In the implementation of the Kyber encryption algorithm, which won the competition of cryptographic algorithms resistant to brute force on a quantum computer, a vulnerability was identified that allows side-channel attacks to recreate secret keys based on measuring the time of operations during...