
REFERENCES
Arribas, V., Bilgin, B., Petrides, G., Nikova, S., and Rijmen,
V. (2018). Rhythmic Keccak: SCA security and low
latency in HW. IACR Transactions on Cryptographic
Hardware and Embedded Systems.
Arshad, A., Aziz, A., et al. (2014). Compact implementa-
tion of SHA3-512 on FPGA. In Conference on Infor-
mation Assurance and Cyber Security (CIACS).
Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyuba-
shevsky, V., Schanck, J. M., Schwabe, P., Seiler, G.,
and Stehl
´
e, D. (2019). Crystals-kyber algorithm spec-
ifications and supporting documentation. NIST PQC
Round.
Bernstein, D. J., H
¨
ulsing, A., K
¨
olbl, S., Niederhagen, R.,
Rijneveld, J., and Schwabe, P. (2019). The sphincs+
signature framework. In Proceedings of the 2019
ACM SIGSAC.
Berzati, A., Viera, A. C., Chartouny, M., Madec, S.,
Vergnaud, D., and Vigilant, D. (2023). Exploiting
intermediate value leakage in dilithium: a template-
based approach. IACR Transactions on Cryptographic
Hardware and Embedded Systems.
Bilgin, B., Daemen, J., Nikov, V., Nikova, S., Rijmen, V.,
and Van Assche, G. (2014). Efficient and first-order
dpa resistant implementations of keccak. In Smart
Card Research and Advanced Applications, CARDIS
2013.
Cassiers, G., Devillez, H., Standaert, F. o.-X., and Udvarhe-
lyi, B. (2023). Efficient Regression-Based Linear Dis-
criminant Analysis for Side-Channel Security Evalu-
ations: Towards Analytical Attacks against 32-bit Im-
plementations. IACR Transactions on Cryptographic
Hardware and Embedded Systems.
Coinwarz. Bitcoin hash rate. https://www.coinwarz.com.
Dolecek, L., Zhang, Z., Anantharam, V., Wainwright, M. J.,
and Nikolic, B. (2009). Analysis of absorbing sets and
fully absorbing sets of array-based ldpc codes. IEEE
Transactions on Information Theory.
Dworkin, M. J. (2015). SHA-3 standard: Permutation-
based hash and extendable-output functions.
Fujisaki, E. and Okamoto, T. (1999). Secure integration
of asymmetric and symmetric encryption schemes. In
Annual international cryptology conference.
Groß, H., Schaffenrath, D., and Mangard, S. (2017).
Higher-order side-channel protected implementations
of keccak. In 2017 Euromicro Conference on Digital
System Design (DSD).
Grosso, V. (2019). Scalable key rank estimation (and key
enumeration) algorithm for large keys. In Smart Card
Research and Advanced Applications, CARDIS 2018.
Grosso, V. and Standaert, F.-X. (2015). ASCA, SASCA and
DPA with enumeration: which one beats the other and
when? In Advances in Cryptology, ASIACRYPT 2015.
Hamburg, M., Hermelink, J., Primas, R., Samardjiska, S.,
Schamberger, T., Streit, S., Strieder, E., and van Vre-
dendaal, C. (2021). Chosen ciphertext k-trace attacks
on masked cca2 secure kyber. IACR Transactions on
Cryptographic Hardware and Embedded Systems.
Hermelink, J., Streit, S., Strieder, E., and Thieme, K.
(2023). Adapting belief propagation to counter shuf-
fling of NTTs. IACR Transactions on Cryptographic
Hardware and Embedded Systems.
Kannwischer, M. J., Pessl, P., and Primas, R. (2020).
Single-trace attacks on keccak. Cryptology ePrint
Archive.
Kschischang, F. R., Frey, B. J., and Loeliger, H.-A. (2001).
Factor graphs and the sum-product algorithm. IEEE
Transactions on information theory.
Lyubashevsky, V., Ducas, L., Kiltz, E., Lepoint, T.,
Schwabe, P., Seiler, G., Stehl
´
e, D., and Bai, S. (2020).
Crystals-dilithium. Algorithm Specifications and Sup-
porting Documentation.
Michail, H. E., Ioannou, L., and Voyiatzis, A. G. (2015).
Pipelined SHA-3 implementations on FPGA: Archi-
tecture and performance analysis. In Proceedings of
the Second Workshop on Cryptography and Security
in Computing Systems.
O’flynn, C. and Chen, Z. (2014). Chipwhisperer: An
open-source platform for hardware embedded secu-
rity research. In Constructive Side-Channel Analy-
sis and Secure Design: 5th International Workshop,
COSADE 2014.
Pessl, P. and Primas, R. (2019). More practical single-trace
attacks on the number theoretic transform. In Progress
in Cryptology–LATINCRYPT 2019.
Poussier, R., Standaert, F.-X., and Grosso, V. (2016). Sim-
ple key enumeration (and rank estimation) using his-
tograms: An integrated approach. In Cryptographic
Hardware and Embedded Systems, CHES.
Primas, R., Pessl, P., and Mangard, S. (2017). Single-
trace side-channel attacks on masked lattice-based en-
cryption. In Cryptographic Hardware and Embedded
Systems–CHES 2017: 19th International Conference,
Taipei, Taiwan, September 25-28, 2017, Proceedings.
Satorras, V. G. and Welling, M. (2021). Neural enhanced
belief propagation on factor graphs. In International
Conference on Artificial Intelligence and Statistics.
Sundal, M. and Chaves, R. (2017). Efficient FPGA imple-
mentation of the SHA-3 hash function. In IEEE Com-
puter Society Annual Symposium on VLSI (ISVLSI).
Veyrat-Charvillon, N., G
´
erard, B., Renauld, M., and Stan-
daert, F.-X. (2013). An optimal key enumeration al-
gorithm and its application to side-channel attacks. In
Selected Areas in Cryptography, SAC 2012.
Veyrat-Charvillon, N., G
´
erard, B., and Standaert, F.-X.
(2014). Soft analytical side-channel attacks. In Ad-
vances in Cryptology–ASIACRYPT 2014: 20th Inter-
national Conference on the Theory and Application of
Cryptology and Information Security.
You, S.-C. and Kuhn, M. G. (2021). Single-trace fragment
template attack on a 32-bit implementation of keccak.
In International Conference on Smart Card Research
and Advanced Applications.
Zohner, M., Kasper, M., St
¨
ottinger, M., and Huss, S. A.
(2012). Side channel analysis of the sha-3 finalists.
In 2012 Design, Automation & Test in Europe Confer-
ence & Exhibition (DATE).
Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic Schemes
527