<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000401879</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-4-5130</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Look at Side Channel Attacks on Post-quantum Cryptography]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Delgado-Vargas]]></surname>
<given-names><![CDATA[Kevin A.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Mancillas-López]]></surname>
<given-names><![CDATA[Cuauhtémoc]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gallegos-García]]></surname>
<given-names><![CDATA[Gina]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación en Computación ]]></institution>
<addr-line><![CDATA[Mexico City ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Politécnico Nacional Centro de Investigación y de Estudios Avanzados ]]></institution>
<addr-line><![CDATA[Mexico City ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>4</numero>
<fpage>1879</fpage>
<lpage>1896</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000401879&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000401879&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000401879&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Post-quantum cryptography (PQC) is designed to be secure against attacks from quantum computers, yet it remains vulnerable to classic side-channel attacks (SCAs), which exploit physical implementation leaks. This manuscript examines the various SCAs used to evaluate PQC schemes, focusing on non-invasive techniques such as timing, power, and electromagnetic analysis. We provide a detailed account of the execution of these attacks against diverse PQC algorithms and identify common vulnerabilities and weaknesses. Our study reveals that, while various countermeasures have been proposed to protect PQC implementations, they are not entirely effective against sophisticated attacks. Stronger and more resilient countermeasures are needed, especially in IoT environments. The review highlights the weaknesses in the current defenses, including the necessity for more robust masking techniques, adequate security countermeasures tailored to IoT constraints, and methods to generalize SCAs across diverse hardware platforms. These issues must be addressed to enhance the practical security of PQC schemes in real-world scenarios.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[ost-quantum cryptography (PQC)]]></kwd>
<kwd lng="en"><![CDATA[side-channel attacks (SCAs)]]></kwd>
<kwd lng="en"><![CDATA[countermeasures]]></kwd>
<kwd lng="en"><![CDATA[non-invasive attacks]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Rohatgi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multi-channel attacks]]></source>
<year>2003</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2003</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>2-16</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hussain]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ali]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Taimoor]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mitigating side-channel attacks in the IoT ecosystem: A comprehensive review]]></article-title>
<source><![CDATA[ACM Computing Surveys]]></source>
<year>2023</year>
<volume>56</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-35</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Archambeau]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Peeters]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Quisquater]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Template attacks in principal subspaces]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc> </conf-loc>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arnaud]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Fouque]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Timing attack against protected RSA-CRT implementation used in PolarSSL]]></source>
<year>2013</year>
<conf-name><![CDATA[ Topics in Cryptology &#8211; CT-RSA]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>18-33</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Avanzi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoerder]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Page]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Tunstall]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems]]></article-title>
<source><![CDATA[Journal of Cryptographic Engineering]]></source>
<year>2011</year>
<volume>1</volume>
<page-range>271-81</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aydin]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Kashyap]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Potluri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Franzon]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Aysu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[DeePar-SCA: Breaking parallel architectures of lattice cryptography via learning based side-channel attacks]]></source>
<year>2020</year>
<conf-name><![CDATA[ Embedded Computer Systems: Architectures, Modeling, and Simulation]]></conf-name>
<conf-loc> </conf-loc>
<page-range>262-80</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aysu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tobah]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Tiwari]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gerstlauer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Orshansky]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Horizontal side-channel vulnerabilities of post-quantum key exchange protocols]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Symposium on Hardware Oriented Security and Trust (HOST)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>81-8</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Azouaoui]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kuzovkova]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Schneider]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[van-Vredendaal]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Post-quantum authenticated encryption against chosen-ciphertext side-channel attacks]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bangerter]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Blom]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Malkin]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Tuchman]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effective masking techniques for post-quantum cryptographic implementations]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2022</year>
<volume>17</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>945-57</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bauer]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jaulmes]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Prouff]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Wild]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Horizontal and vertical side-channel attacks against secure RSA implementations]]></source>
<year>2013</year>
<conf-name><![CDATA[ Topics in Cryptology &#8211; CT-RSA]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc> </conf-loc>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Becker]]></surname>
<given-names><![CDATA[G. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Active and passive side-channel attacks on delay based puf designs]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bertoni]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Peeters]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Assche]]></surname>
