KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM. We demonstrate the exploitability of both KyberSlash1 and KyberSlas...
| الحاوية / القاعدة: | Transactions on Cryptographic Hardware and Embedded Systems |
|---|---|
| المؤلفون الرئيسيون: | , , , , , , , , , |
| التنسيق: | مقال |
| اللغة: | الإنجليزية |
| منشور في: |
Ruhr-Universität Bochum
2025-03-01
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | https://tches.iacr.org/index.php/TCHES/article/view/12046 |
