<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience ⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Assel Mukasheva</string-name>
          <email>a.mukasheva@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CPITS-II 2024: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Caucasus University</institution>
          ,
          <addr-line>1 Paata Saakadze str., 0102 Tbilisi</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kazakh-British Technical University</institution>
          ,
          <addr-line>59 Tole Bi str., 050000 Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., 03058 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>342</fpage>
      <lpage>349</lpage>
      <abstract>
        <p>The recent advancements in artificial intelligence and quantum computing pose a significant threat to traditional public key cryptosystems. In this context, Kyber, a post-quantum encryption technique relying on lattice problem hardness, has been standardized. Despite thorough testing by the National Institute of Standards and Technology (NIST), recent investigations expose vulnerabilities in CRYSTALS-Kyber, demonstrating its susceptibility to attacks in non-controlled environments using AI. This study delves into the susceptibility of CRYSTALS-Kyber to side-channel attacks. Based on the study of the reference implementation of Kyber512, it becomes clear that the use of selected ciphertext allows additional functions to be compromised. The successful implementation of the last allows for real-time recovery of the entire secret key in various attack scenarios.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;post-quantum cryptography</kwd>
        <kwd>machine learning</kwd>
        <kwd>recursive learning</kwd>
        <kwd>lattices</kwd>
        <kwd>NIST</kwd>
        <kwd>Kyber 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The impending rise of quantum computing heralds a
transformative era in computing capabilities. Post-quantum
cryptography, or quantum encryption, offers mechanisms
to protect classical computers from potential threats posed
by quantum computers. These systems provide defense
mechanisms against the exponential speed advantage of
quantum computers, which exploit the distinctive properties
of quantum mechanics. The urgency of this transition is
underscored by the stark contrast between the rapid quantum
computing of complex problems and the prolonged execution
times required by traditional computers.</p>
      <p>
        The development of quantum computing raises
concerns about the viability of current cryptographic
methodologies, particularly those reliant on RSA. RSA, a
widely used public key cryptosystem, relies on the
complexity of mathematical problems such as integer
factorization. However, the advent of large-scale quantum
computers equipped with Shor’s algorithm poses a
significant threat to the security of existing public key
cryptographic systems by rapidly solving these
mathematical challenges [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ].
      </p>
      <p>In response to this impending challenge, post-quantum
cryptosystems are being developed to withstand and thwart
quantum attacks. The evolution of quantum technology
necessitates the continuous pursuit of resilient
postquantum systems, as conventional asymmetric methods like
RSA may prove inadequate in safeguarding private data.
To anticipate the impact of quantum computers on
cryptographic security, the National Institute of Standards
and Technology (NIST) launched the Post-Quantum
Cryptography Standardization Initiative (NIST PQC) in
2016. This initiative aims to establish robust cryptographic
algorithm standards capable of withstanding quantum
computer attacks and protecting confidential data in the
post-quantum computing era. The project’s approach
involves soliciting, evaluating, and standardizing
quantumresistant cryptographic algorithms.</p>
      <p>NIST initiated the process by selecting a group of
potential algorithms submitted by the cryptography
community. Rigorous testing ensued, focusing on the
resilience of these candidates against quantum attacks. The
chosen primitives are grounded in linear error-correcting
code decoding and lattices, addressing mathematical
challenges deemed formidable for quantum computers.</p>
      <p>
        In a significant development, NIST announced in July
2022 that CRYSTALS-Kyber would become the new
standard for key setup and public key encryption (PKE).
This decision underscores its identification as a key
encapsulation mechanism (KEM) securing IND-CCA2 in
both classical and quantum models of random oracles.
CRYSTALS-Kyber’s security is rooted in the complexity of
the module learning with errors (M-LWE) problem,
introducing unknown noise into linear equations [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ].
