
ACNS 2024, Proceedings, Part II, Lecture Notes in
Computer Science.
Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V.,
Schanck, J. M., Schwabe, P., Seiler, G., and Stehle,
D. (2018). CRYSTALS - Kyber: A CCA-Secure
Module-Lattice-Based KEM. In 2018 IEEE European
Symposium on Security and Privacy.
Chang, Y., Yan, Y., Zhu, C., and Guo, P. (2022). Template
attack of lwe/lwr-based schemes with cyclic message
rotation. Entropy.
Chari, S., Jutla, C. S., Rao, J. R., and Rohatgi, P. (1999). To-
wards sound approaches to counteract power-analysis
attacks. In Advances in Cryptology - CRYPTO ’99,
Proceedings, Lecture Notes in Computer Science.
Springer.
Dubrova, E., Ngo, K., G
¨
artner, J., and Wang, R. (2023).
Breaking a fifth-order masked implementation of
crystals-kyber by copy-paste. In Proceedings of the
10th ACM Asia Public-Key Cryptography Workshop,
APKC 2023, Melbourne, VIC, Australia, July 10-14,
2023. ACM.
Heinz, D., Kannwischer, M. J., Land, G., P
¨
oppelmann, T.,
Schwabe, P., and Sprenkels, A. (2022). First-order
masked kyber on ARM cortex-m4. IACR Cryptol.
ePrint Arch.
Kannwischer, M. J., Petri, R., Rijneveld, J., Schwabe,
P., and Stoffelen, K. (2020). PQM4: Post-quantum
crypto library for the ARM Cortex-M4.
Kocher, P. C., Jaffe, J., and Jun, B. (1999). Differential
power analysis. In Advances in Cryptology - CRYPTO
’99, Proceedings, Lecture Notes in Computer Science.
Springer.
Mujdei, C., Wouters, L., Karmakar, A., Beckers, A., Mera,
J. M. B., and Verbauwhede, I. (2022). Side-channel
analysis of lattice-based post-quantum cryptography:
Exploiting polynomial multiplication. ACM Trans.
Embed. Comput. Syst.
Ngo, K., Dubrova, E., and Johansson, T. (2021). Break-
ing masked and shuffled CCA secure saber KEM by
power analysis. In ASHES@CCS: 5th Workshop on
Attacks and Solutions in Hardware Security. ACM.
Ngo, K., Wang, R., Dubrova, E., and Paulsrud, N. (2022).
Side-channel attacks on lattice-based kems are not
prevented by higher-order masking. IACR Cryptol.
ePrint Arch.
O’Flynn, C. and Chen, Z. D. (2014). Chipwhisperer: An
open-source platform for hardware embedded security
research. In Constructive Side-Channel Analysis and
Secure Design - 5th International Workshop, Lecture
Notes in Computer Science. Springer.
Picek, S., Perin, G., Mariot, L., Wu, L., and Batina, L.
(2023). Sok: Deep learning-based physical side-
channel analysis. ACM Comput. Surv., (11).
Primas, R., Pessl, P., and Mangard, S. (2017). Single-trace
side-channel attacks on masked lattice-based encryp-
tion. In Cryptographic Hardware and Embedded Sys-
tems - CHES Proceedings, Lecture Notes in Computer
Science. Springer.
Rajendran, G., Ravi, P., D’Anvers, J., Bhasin, S., and Chat-
topadhyay, A. (2023). Pushing the limits of generic
side-channel attacks on lwe-based kems - parallel PC
oracle attacks on kyber KEM and beyond. IACR
Trans. Cryptogr. Hardw. Embed. Syst., (2).
Ravi, P., Bhasin, S., Roy, S. S., and Chattopadhyay, A.
(2020a). On exploiting message leakage in (few)
NIST PQC candidates for practical message recovery
and key recovery attacks. IACR Cryptol. ePrint Arch.
Ravi, P., Chattopadhyay, A., and Baksi, A. (2022). Side-
channel and fault-injection attacks over lattice-based
post-quantum schemes (kyber, dilithium): Survey and
new results. IACR Cryptol. ePrint Arch.
Ravi, P., Roy, S. S., Chattopadhyay, A., and Bhasin, S.
(2020b). Generic side-channel attacks on cca-secure
lattice-based PKE and kems. IACR Trans. Cryptogr.
Hardw. Embed. Syst., (3).
Saarinen, M. O. (2022). Wip: Applicability of ISO stan-
dard side-channel leakage tests to NIST post-quantum
cryptography. In IEEE International Symposium on
Hardware Oriented Security and Trust, HOST. IEEE.
Schneider, T. and Moradi, A. (2015). Leakage assessment
methodology - A clear roadmap for side-channel eval-
uations. In Cryptographic Hardware and Embedded
Systems - CHES Proceedings, Lecture Notes in Com-
puter Science. Springer.
Sim, B., Kwon, J., Lee, J., Kim, I., Lee, T., Han, J., Yoon,
H. J., Cho, J., and Han, D. (2020). Single-trace attacks
on message encoding in lattice-based kems. IEEE Ac-
cess.
Sim, B., Park, A., and Han, D. (2022). Chosen-ciphertext
clustering attack on CRYSTALS-KYBER using the
side-channel leakage of barrett reduction. IEEE In-
ternet Things J., (21).
Ueno, R., Xagawa, K., Tanaka, Y., Ito, A., Takahashi,
J., and Homma, N. (2022). Curse of re-encryption:
A generic power/em analysis on post-quantum kems.
IACR Trans. Cryptogr. Hardw. Embed. Syst., (1).
Welch, B. L. (1947). The generalization of ‘student’s’ prob-
lem when several different population varlances are
involved. Biometrika, (1-2).
Yang, B., Ravi, P., Zhang, F., Shen, A., and Bhasin, S.
(2023). Stamp-single trace attack on M-LWE point-
wise multiplication in kyber. IACR Cryptol. ePrint
Arch.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
380