(1)
Bernstein, D. J.; Bhargavan, K.; Bhasin, S.; Chattopadhyay, A.; Chia, T. K.; Kannwischer, M. J.; Kiefer, F.; Paiva, T. B.; Ravi, P.; Tamvada, G. KyberSlash: Exploiting Secret-Dependent Division Timings in Kyber Implementations. TCHES 2025, 2025 (2), 209-234. https://doi.org/10.46586/tches.v2025.i2.209-234.