{"id":"https://openalex.org/W4389160795","doi":"https://doi.org/10.1109/iccad57390.2023.10323721","title":"Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM","display_name":"Invited Paper: Machine Learning Based Blind Side-Channel Attacks on PQC-Based KEMs - A Case Study of Kyber KEM","publication_year":2023,"publication_date":"2023-10-28","ids":{"openalex":"https://openalex.org/W4389160795","doi":"https://doi.org/10.1109/iccad57390.2023.10323721"},"language":"en","primary_location":{"id":"doi:10.1109/iccad57390.2023.10323721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079410091","display_name":"Prasanna Ravi","orcid":"https://orcid.org/0000-0003-0201-3705"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Prasanna Ravi","raw_affiliation_strings":["Nanyang Technological University,Temasek Labs,Singapore","Temasek Labs, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,Temasek Labs,Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Temasek Labs, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060395435","display_name":"Dirmanto Jap","orcid":"https://orcid.org/0000-0002-3149-9401"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dirmanto Jap","raw_affiliation_strings":["Nanyang Technological University,Temasek Labs,Singapore","Temasek Labs, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,Temasek Labs,Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Temasek Labs, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081720773","display_name":"Shivam Bhasin","orcid":"https://orcid.org/0000-0002-6903-5127"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Shivam Bhasin","raw_affiliation_strings":["Nanyang Technological University,Temasek Labs,Singapore","Temasek Labs, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University,Temasek Labs,Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Temasek Labs, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["School of Computer Science and Engineering Nanyang Technological University,Temasek Labs,Singapore","Temasek Labs, School of Computer Science and Engineering Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering Nanyang Technological University,Temasek Labs,Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Temasek Labs, School of Computer Science and Engineering Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079410091"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.6948,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7677507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"07"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7651472091674805},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7136780023574829},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.6499223709106445},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5699028968811035},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.46811407804489136},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.46064144372940063},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3839336037635803},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2744559943675995},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.20674481987953186}],"concepts":[{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7651472091674805},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7136780023574829},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.6499223709106445},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5699028968811035},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.46811407804489136},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.46064144372940063},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3839336037635803},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2744559943675995},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.20674481987953186},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccad57390.2023.10323721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccad57390.2023.10323721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W29626722","https://openalex.org/W1562542037","https://openalex.org/W2740580365","https://openalex.org/W2746738588","https://openalex.org/W2798181861","https://openalex.org/W2911964244","https://openalex.org/W2970990324","https://openalex.org/W2972972326","https://openalex.org/W2979160478","https://openalex.org/W2995935153","https://openalex.org/W3183184671","https://openalex.org/W3212511606","https://openalex.org/W4206155091","https://openalex.org/W4226075590","https://openalex.org/W4285302767","https://openalex.org/W4285779221","https://openalex.org/W4308198585","https://openalex.org/W4323319870","https://openalex.org/W4379384493","https://openalex.org/W4392529236","https://openalex.org/W6850447911","https://openalex.org/W6853046693","https://openalex.org/W6862397420"],"related_works":["https://openalex.org/W4318899699","https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W4388856880","https://openalex.org/W2081998479","https://openalex.org/W2229809156"],"abstract_inverted_index":{"Kyber":[0,43,101,118,159],"KEM,":[1],"the":[2,26,29,39,49,55,73,80,112,124,129,155,163,168,176,184,197],"NIST":[3,30],"selected":[4],"PQC":[5,31],"standard":[6],"for":[7,59,88,100],"Public":[8],"Key":[9,12],"Encryption":[10],"and":[11],"Encapsulation":[13],"Mechanisms":[14],"(KEMs)":[15],"has":[16],"been":[17],"subjected":[18],"to":[19,53,79,132,192],"a":[20,69,189,200],"variety":[21],"of":[22,28,42,48,57,97,123,148,158,178,199],"side-channel":[23,84,115,137,153],"attacks,":[24],"through":[25],"course":[27],"standardization":[32],"process.":[33],"However,":[34,62],"all":[35],"these":[36],"attacks":[37,67,85,99,138],"targeting":[38],"decapsulation":[40],"procedure":[41,131],"KEM":[44,160],"either":[45],"require":[46,52],"knowledge":[47],"ciphertexts":[50,58],"or":[51],"control":[54],"value":[56],"key":[60,90,142,186],"recovery.":[61,143],"there":[63],"are":[64,86,94],"no":[65],"known":[66,87],"in":[68,128,140,182,187,196],"blind":[70,83,114,136],"setting,":[71],"where":[72],"attacker":[74],"does":[75],"not":[76,95],"have":[77],"access":[78],"ciphertexts.":[81],"While":[82],"symmetric":[89],"cryptographic":[91],"schemes,":[92],"we":[93,106],"aware":[96],"such":[98],"KEM.":[102,119],"In":[103],"this":[104,108],"paper,":[105],"fill":[107],"gap":[109],"by":[110],"proposing":[111],"first":[113],"attack":[116,150,181],"on":[117,167],"We":[120,144],"target":[121],"leakage":[122],"pointwise":[125],"multiplication":[126],"operation":[127],"decryption":[130],"carry":[133],"out":[134],"practical":[135,146],"resulting":[139],"full":[141,185],"perform":[145],"validation":[147],"our":[149,179],"using":[151],"power":[152],"from":[154,162],"reference":[156],"implementation":[157],"taken":[161],"pqm4":[164],"library,":[165],"implemented":[166],"ARM":[169],"Cortex-M4":[170],"microcontroller.":[171],"Our":[172],"experiments":[173],"clearly":[174],"indicate":[175],"feasibility":[177],"proposed":[180],"recovering":[183],"only":[188],"few":[190,193],"hundred":[191],"thousand":[194],"traces,":[195],"presence":[198],"suitably":[201],"accurate":[202],"Hamming":[203],"Weight":[204],"(HW)":[205],"classifier.":[206]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
