{"id":"https://openalex.org/W4380084284","doi":"https://doi.org/10.46586/tches.v2023.i3.473-503","title":"Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs","display_name":"Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs","publication_year":2023,"publication_date":"2023-06-09","ids":{"openalex":"https://openalex.org/W4380084284","doi":"https://doi.org/10.46586/tches.v2023.i3.473-503"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2023.i3.473-503","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i3.473-503","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10971/10278","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/10971/10278","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103120798","display_name":"Yutaro Tanaka","orcid":"https://orcid.org/0009-0004-1060-7065"},"institutions":[{"id":"https://openalex.org/I4210086780","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19","country_code":"JP","type":"government","lineage":["https://openalex.org/I4210086780"]},{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yutaro Tanaka","raw_affiliation_strings":["Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan; CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan; CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","institution_ids":["https://openalex.org/I4210086780"]},{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan","institution_ids":["https://openalex.org/I201537933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034718952","display_name":"Rei Ueno","orcid":"https://orcid.org/0000-0002-9754-6792"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]},{"id":"https://openalex.org/I4210086780","display_name":"Japan Science and Technology Agency","ror":"https://ror.org/00097mb19","country_code":"JP","type":"government","lineage":["https://openalex.org/I4210086780"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Rei Ueno","raw_affiliation_strings":["Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan; CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan","CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan; CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan","institution_ids":["https://openalex.org/I201537933"]},{"raw_affiliation_string":"CREST, JST, 4\u20131\u20138 Honcho, Kawaguchi, Saitama, 332-0012, Japan","institution_ids":["https://openalex.org/I4210086780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004419438","display_name":"Keita Xagawa","orcid":"https://orcid.org/0000-0002-6832-9940"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keita Xagawa","raw_affiliation_strings":["Social Informatics Laboratories, NTT Corporation, 3\u20139\u201311 Midori-cho, Musashino-shi, Tokyo, 180-8535, Japan"],"affiliations":[{"raw_affiliation_string":"Social Informatics Laboratories, NTT Corporation, 3\u20139\u201311 Midori-cho, Musashino-shi, Tokyo, 180-8535, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004043077","display_name":"A. S. Ito","orcid":"https://orcid.org/0000-0002-4602-7570"},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akira Ito","raw_affiliation_strings":["Social Informatics Laboratories, NTT Corporation, 3\u20139\u201311 Midori-cho, Musashino-shi, Tokyo, 180-8535, Japan"],"affiliations":[{"raw_affiliation_string":"Social Informatics Laboratories, NTT Corporation, 3\u20139\u201311 Midori-cho, Musashino-shi, Tokyo, 180-8535, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102051016","display_name":"Junko Takahashi","orcid":null},"institutions":[{"id":"https://openalex.org/I2251713219","display_name":"NTT (Japan)","ror":"https://ror.org/00berct97","country_code":"JP","type":"company","lineage":["https://openalex.org/I2251713219"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Junko Takahashi","raw_affiliation_strings":["Social Informatics Laboratories, NTT Corporation, 3\u20139\u201311 Midori-cho, Musashino-shi, Tokyo, 180-8535, Japan"],"affiliations":[{"raw_affiliation_string":"Social Informatics Laboratories, NTT Corporation, 3\u20139\u201311 Midori-cho, Musashino-shi, Tokyo, 180-8535, Japan","institution_ids":["https://openalex.org/I2251713219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069532722","display_name":"Naofumi Homma","orcid":"https://orcid.org/0000-0003-0864-3126"},"institutions":[{"id":"https://openalex.org/I201537933","display_name":"Tohoku University","ror":"https://ror.org/01dq60k83","country_code":"JP","type":"education","lineage":["https://openalex.org/I201537933"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Naofumi Homma","raw_affiliation_strings":["Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan"],"affiliations":[{"raw_affiliation_string":"Tohoku