      </p>
      <p>Furthermore, the prompt inclusion of CRYSTALS-Kyber
by the National Security Agency (NSA) in its recommended
cryptographic algorithms for national security applications
0000-0002-3109-7971 (M. Iavich);
0000-0003-4992-0564 (S. Gnatyuk);
0000-0001-9890-4910 (A. Mukasheva)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
highlights its significance in protecting cryptographic
systems from emerging quantum threats.</p>
      <p>CRYSTALS-Kyber, renowned for its IND-CCA2
security, operates as a KEM in classical and quantum
random oracle models, making it immune to adaptive
chosen ciphertext attacks. Its security derives from the
severe problem of learning with errors (M-LWE),
introducing unknown noise into linear equations. Despite
the robust theoretical security foundations of
CRYSTALSKyber and other post-quantum Public Key Encryption
(PKE)/Key Encapsulation Mechanism (KEM) algorithms,
vulnerabilities have surfaced in protected software
implementations. Advanced side-channel analysis
techniques, particularly those rooted in deep learning, have
successfully compromised various versions of
CRYSTALSKyber. These vulnerabilities encompass higher-order
masked implementations, first-order software
implementations with mask and shuffle, and first-order
mask implementations. Identifying these susceptibilities
prompted the development of enhanced defenses against
side-channel attacks, leading to the refinement of
CRYSTALS-Kyber implementations.</p>
      <p>Given the well-established vulnerabilities, it is essential
to assess and enhance the resilience of CRYSTALS-Kyber
implementations against side-channel attacks. These
attacks exploit data obtained from physically available
channels, such as the timing or power consumption of the
device running the application, posing a significant threat
to the security of cryptographic implementations.</p>
      <p>Significant progress has been made in the field of
sidechannel analysis, exemplified by Kocher et al.’s
development of Differential Side-Channel Analysis, which
utilizes differences in physical data. Another noteworthy
advancement is the introduction of Deep Learning-Based
Side-Channel Analysis, enabling attacks on a diverse array of
cryptographic systems. Existing defense mechanisms prove
inadequate against these sophisticated attacks. Additionally,
Wang et al.’s Error Injection Method has demonstrated
effectiveness in dismantling robust targets, including
CRYSTALS-Kyber’s hardware implementations, by
transforming non-differential attacks into differential ones.</p>
      <p>
        To mitigate the risks associated with side-channel
attacks, various countermeasures have been deployed.
These measures include masking, shuffling, randomized
clock, random delay insertion, constant-weight encoding, and
code polymorphism. These countermeasures aim to prevent
information leakage through physically measurable channels
such as time, power consumption, or electromagnetic radiation,
thereby protecting cryptosystems [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ].
      </p>
      <p>
        In conclusion, the development of AI and by means of it
the escalating sophistication of side-channel attacks
underscores the critical need for continuous evaluation and
enhancement of cryptographic implementation security [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
This imperative is particularly pronounced in the domain of
post-quantum cryptography algorithms like
CRYSTALSKyber. As the cryptographic landscape evolves, proactive
measures must be taken to stay ahead of emerging threats
and fortify the security posture of these vital encryption
techniques.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Kyber encryption system</title>
      <p>
        Kyber is recognized as a secure Key Encapsulation
Mechanism (KEM) with IND-CCA2 security, stemming
from its ability to address the learning-with-errors (LWE)
problem within module lattices [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It has emerged as a
prominent contender in the NIST Post-Quantum
Cryptography Project. The proposal outlines three distinct
parameter sets, meticulously crafted to achieve specific
security levels. Specifically, Kyber-512 aims to provide
security comparable to AES-128, Kyber-768 targets a level
roughly equivalent to AES-192, and Kyber-1024 aims to
match the security level of AES-256 [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        An effective strategy involves leveraging Kyber in a
hybrid mode by integrating it with established
“prequantum” security protocols. For instance, combining
Diffie-Hellman with an elliptic curve capitalizes on the
strengths of both classical and post-quantum cryptography,
thereby enhancing overall security [
        <xref ref-type="bibr" rid="ref11 ref12 ref13">11–13</xref>
        ].
      </p>
      <p>Particular emphasis is placed on recommending the use
of the Kyber-768 parameter set. This selection is grounded
in a thorough analysis indicating that it provides more than
128 bits of security against all recognized conventional and
quantum attacks. The decision is underpinned by a highly
conservative assessment, wherein 128 bits of security are
deemed exceptionally robust, offering resilience against a
spectrum of both known and unforeseen threats in the
cryptographic landscape.</p>
      <p>In the summer of 2022, the NIST selected a candidate
proposal based on Post-Quantum Cryptography (PQC) for
standardization, specifically, the CRYSTALS-Kyber. This
innovative quantum-safe key encapsulation technique falls
under the acronym CRYSTALS, representing the
Cryptographic Suite for Algebraic Lattices.</p>
      <p>Kyber, an integral component of CRYSTALS-Kyber,
stands out as a chosen ciphertext attack (CCA) secure Key
Encapsulation Mechanism (KEM). Its foundation lies in the
selected plaintext attack (CPA) secure Public Key
Encryption (PKE) technique, resulting in a CCAKEM. Figs.
1 and 2 illustrate the utilization of an adapted version of the
Fujisaki-Okamoto (FO) transform in CPAPKE. The security
level of CRYSTALS-Kyber is determined by the rank of the
module k, with the scheme utilizing vectors of ring elements
in CRYSTALS-Kyber encompasses three variants for
different values of k: Kyber-512, Kyber-768, and Kyber-1024,
corresponding to k=2,3, and 4. Given that the target
implementations support Kyber-512, this version takes
precedence. To achieve efficient multiplications in R_q,
CRYSTALS-Kyber employs the Number-Theoretic
Transform (NTT).</p>
      <p>The variable K is derived by combining the message and
the hash of the public key with the hash of the CPAPKE.Enc
function output, utilizing a key derivation function. In
simpler terms, the encryption key (K) is generated by
incorporating additional information related to the message
and public key, along with encryption function outputs
(CPAPKE.Enc).</p>
      <p>This approach is described in detail in the definition of
the Kyber.Encaps function.
