<?xml version="1.0" encoding="US-ASCII"?>
<dblp>
<article key="journals/tches/BernsteinBBCCKKPRT25" mdate="2025-10-14">
<author>Daniel J. Bernstein</author>
<author>Karthikeyan Bhargavan</author>
<author>Shivam Bhasin</author>
<author>Anupam Chattopadhyay</author>
<author>Tee Kiah Chia</author>
<author>Matthias J. Kannwischer</author>
<author orcid="0009-0003-3632-4613">Franziskus Kiefer</author>
<author orcid="0000-0003-3267-9794">Thales B. Paiva</author>
<author>Prasanna Ravi</author>
<author>Goutam Tamvada</author>
<title>KyberSlash: Exploiting secret-dependent division timings in Kyber implementations.</title>
<pages>209-234</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Trans. Cryptogr. Hardw. Embed. Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.46586/tches.v2025.i2.209-234</ee>
<url>db/journals/tches/tches2025.html#BernsteinBBCCKKPRT25</url>
<stream>streams/journals/tches</stream>
</article>
</dblp>
