{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:10:48Z","timestamp":1771330248882,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031544088","type":"print"},{"value":"9783031544095","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54409-5_3","type":"book-chapter","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T06:08:12Z","timestamp":1708582092000},"page":"43-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Differential Fault Attack Against Deterministic Falcon Signatures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1882-6110","authenticated-orcid":false,"given":"Sven","family":"Bauer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3194-826X","authenticated-orcid":false,"given":"Fabrizio","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,23]]},"reference":[{"key":"3_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-31517-1_3","volume-title":"AFRICACRYPT 2016","author":"S Akleylek","year":"2016","unstructured":"Akleylek, S., Bindel, N., Buchmann, J.A., Kr\u00e4mer, J., Marson, G.A.: An efficient lattice-based signature scheme with provably secure instantiation. In: Pointcheval, D., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2016. LNCS, vol. 9646, pp. 44\u201360. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-31517-1_3"},{"key":"3_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1007\/978-3-030-17656-3_25","volume-title":"EUROCRYPT 2019, Part II","author":"MR Albrecht","year":"2019","unstructured":"Albrecht, M.R., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E.W., Stevens, M.: The general sieve kernel and new records in lattice reduction. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019, Part II. LNCS, vol. 11477, pp. 717\u2013746. Springer, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-17656-3_25"},{"key":"3_CR3","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-76953-0_18","volume-title":"CT-RSA 2018","author":"C Ambrose","year":"2018","unstructured":"Ambrose, C., Bos, J.W., Fay, B., Joye, M., Lochter, M., Murray, B.: Differential attacks on deterministic signatures. In: Smart, N.P. (ed.) CT-RSA 2018. LNCS, vol. 10808, pp. 339\u2013353. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-76953-0_18"},{"key":"3_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-319-44524-3_11","volume-title":"IWSEC 16","author":"A Barenghi","year":"2016","unstructured":"Barenghi, A., Pelosi, G.: A note on fault attacks against deterministic signature schemes. In: Ogawa, K., Yoshioka, K. (eds.) IWSEC 16. LNCS, vol. 9836, pp. 182\u2013192. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-44524-3_11"},{"key":"3_CR5","unstructured":"Bindel, N., et al.: qTESLA. Technical report, National Institute of Standards and Technology (2017). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Bindel, N., Buchmann, J., Kr\u00e4mer, J.: Lattice-based signature schemes and their sensitivity to fault attacks. In: 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2016, Santa Barbara, CA, USA, 16 August 2016, pp. 63\u201377. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/FDTC.2016.11","DOI":"10.1109\/FDTC.2016.11"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Bruinderink, L.G., Pessl, P.: Differential fault attacks on deterministic lattice signatures. IACR TCHES 2018(3), 21\u201343 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.21-43. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7267","DOI":"10.13154\/tches.v2018.i3.21-43"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-030-95312-6_8","volume-title":"Topics in Cryptology - CT-RSA 2022","author":"W Cao","year":"2022","unstructured":"Cao, W., Shi, H., Chen, H., Chen, J., Fan, L., Wu, W.: Lattice-based fault attacks on deterministic signature schemes of ECDSA and EDDSA. In: Galbraith, S.D. (ed.) Topics in Cryptology - CT-RSA 2022. Lecture Notes in Computer Science, vol. 13161, pp. 169\u2013195. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-95312-6_8"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Chuengsatiansup, C., Prest, T., Stehl\u00e9, D., Wallet, A., Xagawa, K.: ModFalcon: compact signatures based on module NTRU lattices. Cryptology ePrint Archive, Report 2019\/1456 (2019). https:\/\/eprint.iacr.org\/2019\/1456","DOI":"10.1145\/3320269.3384758"},{"key":"3_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-40041-4_3","volume-title":"CRYPTO 2013, Part I","author":"L Ducas","year":"2013","unstructured":"Ducas, L., Durmus, A., Lepoint, T., Lyubashevsky, V.: Lattice signatures and bimodal Gaussians. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 40\u201356. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40041-4_3"},{"key":"3_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-662-45608-8_2","volume-title":"ASIACRYPT 2014, Part II","author":"L Ducas","year":"2014","unstructured":"Ducas, L., Lyubashevsky, V., Prest, T.: Efficient identity-based encryption over NTRU lattices. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014, Part II. LNCS, vol. 8874, pp. 22\u201341. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_2"},{"key":"3_CR12","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-319-69453-5_8","volume-title":"SAC 2016","author":"T Espitau","year":"2016","unstructured":"Espitau, T., Fouque, P.A., G\u00e9rard, B., Tibouchi, M.: Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures. In: Avanzi, R., Heys, H.M. (eds.) SAC 2016. LNCS, vol. 10532, pp. 140\u2013158. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-319-69453-5_8"},{"key":"3_CR13","unstructured":"Espitau, T., et al.: Mitaka: a simpler, parallelizable, maskable variant of falcon. Cryptology ePrint Archive, Report 2021\/1486 (2021). https:\/\/eprint.iacr.org\/2021\/1486"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. Cryptology ePrint Archive, Report 2007\/432 (2007). https:\/\/eprint.iacr.org\/2007\/432","DOI":"10.1145\/1374376.1374407"},{"key":"3_CR15","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-319-64647-3_13","volume-title":"COSADE 2017","author":"OM Guillen","year":"2017","unstructured":"Guillen, O.M., Gruber, M., De Santis, F.: Low-cost setup for localized semi-invasive optical fault injection attacks - how low can we go? In: Guilley, S. (ed.) COSADE 2017. LNCS, vol. 10348, pp. 207\u2013222. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-64647-3_13"},{"key":"3_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1007\/978-3-642-33027-8_31","volume-title":"CHES 2012","author":"T G\u00fcneysu","year":"2012","unstructured":"G\u00fcneysu, T., Lyubashevsky, V., P\u00f6ppelmann, T.: Practical lattice-based cryptography: a signature scheme for embedded systems. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 530\u2013547. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33027-8_31"},{"key":"3_CR17","unstructured":"Hulsing, A., et al.: SPHINCS+. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"3_CR18","unstructured":"Lazar, D., Peikert, C., algoidan: Deterministic falcon implementation. https:\/\/github.com\/algorand\/falcon. Accessed 17 Nov 2022"},{"key":"3_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/978-3-319-93638-3_50","volume-title":"ACISP 2018","author":"X Lu","year":"2018","unstructured":"Lu, X., Zhang, Z., Au, M.H.: Practical signatures from the partial Fourier recovery problem revisited: a provably-secure and Gaussian-distributed construction. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 813\u2013820. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-93638-3_50"},{"key":"3_CR20","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2017). https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-1-submissions"},{"key":"3_CR21","unstructured":"Lyubashevsky, V., et al.: CRYSTALS-DILITHIUM. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"McCarthy, S., Howe, J., Smyth, N., Brannigan, S., O\u2019Neill, M.: BEARZ attack FALCON: Implementation attacks with countermeasures on the FALCON signature scheme. Cryptology ePrint Archive, Report 2019\/478 (2019). https:\/\/eprint.iacr.org\/2019\/478","DOI":"10.5220\/0007834800610071"},{"key":"3_CR23","unstructured":"NIST: NIST announces first four quantum-resistant cryptographic algorithms. https:\/\/www.nist.gov\/news-events\/news\/2022\/07\/nist-announces-first-four-quantum-resistant-cryptographic-algorithms (2022). Accessed 21 Dec 2022"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., R\u00f6sler, P.: Attacking deterministic signature schemes using fault attacks. Cryptology ePrint Archive, Report 2017\/1014 (2017). https:\/\/eprint.iacr.org\/2017\/1014","DOI":"10.1109\/EuroSP.2018.00031"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., R\u00f6sler, P.: Attacking deterministic signature schemes using fault attacks. In: 2018 IEEE European Symposium on Security and Privacy, EuroS &P 2018, London, United Kingdom, 24\u201326 April 2018, pp. 338\u2013352. IEEE (2018). https:\/\/doi.org\/10.1109\/EuroSP.2018.00031","DOI":"10.1109\/EuroSP.2018.00031"},{"key":"3_CR26","unstructured":"Prest, T., \u2018Dan\u2019: falcon.py. https:\/\/github.com\/tprest\/falcon.py. Accessed 31 Dec 2022"},{"key":"3_CR27","unstructured":"Prest, T., et al.: FALCON. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Romailler, Y., Pelissier, S.: Practical fault attack against the ED25519 and EDDSA signature schemes. In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, 25 September 2017, pp. 17\u201324. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/FDTC.2017.12","DOI":"10.1109\/FDTC.2017.12"},{"key":"3_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-319-89339-6_17","volume-title":"AFRICACRYPT 2018","author":"N Samwel","year":"2018","unstructured":"Samwel, N., Batina, L.: Practical fault injection on deterministic signatures: the case of EdDSA. In: Joux, A., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2018. LNCS, vol. 10831, pp. 306\u2013321. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-319-89339-6_17"},{"key":"3_CR30","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Zeh, A., Meier, M., Rieger, V.: Parity-based concurrent error detection schemes for the ChaCha stream cipher. In: 2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2019, Noordwijk, Netherlands, 2\u20134 October 2019, pp. 1\u20134. IEEE (2019). https:\/\/doi.org\/10.1109\/DFT.2019.8875478","DOI":"10.1109\/DFT.2019.8875478"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54409-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,31]],"date-time":"2024-03-31T12:01:42Z","timestamp":1711886502000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54409-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031544088","9783031544095"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54409-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"23 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARDIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Card Research and Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cardis2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}