<given-names><![CDATA[G. V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advancements and limitations of masking techniques in side-channel attack mitigation]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[D&#8217;Anvers]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Heinz]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pöppelmann]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Beirendonck]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attacking and defending masked polynomial comparison for lattice-based cryptography]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2021</year>
<volume>2021</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>334-59</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biryukov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Dinu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Le Corre]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel attacks meet secure network protocols]]></source>
<year>2017</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>435-54</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bogdanov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Improved side-channel collision attacks on AES]]></source>
<year>2007</year>
<conf-name><![CDATA[ Selected Areas in Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>84-95</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bonneau]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mironov]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cache-collision timing attacks against AES]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>201-15</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bouvet]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guilley]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Vlasak]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[First-order side-channel leakage analysis of masked but asynchronous AES]]></source>
<year>2021</year>
<conf-name><![CDATA[ Security and Privacy]]></conf-name>
<conf-loc> </conf-loc>
<page-range>16-29</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brier]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Chevallier-Mames]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Ciet]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Clavier]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Why one should also secure RSA public key elements]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>324-38</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carlet]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Heuser]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Picek]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Trade-offs for S-Boxes: Cryptographic properties and side-channel resilience]]></source>
<year>2017</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>393-414</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cayrel]]></surname>
<given-names><![CDATA[P. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dusart]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[McEliece/Niederreiter PKC: Sensitivity to fault injection]]></source>
<year>2010</year>
<conf-name><![CDATA[ 5th International Conference on Future Information Technology]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chowdhury]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Covic]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[R. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Dupee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ganji]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Forte]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions]]></article-title>
<source><![CDATA[Journal of Cryptographic Engineering]]></source>
<year>2020</year>
<page-range>1-37</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Assche]]></surname>
<given-names><![CDATA[G. V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Practical challenges in deploying post-quantum cryptography countermeasures]]></article-title>
<source><![CDATA[IEEE Security &amp; Privacy]]></source>
<year>2023</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>52-61</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[D&#8217;Anvers]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Tiepelt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vercauteren]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Verbauwhede]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Timing attacks on error correcting codes in post-quantum schemes]]></source>
<year>2019</year>
<conf-name><![CDATA[ ACM Workshop on Theory of Implementation Security Workshop]]></conf-name>
<conf-loc> </conf-loc>
<page-range>2-9</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eaton]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lequesne]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Parent]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sendrier]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[QC-MDPC: A timing attack and a CCA2 KEM]]></source>
<year>2018</year>
<conf-name><![CDATA[ Post-Quantum Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>47-76</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaabid]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guilley]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Practical improvements of profiled side-channel attacks on a hardware crypto-accelerator]]></source>
<year>2010</year>
<conf-name><![CDATA[ Progress in Cryptology &#8211; AFRICACRYPT]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>243-60</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foley]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Korkishko]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Scott]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring side-channel attacks on emerging wearable devices]]></article-title>
<source><![CDATA[Journal of Hardware and Systems Security]]></source>
<year>2023</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>57-72</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fouque]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kunz-Jacques]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Martinet]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Valette]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Power attack on small RSA public exponent]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>339-53</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fournaris]]></surname>
<given-names><![CDATA[A. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dimopoulos]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Koufopavlou]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Profiling dilithium digital signature traces for correlation differential side channel attacks]]></source>
<year>2020</year>
<conf-name><![CDATA[ Embedded Computer Systems: Architectures, Modeling, and Simulation]]></conf-name>
<conf-loc> </conf-loc>
<page-range>281-94</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Genelle]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Prouff]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Quisquater]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secure multiplicative masking of power functions]]></source>
<year>2010</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>200-17</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gierlichs]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Lemke-Rust]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Paar]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Templates vs. stochastic methods: A performance analysis for side channel cryptanalysis]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>15-29</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goy]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Loiseau]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaborit]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[A new key recovery side-channel attack on HQC with chosen ciphertext]]></source>