University, 2\u20131\u20131 Katahira, Aoba-ku, Sendai-shi, 980-8577, Japan","institution_ids":["https://openalex.org/I201537933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103120798"],"corresponding_institution_ids":["https://openalex.org/I201537933","https://openalex.org/I4210086780"],"apc_list":null,"apc_paid":null,"fwci":5.012,"has_fulltext":true,"cited_by_count":29,"citation_normalized_percentile":{"value":0.96229728,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"473","last_page":"503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9539999961853027,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9368000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6525790095329285},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.6074494123458862},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.6063411235809326},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.581173300743103},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.561500608921051},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5424997210502625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47796010971069336},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.44500330090522766},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43194687366485596},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34715336561203003},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34391605854034424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3290541470050812},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2712400555610657},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.2517186403274536}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6525790095329285},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.6074494123458862},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.6063411235809326},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.581173300743103},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.561500608921051},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5424997210502625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47796010971069336},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.44500330090522766},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43194687366485596},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34715336561203003},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34391605854034424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3290541470050812},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2712400555610657},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.2517186403274536}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2023.i3.473-503","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i3.473-503","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10971/10278","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:8f0ce5a6f87e453c85dfc912d15b0692","is_oa":true,"landing_page_url":"https://doaj.org/article/8f0ce5a6f87e453c85dfc912d15b0692","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2023.i3.473-503","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i3.473-503","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10971/10278","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G193038087","display_name":null,"funder_award_id":"JST CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G2494921797","display_name":null,"funder_award_id":"JPMJCR19K5","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3282004645","display_name":null,"funder_award_id":"JPMJCR","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"},{"id":"https://openalex.org/G3459562248","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G3813940528","display_name":null,"funder_award_id":"17H00729","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G6454252653","display_name":null,"funder_award_id":"19H21526","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"},{"id":"https://openalex.org/G6718509927","display_name":null,"funder_award_id":"CREST","funder_id":"https://openalex.org/F4320334764","funder_display_name":"Japan Society for the Promotion of