The encryption process produces a value of K, and after
decryption (Kyber.Decaps), the returned value of K may
remain unchanged after encryption or be a deceptive value,
depending on the assessment of the potentially malicious
ciphertext (c).
A modification has been implemented to the input r for
CPAPKE.Enc, which is the result of the message and public
key hashing as opposed to being an arbitrary value. The
objective of this adjustment is to enhance security.</p>
      <p>Error-Based Learning systems, as examples in cases like
Kyber, are vulnerable to decryption failures. The intentional
manipulation of these failures by adversaries could
potentially result in the exposure of sensitive information.
Instances of decryption failures become more pronounced
when attackers manipulate covert vectors and error values,
causing them to surpass the defined parameters in the
CPAPKE.Enc scheme.</p>
      <p>By employing a modified variant of the
FujisakiOkamoto transform, the procedures of encapsulation and
decapsulation (Kyber.Encaps and Kyber.Decaps) ensure the
legitimate generation of random secret and error values,
with verification incorporated into the decryption process.</p>
      <p>In terms of ensuring CCA2 security, the
CRYSTALSKyber algorithm employs the Fujisaki-Okamoto
transformation. The process is initiated by decrypting the
ciphertext using CPA. Subsequently, a new ciphertext ′is
generated through “re-encryption” using CPA encryption
on the message. The process then assesses the equality
between ′and the public ciphertext c. The algorithm outputs
True if c=′and False otherwise. The session key K is
generated depending on this Boolean result. The
FujisakiOkamoto-transform is executed to verify the absence of any
alterations made by a potential adversary.</p>
      <p>Generally, the Kyber mechanism safeguards against
attackers attempting to exploit vulnerabilities of
encryption-decryption procedures.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Side-channel attacks</title>
      <p>One-time signature schemes are very inconvenient to use
because to sign each message, we need to use a different key
pair. The problem with such schemes is that they require
storing n digesting. For everyday use it is impractical, and
we would like a scheme that allows us to store a
uniformsized digest, no matter how many files we have. Merkle Tree
was proposed to solve this problem. By using a binary tree
as the root, this approach can replace a large number of
verification keys with a single public key. A cryptographic
hash function and a one-time Lamport or Winternitz
signature scheme are used in this system.</p>
      <p>
        A cryptographic system relies on highly intricate
mathematics, which may give the impression of being
impervious to mathematical attacks. However, it remains
susceptible to side-channel attacks, first identified by Paul
Kocher in 1996, which exploit data leakage while the
cryptographic device is operational. This leaked
information can manifest in various forms, such as
electromagnetic radiation, power consumption, sound
waves, or execution time. Systems employing cryptography
are vulnerable to side-channel attacks. While many
contenders in post-quantum cryptography (PQC) are
engineered to withstand direct timing attacks, certain
techniques like power and electromagnetic analysis can still
expose vulnerabilities. Researchers are actively engaged in
exploring and addressing these weaknesses, with NIST
stressing the importance of integrating side-channel
resistance into PQC. The ongoing research endeavors to
fortify PQC’s resilience against diverse side-channel attacks
[
        <xref ref-type="bibr" rid="ref14 ref15 ref16 ref17">14–17</xref>
        ].
      </p>
      <p>Extensive scholarly research has focused on examining
the susceptibility of lattice-based Key Encapsulation
Mechanisms (KEMs) to various side-channel attacks, with
particular attention on side-channel-assisted
chosenciphertext attacks (CCAs). CCAs are designed to acquire the
secret key and have been the subject of multiple studies.
