertion":[{"value":"2024-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}