1.
Bernstein DJ, Bhargavan K, Bhasin S, Chattopadhyay A, Chia TK, Kannwischer MJ, et al. KyberSlash: Exploiting secret-dependent division timings in Kyber implementations. TCHES [Internet]. 2025 Mar. 4 [cited 2025 Mar. 9];2025(2):209-34. Available from: https://tches.iacr.org/index.php/TCHES/article/view/12046