These investigations delve into CCAs targeting different
operations within lattice-based KEMs. The scrutinized
operations include the Fujisaki–Okamoto (FO) transform,
message encoding/decoding, error-correcting codes, and
inverse NTT. Side-channel attacks exploit non-primary
channels, such as power usage or timing, to unveil
vulnerabilities. Researchers employed vertical side-channel
leakage detection to scrutinize the decryption mechanism of
CRYSTALS-Kyber to identify potential weaknesses in the
electrical signals generated during cryptographic operations.</p>
      <p>KYBER-512 exhibits vulnerabilities that enable an
attacker to completely recover the key using simple queries,
as they can access the content of decrypted messages. The
investigation focused on the clean and m4 scheme elements,
specifically message encoding and the inverse Number
Theoretic Transform (NTT). It is notable that for both clean
and m4 schemes, the secret key can be recovered in just four
and eight searches, respectively. Additionally, researchers
have proposed message recovery techniques involving
cyclic message rotation and targeted permutation of
message bits. Even though these methods required (w+1)
traces in the presence of a side-channel weighted Hamming
classifier, it was emphasized that applications employing
anti-masking and anti-shuffling measures could still be
vulnerable. Conversely, launching attacks on secure
implementations with shuffling and obfuscation
necessitated a strong assumption that the attacker could
disable countermeasures to create patterns.</p>
      <p>Furthermore, the researchers proposed a key recovery
attack based on recovered messages, which would require a
set of six specific ciphertexts. It is essential to note that the
noise value for KYBER-512 has been increased, and the
CRYSTALS-KYBER specification has been adjusted. This
implies that a more meticulous preparation of ciphertexts is
now necessary.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Masking</title>
      <p>
        Verkle trees are a powerful upgrade to Merkle trees (Fig. 3)
that allow for much smaller verifications and are more
efficient. The structure of the Verkle tree (Fig. 4) is very
similar to the Merkle Patricia tree [
        <xref ref-type="bibr" rid="ref15 ref18 ref19">15, 18, 19</xref>
        ].
      </p>
      <p>To enhance the resistance of CRYSTALS-Kyber against
side-channel attacks, masking will be implemented as a
countermeasure. This strategy involves partitioning a secret
into multiple partially randomized shares, with “fifth-order”
indicating that the secret is divided into five shares.
Masking obscures the underlying arithmetic behavior of
cryptographic algorithms, offering additional protection
against side-channel threats.</p>
      <p>Masking serves as a prominent defense mechanism
against power and electromagnetic side-channel
investigations. Essentially, this method entails randomly
dividing a concealed value into several shares, each
processed independently at every stage of the algorithm.
Their outcomes are then combined to generate the final
result. Operating within the masking domain prevents the
leakage of sensitive variable x’s information, as it is never
directly utilized. In an ω-order masking scheme, a sensitive
variable x is divided into ω+1 share, denoted as x=1 ∘ 2 ∘ …
∘+1. The choice between arithmetic and Boolean masking
depends on the specific technique, where “∘” represents
different operations. For instance, in arithmetic masking, “∘”
signifies addition, while in Boolean masking, it denotes XOR.</p>
      <p>The variable x does not directly partake in the
computation, as operations are conducted independently on
shared resources, theoretically preventing information
leakage about x through side channels. Each time a share is
processed, it is randomly assigned. Randomization is
typically achieved by distributing random masks 1, 2, …,
across shares ω, and then computing arithmetic masking
as—(1+2+ ⋯ +) or logical masking as ⊕ 1 ⊕ 2 ⊕ … ⊕.</p>
    </sec>
    <sec id="sec-5">
      <title>5. The analysis of the Attacks using</title>
    </sec>
    <sec id="sec-6">
      <title>AI against CRYSTALS-Kyber</title>
      <p>
        To standardize post-quantum encryption,
CRYSTALSKyber has been officially endorsed by NIST as a public-key
algorithm. Despite initial beliefs in its resilience against
side-channel attacks, researchers have successfully
identified a vulnerability in its implementation. Utilizing
machine learning techniques, the attack specifically focused
on power usage as a key element of its strategy [
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24 ref25">20–25</xref>
        ]. The
increasing accessibility of measuring and analyzing
computer hardware power usage has raised concerns about
side-channel attacks as a significant security concern. These
attacks exploit energy fluctuations during certain circuits or
processes to obtain detailed information about the system
or processed data [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        A successful side-channel attack was carried out on
CRYSTALS-Kyber, revealing details about the encryption
key, which is one step before decrypting the data. Exploiting
machine learning to enable the system to capitalize on the
side-channel facilitated the attack. Considering that
machine learning is not commonly used in security
research, this achievement is remarkable. Thus, it’s notable
that machine learning can be misused, and businesses must
be vigilant about the potential security threats it may pose.
Even though the attack on CRYSTALS-Kyber was
successful, this does not mean that it is completely unusable.
We need to be aware of the possible security threats that
machine learning can pose to use these types of attacks. The
algorithm remains secure.
Earlier research has utilized artificial intelligence (AI) to
compromise first, second, and third-order masked Kyber
implementations. However, breaking higher-order masked
implementations using traditional AI training and profiling
techniques proved challenging. Dubrova et al. overcame this
challenge by employing a novel form of deep learning and
rotations on intercepted messages, thereby increasing the
leakiness of the bits and enhancing the likelihood of a
successful attack [
        <xref ref-type="bibr" rid="ref25 ref26 ref27 ref28">25–28</xref>
        ].
