{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:05:25Z","timestamp":1777129525966,"version":"3.51.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031972591","type":"print"},{"value":"9783031972607","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97260-7_13","type":"book-chapter","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:20:59Z","timestamp":1752470459000},"page":"270-295","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Correlation Power Analysis of\u00a0LESS and\u00a0CROSS"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2433-5285","authenticated-orcid":false,"given":"Maciej","family":"Czuprynko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5565-5744","authenticated-orcid":false,"given":"Anisha","family":"Mukherjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9805-5389","authenticated-orcid":false,"given":"Sujoy Sinha","family":"Roy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"13_CR1","unstructured":"Survey on side-channel attacks on code-based key encapsulation mechanism. Mor. J. Algebra Geom. Appl. (in press)"},{"key":"13_CR2","unstructured":"Baldi, M., et al.: LESS: linear equivalence signature scheme, version 1.2. National Institute for Standards and Technology (2023). https:\/\/www.less-project.com\/LESS-2024-02-19.pdf"},{"key":"13_CR3","unstructured":"Baldi, M., et al.: CROSS: code and restricted object signature. National Institute for Standards and Technology (2023). https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/CROSS-spec-web.pdf"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Baldi, M., Bitzer, S., Pavoni, A., Santini, P., Wachter-Zeh, A., Weger, V.: Zero knowledge protocols and signatures from the restricted syndrome decoding problem. In: Tang, Q., Teague, V. (eds.) Public-Key Cryptography - PKC 2024 - 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, 15\u201317 April 2024, Proceedings, Part II. Lecture Notes in Computer Science, vol. 14602, pp. 243\u2013274. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-57722-2_8","DOI":"10.1007\/978-3-031-57722-2_8"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, pp. 2129\u20132146. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3363229","DOI":"10.1145\/3319535.3363229"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Biasse, J., Micheli, G., Persichetti, E., Santini, P.: LESS is more: code-based signatures without syndromes. In: Nitaj, A., Youssef, A.M. (eds.) Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, 20\u201322 July 2020, Proceedings. Lecture Notes in Computer Science, vol. 12174, pp. 45\u201365. Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-51938-4_3","DOI":"10.1007\/978-3-030-51938-4_3"},{"key":"13_CR7","doi-asserted-by":"publisher","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.J. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2004, pp. 16\u201329. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"13_CR8","unstructured":"Chou, T., Persichetti, E., Santini, P.: On linear equivalence, canonical forms, and digital signatures. Cryptology ePrint Archive, Paper 2023\/1533 (2023). https:\/\/eprint.iacr.org\/2023\/1533"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., Verneuil, V.: Horizontal correlation analysis on exponentiation. Cryptology ePrint Archive, Paper 2010\/394 (2010). https:\/\/eprint.iacr.org\/2010\/394","DOI":"10.1007\/978-3-642-17650-0_5"},{"key":"13_CR10","unstructured":"Colombier, B., Grosso, V., Cayrel, P.L., Dr\u011fgoi, V.F.: Horizontal correlation attack on classic McEliece. Cryptology ePrint Archive, Paper 2023\/546 (2023). https:\/\/eprint.iacr.org\/2023\/546"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Coron, J.S., Kocher, P., Naccache, D.: Statistics and secret leakage. In: Frankel, Y. (ed.) Financial Cryptography, pp. 157\u2013173. Springer (2001). https:\/\/doi.org\/10.1007\/3-540-45472-1_12","DOI":"10.1007\/3-540-45472-1_12"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Doumas, A.V., Papanicolaou, V.G.: The coupon collector\u2019s problem revisited: generalizing the double dixie cup problem of newman and shepp (2015). https:\/\/arxiv.org\/abs\/1412.3626","DOI":"10.1051\/ps\/2016016"},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Ducas, L., et al.: CRYSTALS-dilithium: a lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 238\u2013268 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i1.238-268","DOI":"10.13154\/tches.v2018.i1.238-268"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) Advances in Cryptology - CRYPTO 1999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, 15\u201319 August 1999, Proceedings. Lecture Notes in Computer Science, vol.\u00a01666, pp. 388\u2013397. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"13_CR15","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks - revealing the secrets of smart cards. Springer (2007)"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Mayer-Sommer, R.: Smartly analyzing the simplicity and the power of simple power analysis on smartcards. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems \u2014 CHES 2000, pp. 78\u201392. Springer. https:\/\/doi.org\/10.1007\/3-540-44499-8_6","DOI":"10.1007\/3-540-44499-8_6"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Mondal, P., Adhikary, S., Kundu, S., Karmakar, A.: ZKFault: fault attack analysis on zero-knowledge based post-quantum digital signature schemes. Cryptology ePrint Archive, Paper 2024\/1422 (2024). https:\/\/eprint.iacr.org\/2024\/1422","DOI":"10.1007\/978-981-96-0944-4_5"},{"key":"13_CR18","unstructured":"National Institute for Standards and Technology (NIST): Post-quantum cryptography: Additional digital signature schemes. https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Persichetti, E., Santini, P.: A new formulation of the linear equivalence problem and shorter less signatures. Springer (2023)","DOI":"10.1007\/978-981-99-8739-9_12"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Schamberger, T., Renner, J., Sigl, G., Wachter-Zeh, A.: A power side-channel attack on the CCA2-secure HQC KEM. Cryptology ePrint Archive, Paper 2020\/910 (2020). https:\/\/eprint.iacr.org\/2020\/910","DOI":"10.1007\/978-3-030-68487-7_8"},{"key":"13_CR21","unstructured":"Schupp, J., Sigl, G.: A horizontal attack on the codes and restricted objects signature scheme (CROSS). Cryptology ePrint Archive, Paper 2025\/116 (2025). https:\/\/eprint.iacr.org\/2025\/116"},{"issue":"5","key":"13_CR22","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Shor, P.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134 (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97260-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T10:22:56Z","timestamp":1757240576000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97260-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"ISBN":["9783031972591","9783031972607"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97260-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"2 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africacrypt2025.sciencesconf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}