<year>2022</year>
<conf-name><![CDATA[ Post-Quantum Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>353-71</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grünfeld]]></surname>
<given-names><![CDATA[J. M. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-Channel Attacks on CRYSTALS Kyber: An analysis of a post-quantum algorithm and its vulnerabilities to sidechannel attacks]]></source>
<year>2023</year>
<publisher-name><![CDATA[NTNU]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hamoudi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bel-Korchi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Guilley]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Takarabt]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Karray]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Souissi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel analysis of CRYSTALS-Kyber and a novel low-cost countermeasure]]></source>
<year>2021</year>
<conf-name><![CDATA[ Security and Privacy]]></conf-name>
<conf-loc> </conf-loc>
<page-range>30-46</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hashimoto]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Takagi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Sakurai]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[General fault attacks on multivariate public key cryptosystems]]></source>
<year>2013</year>
<volume>96</volume>
<numero>1</numero>
<conf-name><![CDATA[ Post-Quantum Cryptography: 4th International Workshop, PQCrypto]]></conf-name>
<conf-loc> </conf-loc>
<issue>1</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heuser]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rioul]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Guilley]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Good is not good enough]]></source>
<year>2014</year>
<volume>8731</volume>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems &#8211; CHES]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc> </conf-loc>
<page-range>55-74</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heyse]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Moradi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Paar]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Practical power analysis attacks on software implementations of McEliece]]></source>
<year>2010</year>
<conf-name><![CDATA[ Post-Quantum Cryptography]]></conf-name>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>108-25</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Homma]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayashi]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Miura]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Fujimoto]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanaka]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Nagata]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Aoki]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[EM attack is non-invasive? - design methodology and validity verification of EM attack sensor]]></source>
<year>2014</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems-CHES]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Homma]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nagashima]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Imai]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Aoki]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Satoh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[High-resolution side-channel attack using phase-based waveform matching]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems-CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>187-200</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[W. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Power analysis on NTRU prime]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2019</year>
<volume>2020</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>123-51</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hülsing]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cid]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gerbush]]></surname>
<given-names><![CDATA[B. K. V.]]></given-names>
</name>
<name>
<surname><![CDATA[van-der-Meer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Leakage models for post-quantum cryptographic algorithms]]></source>
<year>2023</year>
<conf-name><![CDATA[ International Conference on Cryptographic Hardware and Embedded Systems (CHES)]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamucheka]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Fahr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Teague]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Nelson]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Andrews]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Power-based side channel attack analysis on PQC algorithms]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kannwischer]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Genêt]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Butin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Krämer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchmann]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Differential power analysis of XMSS and SPHINCS]]></source>
<year>2018</year>
<conf-name><![CDATA[ Constructive Side-Channel Analysis and Secure Design]]></conf-name>
<conf-loc> </conf-loc>
<page-range>168-88</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Karabulut]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Aysu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[FALCON down: Breaking FALCON post-quantum signature scheme through side-channel attacks]]></source>
<year>2021</year>
<conf-name><![CDATA[ 58th ACM/IEEE Design Automation Conference (DAC)]]></conf-name>
<conf-date>2021</conf-date>
<conf-loc> </conf-loc>
<page-range>691-6</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kashyap]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Aydin]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Potluri]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Franzon]]></surname>
<given-names><![CDATA[P. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Aysu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[2Deep: Enhancing side-channel attacks on lattice-based key-exchange via 2-D deep learning]]></article-title>
<source><![CDATA[IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems]]></source>
<year>2021</year>
<volume>40</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1217-29</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kircanski]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Youssef]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Differential fault analysis of hc-128]]></source>
<year>2010</year>
<conf-name><![CDATA[ Progress in Cryptology &#8211; AFRICACRYPT]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>261-78</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kocher]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jaffe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jun]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Differential power analysis]]></source>
<year>1999</year>