      </p>
      <p>The initial presentation of the attack by Dubrova et al.
focused on Kyber’s first-order masking, extending the
function masked_poly_frommsg() to incorporate
higherorder masking. Further exploration is intended to assess the
power consumption of the presented method, particularly
during Kyber’s re-encryption phase. This phase targets the
decapsulation stage, where the shared key is retrieved and
undergoes a re-encapsulation process for verification of any
alterations in the ciphertext.
In this re-encryption process, the secret or the antecedent of
the shared key is meticulously stored bit by bit into a
polynomial. Specifically, the 256-bit secret is transformed
into a polynomial modulo q = 3329 with 256 coefficients. In
this transformation, the ith coefficient is (q+1)/2 if the ith bit
is 1, and 0 otherwise. Although the function may seem
simple, creating a masked version poses a challenge due to
the inherent method of generating shares of the secret,
involving xor-ing together, and adding shares to form the
hypothetical polynomial.</p>
      <p>In contrast to previous studies, the AI incorporates
recursive learning at the profiling stage. Training an
implementation with a w-order mask involves replicating
the weights of the input batch normalization layer from the
−1 model trained on the implementation with a (w –
1)order mask. Subsequently, the layer is expanded to
introduce an additional share, creating the initial network.
Recursive learning comes into play when w&gt;3, and the AI
undergoes training using a network with a standard random
weight distribution when w≤3.</p>
      <p>By utilizing cut-and-join training traces byte-wise, two
universal models, 0 and 1, are derived. These models capture
the most powerful leaks, paying special attention to the first
two bits of each message byte. Furthermore, the labels “0”
and “1” are assigned to message bits, and the AI is trained to
directly recover the message without eliminating the
random masks.</p>
      <p>As detailed in the attacks described in this paper, after
rotating the message three times, the last six bits of each
byte are moved to the positions of the initial two bits. This
approach increases the probability of success of the attack
by utilizing “more leakage” of bit locations, extracting bit
values with a higher probability.</p>
      <p>The attack employs the cyclic rotation method due to
the uneven distribution of leakage from
Masked_poly_frommsg(). This irregularity is evidenced by
a 9% dissimilarity in the successful recovery probability
between 0 and 7 bits. Furthermore, this approach is
facilitated by the fact that modular LWEs are ring LWEs
extensions, enabling the alteration of encrypted texts by
cyclically alternating messages. By changing the last 6 bits
to the first and second bits in each byte, the attack
noncyclically modifies the message three times to 2 bits. This
strategy allows for more efficient transmission of
information by bits without excessive time consumption
compared to other looping approaches.</p>
      <p>
        By manipulating the corresponding ciphertext, it
becomes possible to perform a message rotation. In
CRYSTALS-Kyber, a ciphertext c=(u,v) is composed of
polynomials in the ring ℤ [ ]/(256+1). To obtain a negacyclic
rotation of the message, it is necessary to multiply u and v
by the indeterminate X, under the condition that c is
constructed accurately. However, it’s important to note that
the Decode (-y) and Decode (y) operations may yield
dissimilar values, introducing the possibility of errors,
particularly with specific ciphertexts employed in attempts
to recover the secret key [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        The code iterates over the portions of the two shares,
generating a mask for each bit: 0xffff for 1, and 0 for 0. This
mask can be applied to increase the polynomial share by
(q+1)/2, requiring slightly more energy to treat a 1. This
function will leak information without the need for AI. This
vulnerability in the pattern was recognized as problematic
in 2016, raising concerns about a potential risk to Kyber in
2020. To mitigate this [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], processing multiple bits
simultaneously is a recommended countermeasure.
      </p>
      <p>Dubrova et al., the authors, do not assert that this is a
radically innovative approach to the attack. Instead, they
increase the attack’s effectiveness by training the neural
network and optimizing the utilization of numerous traces
through alterations in the sent ciphertext.</p>
      <p>Dubrova et al. conducted the proposed attack using an
ARM Cortex-M4 CPU together with STM32F415-RGT6
device, a CW308 UFO board, and a 24MHz target
boardCW308T-STM32F4. Power consumption measurements
were carried out with high accuracy up to 10 bits at a
frequency of 24 MHz.</p>
      <p>
        To train the neural networks, Dubrova et al. collected
150,000 power traces to decrypt various ciphertexts using
the same KEM keypair. While this approach is somewhat
unusual for a real-world attack, as KEM key pairs for key
agreements are typically non-durable, nevertheless it has
valid applications for long-term KEM key pairs, as well as
ECH, HPKE, and authentication [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ].
