{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:27:58Z","timestamp":1757618878687,"version":"3.44.0"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031972591"},{"type":"electronic","value":"9783031972607"}],"license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97260-7_12","type":"book-chapter","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:20:49Z","timestamp":1752470449000},"page":"245-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simple Power Analysis Attack on\u00a0SQIsign"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5565-5744","authenticated-orcid":false,"given":"Anisha","family":"Mukherjee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2433-5285","authenticated-orcid":false,"given":"Maciej","family":"Czuprynko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8386-006X","authenticated-orcid":false,"given":"David","family":"Jacquemin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2043-9542","authenticated-orcid":false,"given":"P\u00e9ter","family":"Kutas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9805-5389","authenticated-orcid":false,"given":"Sujoy Sinha","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"12_CR1","unstructured":"Aardal, M.A., et al.: SQISIGN: algorithm specifications and supporting documentation. In: Proposal to NIST Standardization of Additional Digital Signature Schemes, Round2. National Institute for Standards and Technology (2025)"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: SQIsign2D\u2013west: the fast, the small, and the safer. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 339\u2013370. Springer, Heidelberg (2024). DOI: https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"12_CR3","doi-asserted-by":"publisher","unstructured":"Batina, L., Chmielewski, L., Haase, B., Samwel, N., Schwabe, P.: Sok: Sca-secure ECC in software - mission impossible? IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), 557\u2013589 (2023). https:\/\/doi.org\/10.46586\/TCHES.V2023.I1.557-589","DOI":"10.46586\/TCHES.V2023.I1.557-589"},{"key":"12_CR4","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201919, pp. 2129\u20132146. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3363229","DOI":"10.1145\/3319535.3363229"},{"key":"12_CR5","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: EUROCRYPT 2023, Lyon, France, 23\u201327 April 2023, Part V, vol. 14008, pp. 423\u2013447. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"12_CR6","unstructured":"Chavez-Saab, J., et al.: SQISIGN: algorithm specifications and supporting documentation. In: Proposal to NIST Standardization of Additional Digital Signature Schemes, Round1. National Institute for Standards and Technology (2023)"},{"key":"12_CR7","doi-asserted-by":"publisher","unstructured":"Chen, M., Imran, M., Ivanyos, G., Kutas, P., Leroux, A., Petit, C.: Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 99\u2013130. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-981-99-8727-6_4","DOI":"10.1007\/978-981-99-8727-6_4"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-642-25578-6_5","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2011","author":"C Clavier","year":"2011","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Square always exponentiation. In: Bernstein, D.J., Chatterjee, S. (eds.) INDOCRYPT 2011. LNCS, vol. 7107, pp. 40\u201357. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25578-6_5"},{"key":"12_CR9","first-page":"33","volume":"49","author":"G Cornacchia","year":"1908","unstructured":"Cornacchia, G.: Su di un metodo per la risoluzione in numeri interi dell\u2019equazione $$\\sum _{h=0}^n {C}_h x^{n-h}y^h = {P}$$. Giornale di Matematiche di Battaglini 49, 33\u201390 (1908)","journal-title":"Giornale di Matematiche di Battaglini"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-12510-2_6","volume-title":"Smart Card Research and Advanced Application","author":"J-C Courr\u00e8ge","year":"2010","unstructured":"Courr\u00e8ge, J.-C., Feix, B., Roussellet, M.: Simple power analysis on exponentiation revisited. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 65\u201379. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-12510-2_6"},{"key":"12_CR11","unstructured":"Couveignes, J.M.: Hard homogeneous spaces. IACR Cryptol. ePrint Arch. 291 (2006). http:\/\/eprint.iacr.org\/2006\/291"},{"key":"12_CR12","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQISignHD: new dimensions in cryptography. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 3\u201332. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF02940746","volume":"14","author":"M Deuring","year":"1941","unstructured":"Deuring, M.: Die typen der multiplikatorenringe elliptischer funktionenk\u00f6rper. Abh. Math. Semin. Univ. Hambg. 14, 197\u2013272 (1941)","journal-title":"Abh. Math. Semin. Univ. Hambg."},{"key":"12_CR15","doi-asserted-by":"publisher","unstructured":"Ducas, L., et al.: CRYSTALS-dilithium: a lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 238\u2013268 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i1.238-268","DOI":"10.13154\/tches.v2018.i1.238-268"},{"key":"12_CR16","doi-asserted-by":"publisher","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 396\u2013429. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13","DOI":"10.1007\/978-981-96-0891-1_13"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Eriksen, J.K., Panny, L., Sot\u00e1kov\u00e1, J., Veroni, M.: Deuring for the people: supersingular elliptic curves with prescribed endomorphism ring in general characteristic. Cryptol. ePrint Arch. (2023)","DOI":"10.1090\/conm\/796\/16008"},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Feo, L.D., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for the deuring correspondence - towards practical and secure SQISign signatures. In: EUROCRYPT 2023, vol. 14008, pp. 659\u2013690. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"12_CR19","doi-asserted-by":"publisher","unstructured":"Feo, L.D., et al.: SIKE channels zero-value side-channel attacks on SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3), 264\u2013289 (2022). https:\/\/doi.org\/10.46586\/TCHES.V2022.I3.264-289","DOI":"10.46586\/TCHES.V2022.I3.264-289"},{"key":"12_CR20","unstructured":"Fouque, P.A., et al.: FALCON: fast-fourier lattice-based compactsignatures over ntru. In: Proposal to NIST Standardization of Additional Digital Signature Schemes. National Institute for Standards and Technology (2023)"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-70694-8_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"SD Galbraith","year":"2017","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 3\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1"},{"key":"12_CR22","first-page":"76","volume":"48","author":"GH Hardy","year":"1917","unstructured":"Hardy, G.H., Ramanujan, S.: The normal number of prime factors of a number $$n$$. Q. J. Math. 48, 76\u201392 (1917)","journal-title":"Q. J. Math."},{"key":"12_CR23","doi-asserted-by":"publisher","unstructured":"Homma, N., Miyamoto, A., Aoki, T., Satoh, A., Shamir, A.: Comparative power analysis of modular exponentiation algorithms. IEEE Trans. Comput. 59(6), 795\u2013807 (2010). https:\/\/doi.org\/10.1109\/TC.2009.176","DOI":"10.1109\/TC.2009.176"},{"key":"12_CR24","doi-asserted-by":"publisher","unstructured":"Joye, M., Olivier, F.: Side-channel analysis. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, 2nd Ed, pp. 1198\u20131204. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_516","DOI":"10.1007\/978-1-4419-5906-5_516"},{"key":"12_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M Joye","year":"2003","unstructured":"Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291\u2013302. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_22"},{"key":"12_CR26","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1137\/080734467","volume":"39","author":"M Kirschmer","year":"2010","unstructured":"Kirschmer, M., Voight, J.: Algorithmic enumeration of ideal classes for quaternion orders. SIAM J. Comput. 39, 1714\u20131747 (2010). https:\/\/doi.org\/10.1137\/080734467","journal-title":"SIAM J. Comput."},{"key":"12_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion-isogeny path problem. LMS J. Comput. Math. 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"key":"12_CR29","doi-asserted-by":"publisher","unstructured":"Lee, J., et al.: Fault attack on sqisign. In: Saarinen, M.O., Smith-Tone, D. (eds.) Post-Quantum Cryptography - 15th International Workshop, PQCrypto 2024, Oxford, UK, 12\u201314 June 2024, Proceedings, Part II. Lecture Notes in Computer Science, vol. 14772, pp. 54\u201376. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-62746-0_3","DOI":"10.1007\/978-3-031-62746-0_3"},{"key":"12_CR30","unstructured":"Longa, P.: sqisign-ec23 (2023) (2023). https:\/\/github.com\/SQISign\/sqisign-ec23"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems","author":"TS Messerges","year":"1999","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144\u2013157. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_14"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48, 243\u2013264 (1987). https:\/\/api.semanticscholar.org\/CorpusID:4262792","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"12_CR33","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., et al.: SQIsign2D-east: a new signature scheme using 2-dimensional isogenies. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 272\u2013303. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_9","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"12_CR34","unstructured":"National Institute for Standards and Technology (NIST): Post-quantum cryptography: Additional digital signature schemes. https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"12_CR35","unstructured":"National Institute for Standards and Technology (NIST): Call for proposals, post-quantum cryptography standardization (2016). https:\/\/csrc.nist.gov\/csrc\/media\/projects\/post-quantum-cryptography\/documents\/call-for-proposals-final-dec-2016.pdf"},{"key":"12_CR36","doi-asserted-by":"publisher","unstructured":"Park, D., Choi, M., Kim, G., Bae, D., Kim, H., Hong, S.: Stealing keys from hardware wallets: a single trace side-channel attack on elliptic curve scalar multiplication without profiling. IEEE Access 11, 44578\u201344589 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3273150","DOI":"10.1109\/ACCESS.2023.3273150"},{"key":"12_CR37","unstructured":"Pope, G., Meyer, M., Santos, M.C., Eriksen, J.K.: Learningtosqi\/sqisign-sagemath (2023). https:\/\/github.com\/LearningToSQI\/SQISign-SageMath.git"},{"key":"12_CR38","first-page":"145","volume":"2006","author":"A Rostovtsev","year":"2006","unstructured":"Rostovtsev, A., Stolbunov, A.: Public-key cryptosystem based on isogenies. IACR Cryptol. ePrint Arch. 2006, 145 (2006)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"12_CR39","unstructured":"Shanks, D.: Five number-theoretic algorithms. In: Congressus Numerantium 7, Utilitas Mathematica, pp. 51\u201370 (1973)"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves, Graduate texts in mathematics, vol.\u00a0106. Springer, Heidelberg (1986)","DOI":"10.1007\/978-1-4757-1920-8"},{"key":"12_CR41","unstructured":"Tonelli, A.: Bemerkung uber die au osung quadratischer congruenzen. In: Gottinger Nachrichten, pp. 344\u2013346 (1891)"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Voight, J.: Quaternion Algebras. Springer, Heidelberg (2021)","DOI":"10.1007\/978-3-030-56694-4"},{"key":"12_CR43","doi-asserted-by":"publisher","unstructured":"Zhang, F., et al.: Side-channel analysis and countermeasure design on ARM-based quantum-resistant SIKE. IEEE Trans. Comput. 69(11), 1681\u20131693 (2020). https:\/\/doi.org\/10.1109\/TC.2020.3020407","DOI":"10.1109\/TC.2020.3020407"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97260-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T07:24:56Z","timestamp":1757229896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97260-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"ISBN":["9783031972591","9783031972607"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97260-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"2 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africacrypt2025.sciencesconf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}