1.
Bernstein DJ, Bhargavan K, Bhasin S, et al. KyberSlash: Exploiting secret-dependent division timings in Kyber implementations. TCHES. 2025;2025(2):209-234. doi:10.46586/tches.v2025.i2.209-234