{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:10:58Z","timestamp":1765113058167,"version":"3.44.0"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032019004","type":"print"},{"value":"9783032019011","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-01901-1_1","type":"book-chapter","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T08:44:44Z","timestamp":1755333884000},"page":"3-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Finding and\u00a0Protecting the\u00a0Weakest Link"],"prefix":"10.1007","author":[{"given":"Julius","family":"Hermelink","sequence":"first","affiliation":[]},{"given":"Kai-Chun","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Petri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M-L Akkar","year":"2000","unstructured":"Akkar, M.-L., Bevan, R., Dischamp, P., Moyart, D.: Power analysis, what is now possible... In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 489\u2013502. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3_38"},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Albrecht, M.R., Deo, A., Paterson, K.G.: Cold boot attacks on ring and module LWE keys under the NTT. IACR TCHES 2018(3), 173\u2013213 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i3.173-213, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7273","DOI":"10.13154\/tches.v2018.i3.173-213"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Azouaoui, M., et al.: Protecting Dilithium against leakage revisited sensitivity analysis and improved implementations. IACR TCHES 2023(4), 58\u201379 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i4.58-79","DOI":"10.46586\/tches.v2023.i4.58-79"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bela\u00efd, S., Rivain, M., Rossi, M.: New techniques for random probing security and application to raccoon signature scheme. Cryptology ePrint Archive, Report 2025\/278 (2025), https:\/\/eprint.iacr.org\/2025\/278","DOI":"10.1007\/978-3-031-91101-9_4"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Bettale, L., Coron, J.S., Zeitoun, R.: Improved high-order conversion from Boolean to arithmetic masking. IACR TCHES 2018(2), 22\u201345 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i2.22-45, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/873","DOI":"10.13154\/tches.v2018.i2.22-45"},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Bos, J.W., et al.: CRYSTALS - kyber: a cca-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy, EuroS &P 2018, London, United Kingdom, 24\u201326 April 2018, pp. 353\u2013367. IEEE (2018). https:\/\/doi.org\/10.1109\/EUROSP.2018.00032","DOI":"10.1109\/EUROSP.2018.00032"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Bronchain, O., Azouaoui, M., ElGhamrawy, M., Renes, J., Schneider, T.: Exploiting small-norm polynomial multiplication with physical attacks application to CRYSTALS-Dilithium. IACR TCHES 2024(2), 359\u2013383 (2024). https:\/\/doi.org\/10.46586\/tches.v2024.i2.359-383","DOI":"10.46586\/tches.v2024.i2.359-383"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S Chari","year":"2003","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Chen, Z., Karabulut, E., Aysu, A., Ma, Y., Jing, J.: An efficient non-profiled side-channel attack on the crystals-dilithium post-quantum signature. In: 39th IEEE International Conference on Computer Design, ICCD 2021, Storrs, CT, USA, 24\u201327 October 2021, pp. 583\u2013590. IEEE (2021). https:\/\/doi.org\/10.1109\/ICCD53106.2021.00094","DOI":"10.1109\/ICCD53106.2021.00094"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Coron, J.S., G\u00e9rard, F., Lepoint, T., Trannoy, M., Zeitoun, R.: Improved high-order masked generation of masking vector and rejection sampling in dilithium. Cryptology ePrint Archive, Report 2024\/1149 (2024), https:\/\/eprint.iacr.org\/2024\/1149","DOI":"10.46586\/tches.v2024.i4.335-354"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Coron, J.S., G\u00e9rard, F., Montoya, S., Zeitoun, R.: High-order table-based conversion algorithms and masking lattice-based encryption. IACR TCHES 2022(2), 1\u201340 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i2.1-40","DOI":"10.46586\/tches.v2022.i2.1-40"},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Coron, J.S., G\u00e9rard, F., Trannoy, M., Zeitoun, R.: Improved gadgets for the high-order masking of Dilithium. IACR TCHES 2023(4), 110\u2013145 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i4.110-145","DOI":"10.46586\/tches.v2023.i4.110-145"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-56880-1_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"D Dachman-Soled","year":"2020","unstructured":"Dachman-Soled, D., Ducas, L., Gong, H., Rossi, M.: LWE with side information: attacks and concrete security estimation. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12171, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_12"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Dachman-Soled, D., Gong, H., Hanson, T., Kippen, H.: Revisiting security estimation for LWE with hints from a geometric perspective. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0V. LNCS, vol. 14085, pp. 748\u2013781. Springer, Cham, August 2023. https:\/\/doi.org\/10.1007\/978-3-031-38554-4_24","DOI":"10.1007\/978-3-031-38554-4_24"},{"key":"1_CR17","unstructured":"del Pino, R., et al.: Raccoon. Technical Report, National Institute of Standards and Technology (2023), https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-1-additional-signatures"},{"issue":"4","key":"1_CR18","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1007\/s00145-018-9277-0","volume":"32","author":"A Duc","year":"2018","unstructured":"Duc, A., Faust, S., Standaert, F.-X.: Making masking security proofs concrete (Or how to evaluate the security of any leaking device), Extended version. J. Cryptol. 32(4), 1263\u20131297 (2018). https:\/\/doi.org\/10.1007\/s00145-018-9277-0","journal-title":"J. Cryptol."},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Ducas, L., et al.: Crystals-dilithium: a lattice-based digital signature scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 238\u2013268 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I1.238-268","DOI":"10.13154\/TCHES.V2018.I1.238-268"},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Ducas, L., et al.: CRYSTALS-Dilithium: a lattice-based digital signature scheme. IACR TCHES 2018(1), 238\u2013268 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i1.238-268, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/839","DOI":"10.13154\/tches.v2018.i1.238-268"},{"key":"1_CR21","unstructured":"Ducas, L., et al.: Crystals-Dilithium. Technical Report, National Institute of Standards and Technology (2020), https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography\/round-3-submissions"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-85053-3_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2008","author":"B Gierlichs","year":"2008","unstructured":"Gierlichs, B., Batina, L., Tuyls, P., Preneel, B.: Mutual information analysis. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 426\u2013442. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-85053-3_27"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Guo, Q., Grosso, V., Standaert, F.X., Bronchain, O.: Modeling soft analytical side-channel attacks from a coding theory viewpoint. Iacr Tches 2020(4), 209\u2013238 (2020).https:\/\/doi.org\/10.13154\/tches.v2020.i4.209-238, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8682","DOI":"10.13154\/tches.v2020.i4.209-238"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Hamburg, M., et al.: Chosen ciphertext k-trace attacks on masked CCA2 secure Kyber. Iacr Tches 2021(4), 88\u2013113 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.88-113, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9061","DOI":"10.46586\/tches.v2021.i4.88-113"},{"key":"1_CR25","doi-asserted-by":"publisher","unstructured":"Han, J., et al.: Single-trace attack on NIST round 3 candidate dilithium using machine learning-based profiling. IEEE Access 9, 166283\u2013166292 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021. 3135600, https:\/\/doi.org\/10.1109\/ACCESS.2021.3135600","DOI":"10.1109\/ACCESS.2021"},{"key":"1_CR26","doi-asserted-by":"publisher","unstructured":"Hermelink, J., M\u00e5rtensson, E., Samardjiska, S., Pessl, P., Rodosek, G.D.: Belief propagation meets lattice reduction: security estimates for error-tolerant key recovery from decryption errors. Iacr Tches 2023(4), 287\u2013317 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i4.287-317","DOI":"10.46586\/tches.v2023.i4.287-317"},{"key":"1_CR27","doi-asserted-by":"publisher","unstructured":"Hermelink, J., Ning, K.C., Petri, R., Strieder, E.: The insecurity of masked comparisons: SCAs on ML-KEM\u2019s FO-transform. In: Luo, B., Liao, X., Xu, J., Kirda, E., Lie, D. (eds.) ACM CCS 2024, pp. 2430\u20132444. ACM Press, October 2024. https:\/\/doi.org\/10.1145\/3658644.3690339","DOI":"10.1145\/3658644.3690339"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-92518-5_15","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2021","author":"J Hermelink","year":"2021","unstructured":"Hermelink, J., Pessl, P., P\u00f6ppelmann, T.: Fault-enabled chosen-ciphertext attacks on\u00a0Kyber. In: Adhikari, A., K\u00fcsters, R., Preneel, B. (eds.) INDOCRYPT 2021. LNCS, vol. 13143, pp. 311\u2013334. