{"id":"https://openalex.org/W3201868317","doi":"https://doi.org/10.1145/3587037","title":"A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection","display_name":"A Configurable CRYSTALS-Kyber Hardware Implementation with Side-Channel Protection","publication_year":2023,"publication_date":"2023-03-06","ids":{"openalex":"https://openalex.org/W3201868317","doi":"https://doi.org/10.1145/3587037","mag":"3201868317"},"language":"en","primary_location":{"id":"doi:10.1145/3587037","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3587037","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3587037","source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3587037","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022166117","display_name":"Arpan Jati","orcid":"https://orcid.org/0000-0003-1082-4049"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]},{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Arpan Jati","raw_affiliation_strings":["NTU, Nanyang Ave, Singapore and IIIT Delhi, New Delhi, Delhi, India"],"affiliations":[{"raw_affiliation_string":"NTU, Nanyang Ave, Singapore and IIIT Delhi, New Delhi, Delhi, India","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035499670","display_name":"Naina Gupta","orcid":"https://orcid.org/0000-0003-3056-9241"},"institutions":[{"id":"https://openalex.org/I119939252","display_name":"Indraprastha Institute of Information Technology Delhi","ror":"https://ror.org/03vfp4g33","country_code":"IN","type":"education","lineage":["https://openalex.org/I119939252"]},{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]},{"id":"https://openalex.org/I68891433","display_name":"Indian Institute of Technology Delhi","ror":"https://ror.org/049tgcd06","country_code":"IN","type":"education","lineage":["https://openalex.org/I68891433"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Naina Gupta","raw_affiliation_strings":["NTU, Nanyang Ave, Singapore","NTU, Singapore","SOMITRA KUMAR SANADHYA, IIT Jodhpur, India","Singapore and IIIT Delhi, India","IIT Jodhpur, India","NTU, Singapore and IIIT Delhi, India"],"affiliations":[{"raw_affiliation_string":"NTU, Nanyang Ave, Singapore","institution_ids":[]},{"raw_affiliation_string":"NTU, Singapore","institution_ids":[]},{"raw_affiliation_string":"SOMITRA KUMAR SANADHYA, IIT Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]},{"raw_affiliation_string":"Singapore and IIIT Delhi, India","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]},{"raw_affiliation_string":"IIT Jodhpur, India","institution_ids":["https://openalex.org/I154549908"]},{"raw_affiliation_string":"NTU, Singapore and IIIT Delhi, India","institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089860351","display_name":"Anupam Chattopadhyay","orcid":"https://orcid.org/0000-0002-8818-6983"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anupam Chattopadhyay","raw_affiliation_strings":["NTU, Nanyang Ave, Singapore"],"affiliations":[{"raw_affiliation_string":"NTU, Nanyang Ave, Singapore","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015932261","display_name":"Somitra Kumar Sanadhya","orcid":"https://orcid.org/0000-0003-1046-184X"},"institutions":[{"id":"https://openalex.org/I154549908","display_name":"Indian Institute of Technology Jodhpur","ror":"https://ror.org/03yacj906","country_code":"IN","type":"education","lineage":["https://openalex.org/I154549908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Somitra Kumar Sanadhya","raw_affiliation_strings":["IIT Jodhpur, Karwar, Rajasthan, India"],"affiliations":[{"raw_affiliation_string":"IIT Jodhpur, Karwar, Rajasthan, India","institution_ids":["https://openalex.org/I154549908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5022166117"],"corresponding_institution_ids":["https://openalex.org/I119939252","https://openalex.org/I68891433"],"apc_list":null,"apc_paid":null,"fwci":6.2627,"has_fulltext":true,"cited_by_count":40,"citation_normalized_percentile":{"value":0.97211144,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"23","issue":"2","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8688442707061768},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.6027724146842957},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.5911646485328674},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5478087663650513},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5442696809768677},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.49084025621414185},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4738871455192566},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4510481059551239},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.42108798027038574},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1442737579345703},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12938490509986877},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12700673937797546},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07022625207901001}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8688442707061768},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.6027724146842957},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.5911646485328674},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5478087663650