{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:50:22Z","timestamp":1742975422740,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953119"},{"type":"electronic","value":"9783030953126"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95312-6_9","type":"book-chapter","created":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T17:08:51Z","timestamp":1643476131000},"page":"196-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring\/Mod-LWE\/LWR Based Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7788-5535","authenticated-orcid":false,"given":"Han","family":"Wu","sequence":"first","affiliation":[]},{"given":"Guangwu","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,29]]},"reference":[{"key":"9_CR1","first-page":"4","volume":"2","author":"E Alkim","year":"2019","unstructured":"Alkim, E., et al.: NewHope algorithm specifications and supporting documentation. NIST PQC Round 2, 4\u201311 (2019)","journal-title":"NIST PQC Round"},{"key":"9_CR2","unstructured":"Alkim, E., Ducas, L., P\u00f6ppelmann, T., Schwabe, P.: Post-quantum key exchange: a new hope. In: Proceedings of the 25th USENIX Conference on Security Symposium, pp. 327\u2013343 (2016)"},{"key":"9_CR3","first-page":"4","volume":"2","author":"R Avanzi","year":"2019","unstructured":"Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2, 4 (2019)","journal-title":"NIST PQC Round"},{"key":"9_CR4","unstructured":"Basso, A., et al.: SABER: mod-LWR based KEM (round 3 submission) (2020)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Bindel, N., Schanck, J.M.: Decryption failure is more likely after success. In: International Conference on Post-Quantum Cryptography, pp. 206\u2013225 (2020)","DOI":"10.1007\/978-3-030-44223-1_12"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bos, J., et al.: CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: European Symposium on Security and Privacy, pp. 353\u2013367 (2018)","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"9_CR7","first-page":"1837","volume":"14","author":"TT Cai","year":"2013","unstructured":"Cai, T.T., Fan, J., Jiang, T.: Distributions of angles in random packing on spheres. J. Mach. Learn. Res. 14, 1837 (2013)","journal-title":"J. Mach. Learn. Res."},{"key":"9_CR8","unstructured":"Cao, J., Niu, D.W., Qi, F.: A Wallis type inequality and a double inequality for probability integral. Aust. J. Math. Anal. Appl. 4, 6 (2007). Art. 3"},{"key":"9_CR9","unstructured":"D\u2019Anvers, J.P., Batsleer, S.: Multitarget decryption failure attacks and their application to saber and kyber. Cryptology ePrint Archive, Report 2021\/193 (2021)"},{"key":"9_CR10","unstructured":"D\u2019Anvers, J.P., Vercauteren, F., Verbauwhede, I.: On the impact of decryption failures on the security of LWE\/LWR based schemes. Cryptology ePrint Archive, Report 2018\/1089 (2018)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"D\u2019Anvers, J.P., Guo, Q., Johansson, T., Nilsson, A., Vercauteren, F., Verbauwhede, I.: Decryption failure attacks on IND-CCA secure lattice-based schemes. In: Public-Key Cryptography - PKC 2019, pp. 565\u2013598 (2019)","DOI":"10.1007\/978-3-030-17259-6_19"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"D\u2019Anvers, J.P., Rossi, M., Virdia, F.: (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes. In: Advances in Cryptology - EUROCRYPT 2020, pp. 3\u201333. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45727-3_1","DOI":"10.1007\/978-3-030-45727-3_1"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-030-25510-7_6","volume-title":"Post-Quantum Cryptography","author":"J-P D\u2019Anvers","year":"2019","unstructured":"D\u2019Anvers, J.-P., Vercauteren, F., Verbauwhede, I.: The impact of error dependencies on Ring\/Mod-LWE\/LWR based schemes. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 103\u2013115. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_6"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-030-64837-4_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"Q Guo","year":"2020","unstructured":"Guo, Q., Johansson, T.: A new decryption failure attack against HQC. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 353\u2013382. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_12"},{"key":"9_CR15","unstructured":"Guo, Q., Johansson, T., Nilsson, A.: A generic attack on lattice based schemes using decryption errors. Cryptology ePrint Archive, Report 2019\/043 (2019)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-030-34578-5_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"Q Guo","year":"2019","unstructured":"Guo, Q., Johansson, T., Yang, J.: A novel CCA attack using decryption errors against LAC. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 82\u2013111. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_4"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1090\/S0002-9939-05-08104-9","volume":"134","author":"S Koumandos","year":"2006","unstructured":"Koumandos, S.: Remarks on a paper by Chao-Ping Chen and Feng Qi. Proc. Am. Math. Soc. 134(5), 1365\u20131367 (2006)","journal-title":"Proc. Am. Math. Soc."},{"key":"9_CR18","unstructured":"Lee, Y., Kim, W.C.: Concise formulas for the surface area of the intersection of two hyperspherical caps. KAIST Technical Report (2014)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"66","DOI":"10.3923\/ajms.2011.66.70","volume":"4","author":"S Li","year":"2011","unstructured":"Li, S.: Concise formulas for the area and volume of a hyperspherical cap. Asian J. Math. Stat. 4, 66\u201370 (2011)","journal-title":"Asian J. Math. Stat."},{"key":"9_CR20","unstructured":"Naehrig, M., et al.: FrodoKEM: learning with errors key encapsulation-algorithm specifications and supporting documentation. NIST Technical Report (2019)"}],"container-title":["Lecture Notes in Computer Science","Topics in Cryptology \u2013 CT-RSA 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95312-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T11:25:00Z","timestamp":1710329100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95312-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953119","9783030953126"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95312-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CT-RSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cryptographers\u2019 Track at the RSA Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Francisco, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ctrsa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ct-rsa-2022.auckland.ac.nz\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}