Paper 2025/811
Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4
Abstract
We present a dataset of side-channel power measurements captured during pair-pointwise multiplication in the decapsulation procedure of the Kyber Key Encapsulation Mechanism (KEM). The dataset targets the pair-pointwise multiplication step in the NTT domain, a key computational component of Kyber. The dataset is collected using the reference implementation from the PQClean project. We hope the dataset helps in research in ``classical'' power analysis and deep learning-based side-channel attacks on post-quantum cryptography (PQC).
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Side-channel AttacksPost-Quantum CryptographyCRYSTAL-KyberDataset
- Contact author(s)
-
a rezaeezade-1 @ tudelft nl
trevor yap @ ntu edu sg
djap @ ntu edu sg
sbhasin @ ntu edu sg
stjepan picek @ ru nl - History
- 2025-05-09: approved
- 2025-05-06: received
- See all versions
- Short URL
- https://ia.cr/2025/811
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/811, author = {Azade Rezaeezade and Trevor Yap and Dirmanto Jap and Shivam Bhasin and Stjepan Picek}, title = {Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/811}, year = {2025}, url = {https://eprint.iacr.org/2025/811} }