<conf-name><![CDATA[ Advances in Cryptology-CRYPTO&#8217; 99]]></conf-name>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>388-97</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kocher]]></surname>
<given-names><![CDATA[P. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems]]></source>
<year>1996</year>
<conf-name><![CDATA[ Advances in Cryptology-CRYPTO &#8217;96]]></conf-name>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>104-13</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koeune]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
</person-group>
<source><![CDATA[A tutorial on physical security and side-channel attacks]]></source>
<year>2005</year>
<page-range>78-108</page-range><publisher-loc><![CDATA[Berlin Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Korak]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Plos]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applying remote side-channel analysis attacks on a security-enabled NFC tag]]></source>
<year>2013</year>
<conf-name><![CDATA[ Topics in Cryptology-CT-RSA]]></conf-name>
<conf-date>2013</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>207-22</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dasu]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Baksi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarkar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Jap]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Breier]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Side channel attack on stream ciphers: A three-step approach to state/key recovery]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2022</year>
<volume>2022</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>166-91</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kurtz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[H. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[F. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[L. Z.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Advanced countermeasures for side-channel attacks in post-quantum cryptography]]></article-title>
<source><![CDATA[Journal of Cryptography]]></source>
<year>2023</year>
<volume>34</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>205-28</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[T. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Clédière]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Canovas]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Robisson]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Servière]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lacoume]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[A proposition for correlation power analysis enhancement]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems -CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>174-86</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to side-channel attacks and fault attacks]]></source>
<year>2016</year>
<conf-name><![CDATA[ Asia-Pacific Microwave Conference (APMC)]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>573-5</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adaptation of side-channel attacks to emerging hardware platforms]]></article-title>
<source><![CDATA[IEEE Transactions on Computers]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lohrke]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Tajik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Krachenfels]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Boit]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Seifert]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Key extraction using thermal laser stimulation: A case study on xilinx ultrascale FPGAs]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2018</year>
<volume>2018</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>573-95</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Pan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[den-Hartog]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Principles on the security of AES against first and second-order differential power analysis]]></source>
<year>2010</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>168-85</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maes]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Physically unclonable Functions: Constructions, properties and applications]]></source>
<year>2013</year>
<volume>9783642413957</volume>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maghrebi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Deep learning based side channel attacks in practice]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lioy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Teixeira]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Standardized frameworks for security assessment of post-quantum cryptographic implementations]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Medwed]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Großschädl]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Regazzoni]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fresh re-keying: Security against side-channel and fault attacks for low-cost devices]]></source>
<year>2010</year>
<conf-name><![CDATA[ Progress in Cryptology &#8211; AFRICACRYPT]]></conf-name>
<conf-date>2010</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>279-96</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meijer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards future proof cryptographic implementations: Side-channel analysis on post-quantum key encapsulation mechanism CRYSTALS-kyber]]></source>
<year>2023</year>
<publisher-name><![CDATA[University of Twente]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Molter]]></surname>
<given-names><![CDATA[H. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Stöttinger]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shoufan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Strenzke]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A simple power analysis attack on a McEliece cryptoprocessor]]></article-title>
<source><![CDATA[Journal of Cryptographic Engineering]]></source>
<year>2011</year>
<volume>1</volume>
<page-range>29-36</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mujdei]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wouters]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Karmakar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Beckers]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bermudo-Mera]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Verbauwhede]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Side-channel analysis of lattice-based post-quantum cryptography: Exploiting polynomial multiplication]]></article-title>
<source><![CDATA[ACM Transactions on Embedded Computing Systems]]></source>
<year>2024</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neve]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tiri]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[On the complexity of side-channel attacks on AES-256 &#8211; methodology and quantitative results on cache attacks]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel analysis of post-quantum cryptographic algorithms]]></source>
<year>2023</year>
<publisher-name><![CDATA[KTH Royal Institute of Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Novak]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel attack on substitution blocks]]></source>
