[1]
D. J. Bernstein, “KyberSlash: Exploiting secret-dependent division timings in Kyber implementations”, TCHES, vol. 2025, no. 2, pp. 209–234, Mar. 2025, doi: 10.46586/tches.v2025.i2.209-234.