Abstract. CRYSTALS-Dilithium has been selected by the NIST as the new standard for post-quantum digital signatures. In this work, we revisit the side-channel

countermeasures of Dilithium in three directions. First, we improve its sensitivity

analysis by classifying intermediate computations according their physical security

requirements. This allows us to identify which parts of Dilithium must be protected

against Differential Power Analysis (DPA), which parts must be protected against

Simple Power Analysis (SPA) and which parts can leak in an unbounded manner. Second, we provide improved gadgets dedicated to Dilithium, taking advantage of recent

advances in masking conversion algorithms. Third, we combine these contributions

with standard shuffling techniques in order to design so-called leveled implementations

that offer an improved security vs. performance trade-off compared to the state-ofthe-art. Our benchmarking results additionally put forward that the randomized

version of Dilithium can lead to significantly more efficient implementations (than its

deterministic version) when side-channel attacks are a concern.

Keywords: Dilithium · Masking · Lattice-based Cryptography · Post-Quantum

Cryptography · Side-Channel Countermeasures