{"id":"https://openalex.org/W4388820815","doi":"https://doi.org/10.1109/ats59501.2023.10318019","title":"A Template Attack on Reduction Without Reference Device on Kyber","display_name":"A Template Attack on Reduction Without Reference Device on Kyber","publication_year":2023,"publication_date":"2023-10-14","ids":{"openalex":"https://openalex.org/W4388820815","doi":"https://doi.org/10.1109/ats59501.2023.10318019"},"language":"en","primary_location":{"id":"doi:10.1109/ats59501.2023.10318019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ats59501.2023.10318019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 32nd Asian Test Symposium (ATS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050394273","display_name":"Yipei Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yipei Yang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","CASTEST","University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"CASTEST","institution_ids":[]},{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032468655","display_name":"Junying Huang","orcid":"https://orcid.org/0000-0001-5845-6965"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junying Huang","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103221077","display_name":"Zongyue Wang","orcid":"https://orcid.org/0000-0003-2252-5943"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zongyue Wang","raw_affiliation_strings":["Open Security Research"],"affiliations":[{"raw_affiliation_string":"Open Security Research","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394414","display_name":"Jing Ye","orcid":"https://orcid.org/0000-0002-8023-5090"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Ye","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","CASTEST","State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"CASTEST","institution_ids":[]},{"raw_affiliation_string":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052879328","display_name":"Zihao Sun","orcid":"https://orcid.org/0000-0001-6273-3005"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zihao Sun","raw_affiliation_strings":["University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113563229","display_name":"Junfeng Fan","orcid":"https://orcid.org/0000-0003-4922-7946"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Junfeng Fan","raw_affiliation_strings":["Open Security Research"],"affiliations":[{"raw_affiliation_string":"Open Security Research","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100396711","display_name":"Shuai Chen","orcid":"https://orcid.org/0009-0002-2425-5916"},"institutions":[{"id":"https://openalex.org/I4210155232","display_name":"Fiberhome Technology Group (China)","ror":"https://ror.org/04yv20134","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210155232"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Chen","raw_affiliation_strings":["Fiberhome,Rock-Solid Security Lab","Rock-Solid Security Lab, Fiberhome"],"affiliations":[{"raw_affiliation_string":"Fiberhome,Rock-Solid Security Lab","institution_ids":["https://openalex.org/I4210155232"]},{"raw_affiliation_string":"Rock-Solid Security Lab, Fiberhome","institution_ids":["https://openalex.org/I4210155232"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100768288","display_name":"Huawei Li","orcid":"https://orcid.org/0000-0001-8082-4218"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huawei Li","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","University of Chinese Academy of Sciences","CASTEST","State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"CASTEST","institution_ids":[]},{"raw_affiliation_string":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023380073","display_name":"Xiaowei Li","orcid":"https://orcid.org/0000-0002-0874-814X"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowei Li","raw_affiliation_strings":["Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","CASTEST","State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","University of Chinese Academy of Sciences"],"affiliations":[{"raw_affiliation_string":"Institute of Computing Technology, Chinese Academy of Sciences,State Key Lab of Processors","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"CASTEST","institution_ids":[]},{"raw_affiliation_string":"State Key Lab of Processors, Institute of Computing Technology, Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]},{"raw_affiliation_string":"University of Chinese Academy of Sciences","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051407732","display_name":"Yuan Cao","orcid":"https://orcid.org/0000-0001-5227-2241"},"institutions":[{"id":"https://openalex.org/I163340411","display_name":"Hohai University","ror":"https://ror.org/01wd4xt90","country_code":"CN","type":"education","lineage":["https://openalex.org/I163340411"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Cao","raw_affiliation_strings":["Hohai University"],"affiliations":[{"raw_affiliation_string":"Hohai University","institution_ids":["https://openalex.org/I163340411"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":10,"corresponding_author_ids":["https://openalex.org/A5050394273"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210090176","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.5237,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72375139,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.7769020795822144},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.7481958270072937},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7233363389968872},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.5961716771125793},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5742884278297424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4985647201538086},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.47955581545829773},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.466372549533844},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4324495792388916},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4247302711009979},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4069710671901703},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3072201907634735},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28034520149230957},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23142015933990479},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.15679535269737244},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1336749792098999},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12639501690864563},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1155385673046112},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.09944629669189453}],"concepts":[{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.7769020795822144},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.7481958270072937},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7233363389968872},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.5961716771125793},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5742884278297424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4985647201538086},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.47955581545829773},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.466372549533844},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4324495792388916},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4247302711009979},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4069710671901703},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3072201907634735},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28034520149230957},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23142015933990479},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.15679535269737244},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1336749792098999},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12639501690864563},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1155385673046112},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.09944629669189453},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ats59501.2023.10318019","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ats59501.2023.10318019","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 32nd Asian Test Symposium (ATS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2148714490","display_name":null,"funder_award_id":"U20A20202,62090024,61876173","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1613874182","https://openalex.org/W1995261385","https://openalex.org/W2866028610","https://openalex.org/W2979160478","https://openalex.org/W3115714824","https://openalex.org/W3184403650","https://openalex.org/W3184771349","https://openalex.org/W3202064815","https://openalex.org/W3204480019","https://openalex.org/W3210769154","https://openalex.org/W4213357649","https://openalex.org/W4242970760","https://openalex.org/W4294323124","https://openalex.org/W4322012259","https://openalex.org/W6787604185","https://openalex.org/W6801584525"],"related_works":["https://openalex.org/W2158491338","https://openalex.org/W2807901368","https://openalex.org/W2133733652","https://openalex.org/W2072658171","https://openalex.org/W2606392311","https://openalex.org/W4318899699","https://openalex.org/W648293884","https://openalex.org/W2548263541","https://openalex.org/W3093625357","https://openalex.org/W3216711056"],"abstract_inverted_index":{"In":[0,36,81],"July":[1],"2022,":[2],"the":[3,30,37,40,78,102,111,114],"National":[4],"Institute":[5],"of":[6,14,113],"Standards":[7],"and":[8],"Technology":[9],"(NIST)":[10],"announced":[11],"its":[12],"selection":[13],"four":[15],"algorithms":[16],"for":[17],"post-quantum":[18],"cryptography":[19],"standardization":[20],"in":[21,46,120],"advance.":[22],"Among":[23],"these":[24],"algorithms,":[25],"Kyber":[26,38],"was":[27],"chosen":[28],"as":[29],"only":[31],"key":[32,88],"encapsulation":[33],"mechanism":[34],"(KEM).":[35],"KEM,":[39],"modular":[41,56,60,103],"reduction":[42,57,61,104],"function":[43,116],"is":[44],"utilized":[45,119],"numerous":[47],"areas.":[48],"We":[49,98],"have":[50,99],"discovered":[51],"that":[52,109],"by":[53],"modeling":[54],"controllable":[55],"functions,":[58],"unknown":[59],"functions":[62],"can":[63,68,74],"be":[64,70,75,118],"targeted.":[65],"And":[66],"attacks":[67],"then":[69],"constructed.":[71],"Henceforth,":[72],"profiling":[73],"mounted":[76],"on":[77,91],"target":[79],"device.":[80,97],"this":[82,107],"paper,":[83],"we":[84],"present":[85],"a":[86,95],"machine-learning-based":[87],"recovery":[89],"attack":[90],"Kyber,":[92],"without":[93],"needing":[94],"reference":[96],"effectively":[100],"attacked":[101],"function.":[105],"Furthermore,":[106],"vulnerability":[108],"enables":[110],"reuse":[112],"same":[115],"could":[117],"other":[121],"attacks.":[122]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