<year>2003</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>307-18</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oren]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Weisse]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Wool]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A new framework for constraint-based probabilistic template side channel attacks]]></source>
<year>2014</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems-CHES]]></conf-name>
<conf-date>2014</conf-date>
<conf-loc> </conf-loc>
<page-range>17-34</page-range></nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Han]]></surname>
<given-names><![CDATA[D. G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption]]></source>
<year>2016</year>
<conf-name><![CDATA[ Asian Hardware-Oriented Security and Trust]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peeters]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel cryptanalysis: A brief survey]]></source>
<year>2013</year>
<page-range>11-9</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petrvalsky]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Richmond]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Drutarovsky]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cayrel]]></surname>
<given-names><![CDATA[P. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fischer]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Differential power analysis attack on the secure bit permutation in the McEliece cryptosystem]]></source>
<year>2016</year>
<conf-name><![CDATA[ 26th International Conference Radioelektronika]]></conf-name>
<conf-date>2016</conf-date>
<conf-loc> </conf-loc>
<page-range>132-7</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pietrzak]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A leakage-resilient mode of operation]]></source>
<year>2009</year>
<conf-name><![CDATA[ Advances in Cryptology - EUROCRYPT]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>462-82</page-range></nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prouff]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Giraud]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Aumônier]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Provably secure S-Box implementation based on fourier transform]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc> </conf-loc>
<page-range>216-30</page-range></nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Implementation attacks on post-quantum lattice-based cryptography]]></source>
<year>2023</year>
<publisher-loc><![CDATA[Singapore ]]></publisher-loc>
<publisher-name><![CDATA[Nanyang Technological University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chattopadhyay]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Practical side-channel and fault attacks on lattice-based cryptography]]></source>
<year>2021</year>
<conf-name><![CDATA[ 29th International Conference on Very Large Scale Integration]]></conf-name>
<conf-date>2021</conf-date>
<conf-loc> </conf-loc>
<page-range>1-2</page-range></nlm-citation>
</ref>
<ref id="B75">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jhanwar]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Howe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chattopadhyay]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel assisted existential forgery attack on dilithium - a nist pqc candidate]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B76">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jhanwar]]></surname>
<given-names><![CDATA[M. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Howe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chattopadhyay]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel assisted existential forgery attack on dilithium - A NIST PQC candidate]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B77">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Paiva]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Jap]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[D&#8217;Anvers]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defeating low-cost countermeasures against side-channel attacks in lattice-based encryption: A case study on crystals-kyber]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2024</year>
<volume>2024</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>795-818</page-range></nlm-citation>
</ref>
<ref id="B78">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sinha Roy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chattopadhyay]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bhasin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2020</year>
<volume>2020</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>307-35</page-range></nlm-citation>
</ref>
<ref id="B79">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Santini]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Battaglioni]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiaraluce]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Baldi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Analysis of reaction and timing attacks against cryptosystems based on sparse parity-check codes]]></source>
<year>2019</year>
<conf-name><![CDATA[ Code-Based Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>115-36</page-range></nlm-citation>
</ref>
<ref id="B80">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schaefer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Müller]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Böhme]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cross-scheme vulnerabilities in post-quantum cryptography: A survey]]></article-title>
<source><![CDATA[Journal of Computer Security]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B81">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schamberger]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Renner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sigl]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Wachter-Zeh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[A power side-channel attack on the CCA2-Secure HQC KEM]]></source>
<year>2021</year>
<conf-name><![CDATA[ Smart Card Research and Advanced Applications]]></conf-name>
<conf-loc> </conf-loc>
<page-range>119-34</page-range></nlm-citation>
</ref>
<ref id="B82">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shoufan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Strenzke]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Molter]]></surname>
<given-names><![CDATA[H. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Stöttinger]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A timing attack against patterson algorithm in the McEliece PKC]]></source>
<year>2010</year>
<conf-name><![CDATA[ Information, Security and Cryptology - ICISC]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
<page-range>161-75</page-range></nlm-citation>
</ref>
<ref id="B83">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silverman]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Whyte]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Timing attacks on NTRUEncrypt via variation in the number of hash calls]]></source>
<year>2006</year>
<conf-name><![CDATA[ Topics in Cryptology - CT-RSA]]></conf-name>
<conf-date>2007</conf-date>
<conf-loc> </conf-loc>
<page-range>208-24</page-range></nlm-citation>
</ref>
<ref id="B84">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Introduction to Side-Channel Attacks]]></source>
<year>2010</year>
<page-range>27-42</page-range></nlm-citation>
</ref>
<ref id="B85">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Malkin]]></surname>