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92518-5_15"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Hermelink, J., Streit, S., M\u00e5rtensson, E., Petri, R.: A generic framework for side-channel attacks against LWE-based cryptosystems. In: Fehr, S., Fouque, P.A. (eds.) EUROCRYPT\u00a02025, Part\u00a0VIII. LNCS, vol. 15608, pp. 3\u201332. Springer, Cham, May 2025. https:\/\/doi.org\/10.1007\/978-3-031-91101-9_1","DOI":"10.1007\/978-3-031-91101-9_1"},{"key":"1_CR30","doi-asserted-by":"publisher","unstructured":"Hermelink, J., Streit, S., Strieder, E., Thieme, K.: Adapting belief propagation to counter shuffling of NTTs. Iacr Tches 2023(1), 60\u201388 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i1.60-88","DOI":"10.46586\/tches.v2023.i1.60-88"},{"key":"1_CR31","unstructured":"Inc., N.T.: Cw1173: Chipwhisperer-lite (2018), https:\/\/media.newae.com\/datasheets\/NAE-CW1173_datasheet.pdf"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Jackson, K.A., Miller, C.A., Wang, D.: Evaluating the security of CRYSTALS-dilithium in the quantum random oracle model. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0VI. LNCS, vol. 14656, pp. 418\u2013446. Springer, Cham, May 2024. https:\/\/doi.org\/10.1007\/978-3-031-58751-1_15","DOI":"10.1007\/978-3-031-58751-1_15"},{"key":"1_CR34","doi-asserted-by":"publisher","unstructured":"Kamel, D., Standaert, F.X., Bronchain, O.: Information theoretic evaluation of raccoon\u2019s side-channel leakage. CiC 1(3), 44 (2024). https:\/\/doi.org\/10.62056\/abkp2c3w9p","DOI":"10.62056\/abkp2c3w9p"},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Kannwischer, M.J., Schwabe, P., Stebila, D., Wiggers, T.: Improving software quality in cryptography standardization projects. In: IEEE European Symposium on Security and Privacy, EuroS &P 2022 - Workshops, Genoa, Italy, 6\u201310 June 2022, pp. 19\u201330. IEEE Computer Society, Los Alamitos, CA, USA (2022). https:\/\/doi.org\/10.1109\/EuroSPW55150.2022.00010, https:\/\/eprint.iacr.org\/2022\/337","DOI":"10.1109\/EuroSPW55150.2022.00010"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Ann. Math. Stat. 22(1), 79\u201386 (1951). https:\/\/doi.org\/10.1214\/aoms\/1177729694","DOI":"10.1214\/aoms\/1177729694"},{"key":"1_CR37","doi-asserted-by":"publisher","unstructured":"Kuo, Y., Takayasu, A.: A lattice attack on crystals-kyber with correlation power analysis. In: Seo, H., Kim, S. (eds.) Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I, LNCS, vol. 14561, pp. 202\u2013220. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-97-1235-9_11","DOI":"10.1007\/978-981-97-1235-9_11"},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/978-3-642-10366-7_35","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"V Lyubashevsky","year":"2009","unstructured":"Lyubashevsky, V.: Fiat-shamir with aborts: applications to lattice and factoring-based signatures. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 598\u2013616. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_35"},{"key":"1_CR39","doi-asserted-by":"publisher","unstructured":"Masure, L., M\u00e9aux, P., Moos, T., Standaert, F.X.: Effective and efficient masking with low noise using small-mersenne-prime ciphers. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0IV, LNCS, vol. 14007, pp. 596\u2013627. Springer, Cham, April 2023. https:\/\/doi.org\/10.1007\/978-3-031-30634-1_20","DOI":"10.1007\/978-3-031-30634-1_20"},{"key":"1_CR40","doi-asserted-by":"publisher","unstructured":"May, A., Nowakowski, J.: Too many hints - when LLL breaks LWE. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0IV, LNCS, vol. 14441, pp. 106\u2013137. Springer, Singapore, December 2023. https:\/\/doi.org\/10.1007\/978-981-99-8730-6_4","DOI":"10.1007\/978-981-99-8730-6_4"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-030-21568-2_17","volume-title":"Applied Cryptography and Network Security","author":"V Migliore","year":"2019","unstructured":"Migliore, V., G\u00e9rard, B., Tibouchi, M., Fouque, P.-A.: Masking Dilithium. In: Deng, R.H., Gauthier-Uma\u00f1a, V., Ochoa, M., Yung, M. (eds.) ACNS 2019. LNCS, vol. 11464, pp. 344\u2013362. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21568-2_17"},{"key":"1_CR42","unstructured":"National Institute of Standards and Technology: Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016), https:\/\/csrc.nist.gov\/CSRC\/media\/Projects\/Post-Quantum-Cryptography\/documents\/call-for-proposals-final-dec-2016.pdf"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"National Institute of Standards and Technology: Module-lattice-based digital signature standard. Technical Report, Department of Commerce, Washington, D.C. (2023), federal Information Processing Standards Publication (FIPS) NIST FIPS 204 ipd. https:\/\/doi.org\/10.6028\/NIST.FIPS.204.ipd","DOI":"10.6028\/NIST.FIPS.204.ipd"},{"key":"1_CR44","unstructured":"National Institute of Standards and Technology: Module-lattice-based digital signature standard (2024), https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.204.pdf"},{"key":"1_CR45","unstructured":"National Institute of Standards and Technology: module-lattice-based key-encapsulation mechanism standard (2024), https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.203.pdf"},{"key":"1_CR46","unstructured":"Oliveira, P.A., Viera, A.C., Cogliati, B., Goubin, L.: Uncompressing dilithium\u2019s public key. IACR Cryptol. ePrint Arch. p.