      </p>
      <p>Training is a crucial step as devices of the same make
and model may exhibit significantly different power traces
even when executing identical code. Neural networks
undergo training to target “shares”, representing
implementations with varying security levels. The
progression begins with attacking a five-share
implementation as the initial step to a six-share
implementation. Executing their methodology requires
extracting one-fifth of the 150,000 power traces against a
six-share execution, then repeating the process with a
fiveshare execution, and so forth. The scenario where a device
permits an attacker to manipulate share numbers appears
improbable. The authors initiate the actual attack by
asserting that, under optimal conditions, there is a 0.127%
probability of recovering the shared key. However, they do
not furnish specific figures for single-trace assaults
involving more than two shares.</p>
      <p>
        Side-channel attacks demonstrate increased success
when multiple traces of the same decapsulation are
employed. The authors introduce a clever twist by rotating
the ciphertext instead of using identical traces of the
message. This strategic rotation, particularly when four
identical traces are involved, elevates the likelihood of
success to 78%, compared to a two-share implementation.
Even with a 0.5% chance, the six-share implementation
remains strong. Remarkably, 87% of the shared key can be
recovered with 20 traces from the six-share implementation.
For each w-order masked realization, 2500 messages are
randomly selected, resulting in a total of 10,000 traces for
each message, including three 2-bit cyclic message rotations
in each trace. In the absence of cyclic rotations, the
likelihood of message recovery is 0.127%. However, this
probability significantly increases to 78.866% with the
introduction of cyclic rotations. For a single trace on a
fifthorder masked implementation using cyclic rotations, the
recovery probability is 0.56%, rising to 54.53% with three
traces, and peaking at 87.085% with five traces respectively
[
        <xref ref-type="bibr" rid="ref31 ref32">31, 32</xref>
        ].
      </p>
      <p>In hardware terms, the device may resemble a smart
card in some aspects, but it is quite different from high-end
devices such as desktops, servers, and mobile phones. Even
with 1 GHz embedded processors, performing simple
sidechannel attacks to analyze power consumption becomes an
extremely complex task, requiring thousands of traces and
a high-performance oscilloscope placed directly next to the
processor. This physical access to the server provides
broader attack vectors, simply connecting the oscilloscope
to the memory bus.</p>
      <p>
        Power-side channel attacks are typically considered
impractical, except for highly sensitive applications.
However, under specific circumstances, throttling can
potentially transform an exceptionally potent power
sidechannel attack into a remote timing attack. It’s important to
note that the current situation is far from resembling such
an attack [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
      </p>
      <p>Moreover, this attack is neither particularly potent nor
surprising. In practical terms, whether a masked
implementation reveals its secrets or not is inconsequential.
The critical question is the level of difficulty involved in
executing such attacks in real-world scenarios. Articles such
as this one help manufacturers in assessing the number of
countermeasures needed to make such attacks prohibitively
expensive.</p>
      <sec id="sec-6-1">
        <title>6. Protection measures</title>
        <p>Minimizing the exposure duration of the application’s secret
key serves as the most effective defense against a majority
of existing attacks. The attack becomes more challenging as
the secret key is disclosed fewer times. If a secret key is used
only once, the attacker can only utilize the message
recovery attack once. However, this approach may
introduce other challenges, such as the need to generate a
substantial number of secret keys or the elimination of
secret key usage altogether.</p>
        <p>The success of the given attack relies on the repeated
execution of the decapsulation procedure. The attack can be
hindered by limiting the number of decryptions of the same
ciphertext with a single secret key. It may be necessary to
allow multiple retries to accommodate occasional
communication errors.</p>
        <p>Alternatively, stronger defenses against power analysis
attacks, such as the proposed duplication by clock
randomization approach, can be considered. This approach
involves two identical cores: a main cryptographic core and
a dummy cryptographic core, constituting the protected
realization. Despite using different private and public key
pairs, these cores operate on two different random clocks
while receiving identical input data. This technique offers
several camouflage benefits, including fault immunity, zero
clock cycle overhead, universal coverage, and increased
resistance to replay attacks.</p>
      </sec>
      <sec id="sec-6-2">
        <title>7. Conclusions</title>
        <p>Because of the increased power of AI technologies, the
CRYSTALS-Kyber key encapsulation system faces
increasing challenges from sophisticated side-channel
attacks. Recent research reveals vulnerabilities even in
environments with strong security measures, highlighting
the necessity for ongoing defensive improvements.