513},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5442696809768677},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49084025621414185},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4738871455192566},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4510481059551239},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.42108798027038574},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1442737579345703},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12938490509986877},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12700673937797546},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07022625207901001}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3587037","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3587037","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3587037","source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1145/3587037","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3587037","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3587037","source":{"id":"https://openalex.org/S136160450","display_name":"ACM Transactions on Embedded Computing Systems","issn_l":"1539-9087","issn":["1539-9087","1558-3465"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Embedded Computing Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3201868317.pdf","grobid_xml":"https://content.openalex.org/works/W3201868317.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W151792660","https://openalex.org/W1577801461","https://openalex.org/W1873852107","https://openalex.org/W1882598960","https://openalex.org/W2008521622","https://openalex.org/W2010870387","https://openalex.org/W2096221836","https://openalex.org/W2111725598","https://openalex.org/W2171692676","https://openalex.org/W2176839111","https://openalex.org/W2400510289","https://openalex.org/W2696718061","https://openalex.org/W2740580365","https://openalex.org/W2799470819","https://openalex.org/W2979160478","https://openalex.org/W2982169647","https://openalex.org/W2986959318","https://openalex.org/W2993084831","https://openalex.org/W3046851570","https://openalex.org/W3046913999","https://openalex.org/W3049114471","https://openalex.org/W3102559013","https://openalex.org/W3127016245","https://openalex.org/W3135053459","https://openalex.org/W3172550433","https://openalex.org/W3184771349","https://openalex.org/W3187954618","https://openalex.org/W3198652786","https://openalex.org/W3210769154","https://openalex.org/W3211431797","https://openalex.org/W3214667783","https://openalex.org/W3217272717","https://openalex.org/W4226075590","https://openalex.org/W4229637647","https://openalex.org/W4242275969","https://openalex.org/W6685897763"],"related_works":["https://openalex.org/W2794898833","https://openalex.org/W2022533428","https://openalex.org/W2580249689","https://openalex.org/W2103519941","https://openalex.org/W2769734684","https://openalex.org/W2969678054","https://openalex.org/W1796231437","https://openalex.org/W2903787673","https://openalex.org/W3158338108","https://openalex.org/W2584285084"],"abstract_inverted_index":{"In":[0],"this":[1,131],"work,":[2],"we":[3,152],"present":[4],"a":[5,52,64,68,91,114],"configurable":[6,141],"and":[7,28,48,59,97,109,137,158],"side":[8,85],"channel":[9,86],"resistant":[10],"implementation":[11,41,55,183],"of":[12,72,95,117,128,174,184],"the":[13,126,134,154,161,175,180,188],"post-quantum":[14],"key-exchange":[15],"algorithm":[16],"CRYSTALS-Kyber":[17,144,185],".":[18,145],"The":[19,84],"implemented":[20,89,155],"design":[21,162],"can":[22,42],"be":[23,43,78],"configured":[24],"for":[25,35,143],"different":[26,33,36],"performance":[27,54],"area":[29,40],"requirements":[30],"leading":[31],"to":[32,63],"trade-offs":[34],"applications.":[37],"A":[38],"low":[39,115],"achieved":[44,79],"in":[45,113,179,187],"5,269":[46],"LUTs":[47,58],"2,422":[49],"FFs,":[50],"whereas":[51],"high":[53,69],"required":[56],"7,151":[57],"3,730":[60],"FFs.":[61],"Due":[62],"deeply":[65],"pipelined":[66],"architecture,":[67],"operating":[70],"speed":[71],"more":[73],"than":[74,119],"250":[75],"MHz":[76],"could":[77],"on":[80],"28nm":[81],"Xilinx":[82],"FPGAs.":[83],"resistance":[87],"is":[88],"using":[90],"carefully":[92],"chosen":[93],"set":[94],"novel":[96],"known":[98,186],"techniques":[99,157],"such":[100],"as":[101],"Fault":[102],"Detection":[103],"Hashes,":[104],"Instruction":[105],"Randomization,":[106],"FSM":[107],"Protection":[108],"so":[110],"on.":[111],"resulting":[112],"overhead":[116],"less":[118],"5%":[120],"while":[121],"being":[122],"highly":[123],"configurable.":[124],"To":[125],"best":[127],"our":[129],"knowledge,":[130],"work":[132],"presents":[133],"first":[135],"side-channel":[136],"fault":[138],"attack":[139],"protected":[140],"accelerator":[142],"Using":[146],"TVLA":[147],"(test":[148],"vector":[149],"leakage":[150],"assessment),":[151],"validate":[153],"protection":[156],"demonstrate":[159],"that":[160],"does":[163],"not":[164],"leak":[165],"information":[166],"even":[167],"after":[168],"200":[169],"K":[170],"traces.":[171],"Furthermore,":[172],"one":[173],"configuration":[176],"choices":[177],"results":[178],"smallest":[181],"hardware":[182],"literature.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