<given-names><![CDATA[T. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Yung]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A unified framework for the analysis of side-channel key recovery attacks]]></source>
<year>2009</year>
<conf-name><![CDATA[ Advances in Cryptology -EUROCRYPT]]></conf-name>
<conf-date>2009</conf-date>
<conf-loc> </conf-loc>
<page-range>443-61</page-range></nlm-citation>
</ref>
<ref id="B86">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Peeters]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Archambeau]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Quisquater]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards security limits in side-channel attacks. Cryptographic]]></source>
<year>2006</year>
<conf-name><![CDATA[ Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>30-45</page-range></nlm-citation>
</ref>
<ref id="B87">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stebila]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Thériault]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Unified point addition formulæ and side-channel attacks]]></source>
<year>2006</year>
<conf-name><![CDATA[ Cryptographic Hardware and Embedded Systems - CHES]]></conf-name>
<conf-date>2006</conf-date>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>354-68</page-range></nlm-citation>
</ref>
<ref id="B88">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strenzke]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[A timing attack against the secret permutation in the McEliece PKC]]></source>
<year>2010</year>
<conf-name><![CDATA[ Post-Quantum Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>95-107</page-range></nlm-citation>
</ref>
<ref id="B89">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strenzke]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Timing attacks against the syndrome inversion in code-based cryptosystems]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B90">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strenzke]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Tews]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Molter]]></surname>
<given-names><![CDATA[H. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Overbeck]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shoufan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side channels in the mceliece PKC]]></source>
<year>2008</year>
<conf-name><![CDATA[ Post-Quantum Cryptography]]></conf-name>
<conf-loc> </conf-loc>
<page-range>216-29</page-range></nlm-citation>
</ref>
<ref id="B91">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tajik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dietz]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Frohmann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Dittrich]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Nedospasov]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Helfmeier]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Seifert]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Boit]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hübers]]></surname>
<given-names><![CDATA[H. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Photonic side-channel analysis of arbiter pufs]]></article-title>
<source><![CDATA[Journal of Cryptology]]></source>
<year>2017</year>
<volume>30</volume>
<page-range>550-71</page-range></nlm-citation>
</ref>
<ref id="B92">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tajik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lohrke]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Seifert]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Boit]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[On the power of optical contactless probing: Attacking bitstream encryption of FPGAs]]></source>
<year>2017</year>
<conf-name><![CDATA[ Conference on Computer and Communications Security]]></conf-name>
<conf-date>2017</conf-date>
<conf-loc> </conf-loc>
<page-range>1661-74</page-range></nlm-citation>
</ref>
<ref id="B93">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Teague]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel analysis on post-quantum cryptography algorithms]]></source>
<year>2022</year>
<publisher-name><![CDATA[Computer Science and Computer Engineering Undergraduate Honors Theses]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B94">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[A practical chosen message power analysis approach against ciphers with the key whitening layers]]></source>
<year>2017</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>415-34</page-range></nlm-citation>
</ref>
<ref id="B95">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ueno]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Xagawa]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanaka]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ito]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Takahashi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Homma]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Curse of re-encryption: A generic Power/EM analysis on post-quantum KEMs]]></article-title>
<source><![CDATA[IACR Transactions on Cryptographic Hardware and Embedded Systems]]></source>
<year>2021</year>
<volume>2022</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>296-322</page-range></nlm-citation>
</ref>
<ref id="B96">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Veyrat-Charvillon]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Standaert]]></surname>
<given-names><![CDATA[F. X.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adaptive chosen-message side-channel attacks]]></source>
<year>2010</year>
<conf-name><![CDATA[ Applied Cryptography and Network Security]]></conf-name>
<conf-loc>Berlin Heidelberg </conf-loc>
<page-range>186-99</page-range></nlm-citation>
</ref>
<ref id="B97">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cao]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Practical side-channel attack on masked message encoding in latticed-based kem]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B98">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cross-device side-channel attack techniques: A survey]]></article-title>
<source><![CDATA[IEEE Transactions on Dependable and Secure Computing]]></source>
<year>2024</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>453-66</page-range></nlm-citation>
</ref>
<ref id="B99">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Dong]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Guilley]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[He]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Side-channel analysis and countermeasure design on ARM-Based quantum-resistant SIKE]]></article-title>
<source><![CDATA[IEEE Transactions on Computers]]></source>
<year>2020</year>
<volume>69</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1681-93</page-range></nlm-citation>
</ref>
<ref id="B100">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securing IoT devices against side-channel attacks: Challenges and solutions]]></article-title>
<source><![CDATA[IEEE Internet of Things Journal]]></source>
<year>2022</year>
<volume>9</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1245-58</page-range></nlm-citation>
</ref>
<ref id="B101">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Feng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Side-channel attacks: Ten years after its publication and the impacts on cryptographic module security testing]]></source>
<year>2005</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