Essential countermeasures to bolster cryptographic systems
include Masking and shuffling. As we transition into the
post-quantum era, evaluating algorithms for both
mathematical robustness and resistance to external attacks
becomes crucial.</p>
        <p>Rather than completely disrupting a new encryption
system, AI serves as a valuable tool for managing noisy data
and detecting its weaknesses. There is a fundamental
difference between a power side-channel attack and a direct
cryptographic violation. The actual attack is based on a
surprisingly small number of traces; however, it is still
possible to effectively use extremely noisy traces for deep
learning training. An intriguing aspect of this debate is the
limited availability of feasible, simple, affordable, and
effective defenses to counter these attacks through channels
of power. We plan to improve the existing scheme, using
provided by us recommendations.</p>
      </sec>
      <sec id="sec-6-3">
        <title>Acknowledgments</title>
        <p>This work was supported by Shota Rustaveli National
Science Foundation of Georgia (SRNSF) [STEM – 22 –1076].</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          , U. Maurer, Breaking RSA Generically is Equivalent to Factoring,
          <source>Advances in CryptologyEUROCRYPT 2009: 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques</source>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D. R. L.</given-names>
            <surname>Brown</surname>
          </string-name>
          , Breaking RSA May Be as Difficult as Factoring,
          <source>J. Cryptology</source>
          ,
          <volume>29</volume>
          (
          <year>2016</year>
          )
          <fpage>220</fpage>
          -
          <lpage>241</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00145-014-9192-y.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , et al.,
          <article-title>Leveraging the Power of Quantum Computing for Breaking RSA Encryption</article-title>
          ,
          <source>CyberPhysical Systems 7(2)</source>
          (
          <year>2021</year>
          )
          <fpage>73</fpage>
          -
          <lpage>92</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Avanzi</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Crystals-Kyber</surname>
            ,
            <given-names>NIST</given-names>
          </string-name>
          ,
          <source>Tech. Rep</source>
          . (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E.</given-names>
            <surname>Dubrova</surname>
          </string-name>
          , et al.,
          <article-title>Breaking a Fifth-Order Masked Implementation of Crystals-Kyber by Copy-Paste</article-title>
          ,
          <source>in: 10th ACM Asia Public-Key Cryptography Workshop</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>F.-X.</given-names>
            <surname>Standaert</surname>
          </string-name>
          , Introduction to Side-Channel
          <string-name>
            <surname>Attacks</surname>
          </string-name>
          ,
          <source>Secure Integrated Circuits and Systems</source>
          (
          <year>2010</year>
          )
          <fpage>27</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Randolph</surname>
          </string-name>
          , W. Diehl,
          <article-title>Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman</article-title>
          , Cryptography,
          <volume>4</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mykhaylova</surname>
          </string-name>
          , et al.,
          <article-title>Person-of-Interest Detection on Mobile Forensics Data-AI-Driven Roadmap</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems, CPITS</source>
          , vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>239</fpage>
          -
          <lpage>251</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bos</surname>
          </string-name>
          , et al.,
          <article-title>CRYSTALS-Kyber: a CCA-Secure Module-Lattice-based KEM</article-title>
          , IEEE European Symposium on Security and
          <string-name>
            <surname>Privacy (EuroS&amp;P)</surname>
          </string-name>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>W.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kong</surname>
          </string-name>
          ,
          <article-title>An Efficient Implementation of Kyber</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs</source>
          ,
          <volume>69</volume>
          (
          <issue>3</issue>
          ) (
          <year>2021</year>
          )
          <fpage>1562</fpage>
          -
          <lpage>1566</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abramov</surname>
          </string-name>
          ,
          <source>Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves, Cryptography</source>
          <volume>8</volume>
          (
          <issue>3</issue>
          ), iss.
          <volume>38</volume>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .3390/cryptography8030038.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Modeling</surname>
            <given-names>CSIKE</given-names>
          </string-name>
          <article-title>Algorithm on Non-Cyclic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3187</volume>
          , no.
          <issue>1</issue>
          (
          <year>2022</year>
          )
          <fpage>302</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          , et al.,
          <article-title>Use of Content-Filtering Method for Hardware Vulnerabilities Identification System</article-title>
          ,
          <source>in: IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Megrelishvili</surname>
          </string-name>
          , et al.,
          <article-title>Post-Quantum Key Exchange Protocol using High Dimensional Matrix</article-title>
          , in: International Conference on Information Technologies, vol.
          <volume>2145</volume>
          (
          <year>2018</year>
          )
          <fpage>83</fpage>
          -
          <lpage>87</lpage>
          /
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Z.-D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <article-title>Study on the Convective Heat Transfer Characteristics of Supercritical CO2 in MiniChannels under Unilateral Heating Conditions for Application in a Compact Solar Receiver</article-title>
          ,
          <source>Int. J. Heat Mass Transfer</source>
          .
          <volume>219</volume>
          (
          <year>2024</year>
          )
          <fpage>124839</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          , et al.,
          <source>Lattice based Merkle</source>
          ,
          <source>in: International Conference on Information Technologies</source>
          , vol.
