A side-channel attack on a masked and shuffled software implementation of Saber
In this paper, we show that a software implementation of IND-CCA-secure Saber key encapsulation mechanism protected by first-order masking and shuffling can be broken by deep learning-based power analysis. Using an ensemble of deep neural networks trained at the profiling stage, we can recover the session key and the secret key from 257 × N and 24 × 257 × N traces, respectively, where N is the num