Paper 2025/811

Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4

Azade Rezaeezade, Delft University of Technology, The Netherlands, Radboud University, The Netherlands
Trevor Yap, Temasek Laboratories, Nanyang Technological University, Singapore
Dirmanto Jap, Temasek Laboratories, Nanyang Technological University, Singapore
Shivam Bhasin, Temasek Laboratories, Nanyang Technological University, Singapore
Stjepan Picek, Radboud University, The Netherlands
Abstract

We present a dataset of side-channel power measurements captured during pair-pointwise multiplication in the decapsulation procedure of the Kyber Key Encapsulation Mechanism (KEM). The dataset targets the pair-pointwise multiplication step in the NTT domain, a key computational component of Kyber. The dataset is collected using the reference implementation from the PQClean project. We hope the dataset helps in research in ``classical'' power analysis and deep learning-based side-channel attacks on post-quantum cryptography (PQC).

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Side-channel AttacksPost-Quantum CryptographyCRYSTAL-KyberDataset
Contact author(s)
a rezaeezade-1 @ tudelft nl
trevor yap @ ntu edu sg
djap @ ntu edu sg
sbhasin @ ntu edu sg
stjepan picek @ ru nl
History
2025-05-09: approved
2025-05-06: received
See all versions
Short URL
https://ia.cr/2025/811
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/811,
      author = {Azade Rezaeezade and Trevor Yap and Dirmanto Jap and Shivam Bhasin and Stjepan Picek},
      title = {Side-Channel Power Trace Dataset for Kyber Pair-Pointwise Multiplication on Cortex-M4},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/811},
      year = {2025},
      url = {https://eprint.iacr.org/2025/811}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.