\u00a01373 (2024), https:\/\/eprint.iacr.org\/2024\/1373"},{"key":"1_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-30530-7_7","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2019","author":"P Pessl","year":"2019","unstructured":"Pessl, P., Primas, R.: More practical single-trace attacks on the number theoretic transform. In: Schwabe, P., Th\u00e9riault, N. (eds.) LATINCRYPT 2019. LNCS, vol. 11774, pp. 130\u2013149. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30530-7_7"},{"key":"1_CR48","doi-asserted-by":"publisher","unstructured":"Pessl, P., Prokop, L.: Fault attacks on CCA-secure lattice KEMs. Iacr Tches 2021(2), 37\u201360 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i2.37-60, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8787","DOI":"10.46586\/tches.v2021.i2.37-60"},{"key":"1_CR49","doi-asserted-by":"publisher","unstructured":"del Pino, R., Katsumata, S., Prest, T., Rossi, M.: Raccoon: A masking-friendly signature proven in the probing model. In: Reyzin, L., Stebila, D. (eds.) CRYPTO\u00a02024, Part\u00a0I. LNCS, vol. 14920, pp. 409\u2013444. Springer, Cham, August 2024. https:\/\/doi.org\/10.1007\/978-3-031-68376-3_13","DOI":"10.1007\/978-3-031-68376-3_13"},{"key":"1_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/978-3-319-66787-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"R Primas","year":"2017","unstructured":"Primas, R., Pessl, P., Mangard, S.: Single-trace side-channel attacks on masked lattice-based encryption. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 513\u2013533. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_25"},{"key":"1_CR51","unstructured":"Qiao, Z., Liu, Y., Zhou, Y., Shao, M., Sun, S.: When NTT meets SIS: efficient side-channel attacks on dilithium and kyber. Cryptology ePrint Archive, Report 2023\/1866 (2023), https:\/\/eprint.iacr.org\/2023\/1866"},{"key":"1_CR52","unstructured":"Qiao, Z., Liu, Y., Zhou, Y., Zhao, Y., Chen, S.: Single trace is all it takes: efficient side-channel attack on dilithium. Cryptology ePrint Archive, Report 2024\/512 (2024), https:\/\/eprint.iacr.org\/2024\/512"},{"key":"1_CR53","doi-asserted-by":"publisher","unstructured":"Ravi, P., Chattopadhyay, A., D\u2019Anvers, J., Baksi, A.: Side-channel and fault-injection attacks over lattice-based post-quantum schemes (kyber, dilithium): Survey and new results. ACM Trans. Embed. Comput. Syst. 23(2), 35:1\u201335:54 (2024). https:\/\/doi.org\/10.1145\/3603170","DOI":"10.1145\/3603170"},{"key":"1_CR54","unstructured":"Roche, T.: EUCLEAK. Cryptology ePrint Archive, Report 2024\/1380 (2024), https:\/\/eprint.iacr.org\/2024\/1380"},{"key":"1_CR55","doi-asserted-by":"publisher","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948). https:\/\/doi.org\/10.1002\/J.1538-7305.1948.TB01338.X, https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x","DOI":"10.1002\/J.1538-7305.1948.TB01338.X"},{"key":"1_CR56","doi-asserted-by":"publisher","unstructured":"Tosun, T., Moradi, A., Savas, E.: Exploiting the central reduction in lattice-based cryptography. IEEE Access 12, 166814\u2013166833 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3494593","DOI":"10.1109\/ACCESS.2024.3494593"},{"key":"1_CR57","doi-asserted-by":"publisher","unstructured":"Ulitzsch, V.Q., Marzougui, S., Tibouchi, M., Seifert, J.P.: Profiling side-channel attacks on dilithium - a small bit-fiddling leak breaks it all. In: Smith, B., Wu, H. (eds.) SAC 2022. LNCS, vol. 13742, pp. 3\u201332. Springer, Cham, August 2024. https:\/\/doi.org\/10.1007\/978-3-031-58411-4_1","DOI":"10.1007\/978-3-031-58411-4_1"},{"key":"1_CR58","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-662-45611-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"N Veyrat-Charvillon","year":"2014","unstructured":"Veyrat-Charvillon, N., G\u00e9rard, B., Standaert, F.-X.: Soft analytical side-channel attacks. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 282\u2013296. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45611-8_15"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01901-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T08:44:48Z","timestamp":1755333888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01901-1_1"}},"subtitle":["On Side-Channel Attacks on $$\\textbf{y}$$ in Masked ML-DSA"],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032019004","9783032019011"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01901-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}