KyberSlash: Exploiting secret-dependent division timings in Kyber implementations

This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM. We demonstrate the exploitability of both KyberSlash1 and KyberSlas...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Transactions on Cryptographic Hardware and Embedded Systems
المؤلفون الرئيسيون: Daniel J. Bernstein, Karthikeyan Bhargavan, Shivam Bhasin, Anupam Chattopadhyay, Tee Kiah Chia, Matthias J. Kannwischer, Franziskus Kiefer, Thales B. Paiva, Prasanna Ravi, Goutam Tamvada
التنسيق: مقال
اللغة:الإنجليزية
منشور في: Ruhr-Universität Bochum 2025-03-01
الموضوعات:
الوصول للمادة أونلاين:https://tches.iacr.org/index.php/TCHES/article/view/12046