Due to the potential damage a cryptrographically relevant quantum computer could do to uses of widely used asymmetric cryptographic algorithms, a range of new “post-quantum” algorithms have been developed and are being widely deployed, e.g. in TLS in web browsers. This project is to investigate potential timing issues with implementations of such algorithms, likely reproducing tests previously done, with current implementations of such algorithms.