Jan. 17, 2024, 1 p.m. |

IACR News www.iacr.org

ePrint Report: The Insecurity of Masked Comparisons: SCAs on ML-KEM’s FO-Transform

Julius Hermelink, Kai-Chun Ning, Emanuele Strieder


NIST has released the draft standard for ML-KEM, and ML-KEM is actively used in several widely-distributed applications. Thus, the wide-spread use of ML-KEM in the embedded worlds has to be expected in the near future. This makes security against side-channel attacks a pressing matter.


Several side-channel attacks have previously been proposed, and one line of research have been attacks against the comparison step …

applications comparisons distributed draft embedded eprint report insecurity near nist report standard transform

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Principal Security Analyst - Threat Labs (Position located in India) (Remote)

@ KnowBe4, Inc. | Kochi, India

Cyber Security - Cloud Security and Security Architecture - Manager - Multiple Positions - 1500860

@ EY | Dallas, TX, US, 75219

Enterprise Security Architect (Intermediate)

@ Federal Reserve System | Remote - Virginia

Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Associate -- Dallas

@ Goldman Sachs | Dallas, Texas, United States

Vulnerability Management Team Lead - North Central region (Remote)

@ GuidePoint Security LLC | Remote in the United States