          <volume>2470</volume>
          (
          <year>2019</year>
          )
          <fpage>13</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Kharchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Chyrka</surname>
          </string-name>
          ,
          <article-title>Detection of Airplanes on the Ground using YOLO Neural Network</article-title>
          ,
          <source>International Conference on Mathematical Methods in Electromagnetic Theory</source>
          (
          <year>2018</year>
          )
          <fpage>294</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Multifunctional</surname>
            <given-names>CRS</given-names>
          </string-name>
          <article-title>Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves</article-title>
          , in: Workshop on Classic, Quantum, and
          <source>PostQuantum Cryptography</source>
          , vol.
          <volume>3504</volume>
          (
          <year>2023</year>
          )
          <fpage>12</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <article-title>Method of Sequential Estimation of Statistical Distribution Parameters in Control Systems Design</article-title>
          , in
          <source>: IEEE 3rd International Conference on Methods and Systems of Navigation and Motion Control</source>
          (
          <year>2014</year>
          )
          <fpage>135</fpage>
          -
          <lpage>138</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          , et al.,
          <source>Modular Reduction based on the Divider by Blocking Negative Remainders, News of the National Academy of Sciences of the Republic of Kazakhstan, Series of Geology and Technical Sciences</source>
          <volume>2</volume>
          (
          <issue>434</issue>
          ) (
          <year>2019</year>
          )
          <fpage>238</fpage>
          -
          <lpage>248</lpage>
          . doi:
          <volume>10</volume>
          .32014/
          <year>2019</year>
          .
          <fpage>2518</fpage>
          -
          <lpage>170x</lpage>
          .
          <fpage>60</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>New Secure Block Cipher for Critical Applications: Design, Implementation, Speed</article-title>
          and
          <string-name>
            <given-names>Security</given-names>
            <surname>Analysis</surname>
          </string-name>
          ,
          <source>Advances in Intelligent Systems and Computing</source>
          (
          <year>2020</year>
          )
          <fpage>93</fpage>
          -
          <lpage>104</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Celik</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of CRYSTALS-Kyber Post-Quantum Algorithm using RISC-V Processor,</article-title>
          30th IEEE International Conference on Electronics,
          <source>Circuits and Systems (ICECS)</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Modeling</surname>
            <given-names>CSIKE</given-names>
          </string-name>
          <article-title>Algorithm on Non-Cyclic Edwards Curves</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>Method of Algorithm Building for Modular Reducing by Irreducible Polynomial</article-title>
          , in: 16th International Conference on Control,
          <source>Automation and Systems</source>
          (
          <year>2016</year>
          )
          <fpage>1476</fpage>
          -
          <lpage>1479</lpage>
          . doi:
          <volume>10</volume>
          .1109/ iccas.
          <year>2016</year>
          .
          <volume>7832498</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3187</volume>
          (
          <year>2022</year>
          )
          <fpage>302</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          , et al.,
          <source>Sequential Procedure of Changepoint Analysis during Operational Data Processing, in: IEEE Workshop on Microwave Theory and Techniques in Wireless Communications</source>
          (
          <year>2020</year>
          )
          <fpage>168</fpage>
          -
          <lpage>171</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>S.</given-names>
            <surname>Jendral</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Breaking</surname>
            <given-names>SCA</given-names>
          </string-name>
          -
          <article-title>Protected CRYSTALSKyber with a Single Trace</article-title>
          ,
          <source>IEEE International Symposium on Hardware Oriented Security and Trust (HOST)</source>
          (
          <year>2024</year>
          )
          <fpage>70</fpage>
          -
          <lpage>73</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>C.</given-names>
            <surname>Papamanthou</surname>
          </string-name>
          , et al.,
          <source>Streaming Authenticated Data Structures, Advances in Cryptology-EUROCRYPT</source>
          (
          <year>2013</year>
          )
          <fpage>353</fpage>
          -
          <lpage>370</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -38348-9_
          <fpage>22</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>36</fpage>
          -
          <lpage>45</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ji</surname>
          </string-name>
          , etb al.,
          <article-title>A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber</article-title>
          ,
          <source>IEEE European Test Symposium (ETS)</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Hegde</surname>
          </string-name>
          , et al,
          <article-title>Rapid Prototyping of CRYSTALSKyber Primitives on FPGA using Python-only HWSW Flow, 28th</article-title>
          <source>International Symposium on VLSI Design and Test (VDAT)</source>
          (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          et al.,
          <string-name>
            <surname>Super-K: A Superscalar CRYSTALSKYBER</surname>
          </string-name>
          <article-title>Processor based on Efficient Arithmetic Array</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems II: Express Briefs</source>
          ,
          <volume>71</volume>
          (
          <issue>9</issue>
          ) (
          <year>2024</year>
          )
          <fpage>4286</fpage>
          -
          <lpage>4290</lpage>
          . doi:
          <volume>10</volume>
          .1109/ TCSII.
          <year>2024</year>
          .
          <volume>3382772</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>