The following publications are possibly variants of this publication:
- Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-PasteElena Dubrova, Kalle Ngo, Joel Gärtner. iacr, 2022:1713, 2022. [doi]
- A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber ImplementationRuize Wang, Martin Brisfors, Elena Dubrova. acns 2024: 301-324 [doi]
- A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber ImplementationRuize Wang, Martin Brisfors, Elena Dubrova. iacr, 2023:1042, 2023. [doi]
- A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-KyberYanning Ji, Elena Dubrova. ashes 2023: 27-37 [doi]
- A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation AlgorithmRuize Wang, Elena Dubrova. fps 2024: 424-439 [doi]
- Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and SaberLinus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova. acns 2023: 159-177 [doi]
- Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and SaberLinus Backlund, Kalle Ngo, Joel Gärtner, Elena Dubrova. iacr, 2022:1692, 2022. [doi]
- A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-KyberYanning Ji, Elena Dubrova. iacr, 2023:1084, 2023. [doi]
- A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-KyberSönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova. iacr, 2023:1587, 2023. [doi]