IACR News item: 05 September 2025
Sedric Nkotto
Kyber a.k.a ML-KEM has been stardardized by NIST under FIPS-203 and will
definetely in the coming years be implemented in several commercial products.
However the resilience of implementations against side channel attacks is still an open
and practical concern. One of the drawbacks of the ongoing side channel analysis
research related to PQC schemes is the availability of open source datasets. Luckily
some opensource datasets start popping up. For instance the one recently published
by Rezaeezade et al. in [2]. This dataset captures power consumption during a pair-
pointwise multiplication occuring in the course of ML-KEM decapsulation process
and involving the decapsulation (sub)key and ciphertexts. In this paper we present
a template side channel attack targetting that operation, which yields a complete
recovery of the decapsulation secret (sub)key.
Additional news items may be found on the IACR news page.