Science"}],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"},{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4380084284.pdf"},"referenced_works_count":52,"referenced_works":["https://openalex.org/W135467536","https://openalex.org/W1599862784","https://openalex.org/W1607264302","https://openalex.org/W2478708596","https://openalex.org/W2520683369","https://openalex.org/W2552090562","https://openalex.org/W2575714403","https://openalex.org/W2740966734","https://openalex.org/W2810943746","https://openalex.org/W2903143476","https://openalex.org/W2949591164","https://openalex.org/W2954655849","https://openalex.org/W2954955800","https://openalex.org/W2979160478","https://openalex.org/W2990296674","https://openalex.org/W2993330478","https://openalex.org/W2995935153","https://openalex.org/W2996022685","https://openalex.org/W3037033594","https://openalex.org/W3046675985","https://openalex.org/W3046730596","https://openalex.org/W3046851570","https://openalex.org/W3081745170","https://openalex.org/W3082776805","https://openalex.org/W3092436054","https://openalex.org/W3115714824","https://openalex.org/W3144672608","https://openalex.org/W3175175642","https://openalex.org/W3178862870","https://openalex.org/W3184403650","https://openalex.org/W3185408664","https://openalex.org/W3202783877","https://openalex.org/W3209710121","https://openalex.org/W3210769154","https://openalex.org/W3212511606","https://openalex.org/W4221134967","https://openalex.org/W4230633622","https://openalex.org/W4235846187","https://openalex.org/W4239750483","https://openalex.org/W4241389749","https://openalex.org/W4242800683","https://openalex.org/W4245524709","https://openalex.org/W4293077571","https://openalex.org/W4297042454","https://openalex.org/W4310995020","https://openalex.org/W4317541773","https://openalex.org/W4323319870","https://openalex.org/W4323921570","https://openalex.org/W4365934480","https://openalex.org/W4365934498","https://openalex.org/W4382322519","https://openalex.org/W4389043045"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W2383065991","https://openalex.org/W2942137924","https://openalex.org/W2949225884","https://openalex.org/W4236344152","https://openalex.org/W4310649982","https://openalex.org/W1519370602","https://openalex.org/W2011667854","https://openalex.org/W2949171370","https://openalex.org/W1834967612"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,68],"present":[4,155],"a":[5,48,79,105,110,117,123,159,207,226],"side-channel":[6,39],"analysis":[7],"(SCA)":[8],"on":[9,15,74,109,122,200],"key":[10,30,80,179,228,253],"encapsulation":[11],"mechanisms":[12],"(KEMs)":[13],"based":[14,108,121],"the":[16,55,62,99,134,141,175,178,184,191,194,219,236,246,261],"Fujisaki\u2013Okamoto":[17],"(FO)":[18],"transformation":[19],"and":[20,77,93,114,140,146,173,183,212,241],"its":[21],"variants.":[22],"Many":[23],"post-quantum":[24,75],"KEMs":[25],"usually":[26],"perform":[27],"re-encryption":[28,42],"during":[29],"decapsulation":[31],"to":[32,46,103,133,157,205,232,235],"achieve":[33,78],"chosen-ciphertext":[34],"attack":[35,51,57,85,101,130,187,196,198,217,222,257,264],"(CCA)":[36,58],"security.":[37],"The":[38,95,128,215,255],"leakage":[40],"of":[41,98,186,193,221,248,263],"can":[43,258],"be":[44],"exploited":[45],"mount":[47],"key-recovery":[49],"plaintext-checking":[50],"(KR-PCA),":[52],"even":[53],"if":[54],"chosen-plaintext":[56],"secure":[59],"decryption":[60],"constructing":[61],"KEM":[63],"is":[64,102,131],"securely":[65],"implemented.":[66],"Herein,":[67],"propose":[69],"an":[70],"efficient":[71],"side-channel-assisted":[72],"KR-PCA":[73,107],"KEMs,":[76,244],"recovery":[81,180,229],"with":[82],"significantly":[83],"fewer":[84],"traces":[86,223,265],"than":[87],"existing":[88,237],"ones":[89],"in":[90],"TCHES":[91],"2022":[92],"2023.":[94],"basic":[96],"concept":[97],"proposed":[100,129,195,216,256],"introduce":[104],"new":[106],"multiple-valued":[111],"(MV-)PC":[112],"oracle":[113,120,163,209],"then":[115],"implement":[116],"dedicated":[118],"MV-PC":[119,162],"multi-classification":[124],"neural":[125],"network":[126],"(NN).":[127],"applicable":[132],"NIST":[135],"PQC":[136],"selected":[137],"algorithm":[138],"Kyber":[139,240],"similar":[142],"lattice-based":[143,243],"Saber,":[144],"FrodoKEM":[145],"NTRU":[147],"Prime,":[148],"as":[149,151],"well":[150],"SIKE.":[152,269],"We":[153,189],"also":[154,259],"how":[156],"realize":[158],"sufficiently":[160],"reliable":[161,227],"from":[164],"NN":[165],"model":[166],"outputs":[167],"that":[168],"are":[169],"not":[170],"100%":[171],"accurate,":[172],"analyze":[174],"tradeoff":[176],"between":[177],"success":[181,250],"rate":[182,251],"number":[185,220,262],"traces.":[188],"assess":[190],"feasibility":[192],"through":[197],"experiments":[199],"three":[201],"typical":[202],"symmetric":[203],"primitives":[204],"instantiate":[206],"random":[208],"(SHAKE,":[210],"SHA3,":[211],"AES":[213],"software).":[214],"reduces":[218],"required":[224],"for":[225,252,268],"by":[230,266],"up":[231],"87%":[233],"compared":[234],"attacks":[238],"against":[239],"other":[242],"under":[245],"condition":[247],"99.9999%":[249],"recovery.":[254],"reduce":[260],"85%":[267]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
