{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:23Z","timestamp":1767321323793,"version":"3.48.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_29","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:33:45Z","timestamp":1767321225000},"page":"781-804","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secret in\u00a0OnePiece: Single-Bit Fault Attack on\u00a0Kyber"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7472-5118","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2387-8332","authenticated-orcid":false,"given":"Weiqiong","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0938-689X","authenticated-orcid":false,"given":"Hua","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0693-9938","authenticated-orcid":false,"given":"Haoyuan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"29_CR1","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Cryptology ePrint Archive, Report 2004\/100 (2004). https:\/\/eprint.iacr.org\/2004\/100"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Bettale, L., Montoya, S., Renault, G.: Safe-error analysis of post-quantum cryptography mechanisms. Cryptology ePrint Archive, Report 2021\/1339 (2021). https:\/\/eprint.iacr.org\/2021\/1339","DOI":"10.1109\/FDTC53659.2021.00015"},{"key":"29_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"E Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513\u2013525. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052259"},{"key":"29_CR4","unstructured":"Bos, J., et al.: CRYSTALS \u2013 Kyber: a CCA-secure module-lattice-based KEM. Cryptology ePrint Archive, Report 2017\/634 (2017). https:\/\/eprint.iacr.org\/2017\/634"},{"key":"29_CR5","doi-asserted-by":"publisher","unstructured":"Bos, J.W., Gourjon, M., Renes, J., Schneider, T., van Vredendaal, C.: Masking kyber: first- and higher-order implementations. IACR TCHES 2021(4), 173\u2013214 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.173-214, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9064","DOI":"10.46586\/tches.v2021.i4.173-214"},{"key":"29_CR6","doi-asserted-by":"publisher","unstructured":"Coron, J.S., G\u00e9rard, F., Montoya, S., Zeitoun, R.: High-order table-based conversion algorithms and masking lattice-based encryption. IACR TCHES 2022(2), 1\u201340 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i2.1-40","DOI":"10.46586\/tches.v2022.i2.1-40"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-56880-1_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"D Dachman-Soled","year":"2020","unstructured":"Dachman-Soled, D., Ducas, L., Gong, H., Rossi, M.: LWE with side information: attacks and concrete security estimation. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12171, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_12"},{"key":"29_CR8","doi-asserted-by":"publisher","unstructured":"Delvaux, J.: Roulette: A diverse family of feasible fault attacks on masked Kyber. IACR TCHES 2022(4), 637\u2013660 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i4.637-660","DOI":"10.46586\/tches.v2022.i4.637-660"},{"key":"29_CR9","doi-asserted-by":"publisher","unstructured":"Dobraunig, C., Eichlseder, M., Korak, T., Mangard, S., Mendel, F., Primas, R.: SIFA: exploiting ineffective fault inductions on symmetric cryptography. IACR TCHES 2018(3), 547\u2013572 (2018).https:\/\/doi.org\/10.13154\/tches.v2018.i3.547-572, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/7286","DOI":"10.13154\/tches.v2018.i3.547-572"},{"key":"29_CR10","doi-asserted-by":"publisher","unstructured":"Fahr, M., ey al.: When frodo flips: end-to-end key recovery on FrodoKEM via rowhammer. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022, pp. 979\u2013993. ACM Press (2022).https:\/\/doi.org\/10.1145\/3548606.3560673","DOI":"10.1145\/3548606.3560673"},{"key":"29_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/3-540-48405-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"E Fujisaki","year":"1999","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34"},{"key":"29_CR12","doi-asserted-by":"publisher","unstructured":"Hermelink, J., M\u00e5rtensson, E., Samardjiska, S., Pessl, P., Rodosek, G.D.: Belief propagation meets lattice reduction: security estimates for error-tolerant key recovery from decryption errors. IACR TCHES 2023(4), 287\u2013317 (2023).https:\/\/doi.org\/10.46586\/tches.v2023.i4.287-317","DOI":"10.46586\/tches.v2023.i4.287-317"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-92518-5_15","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2021","author":"J Hermelink","year":"2021","unstructured":"Hermelink, J., Pessl, P., P\u00f6ppelmann, T.: Fault-enabled chosen-ciphertext attacks on\u00a0Kyber. In: Adhikari, A., K\u00fcsters, R., Preneel, B. (eds.) INDOCRYPT 2021. LNCS, vol. 13143, pp. 311\u2013334. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92518-5_15"},{"key":"29_CR14","doi-asserted-by":"publisher","unstructured":"Kundu, S., Chowdhury, S., Saha, S., Karmakar, A., Mukhopadhyay, D., Verbauwhede, I.: Carry your fault: a fault propagation attack on side-channel protected LWE-based KEM. IACR TCHES 2024(2), 844\u2013869 (2024).https:\/\/doi.org\/10.46586\/tches.v2024.i2.844-869","DOI":"10.46586\/tches.v2024.i2.844-869"},{"key":"29_CR15","unstructured":"Mishra, N., Mukhopadhyay, D.: Probabilistic algorithms with applications to countering fault attacks on lattice based post-quantum cryptography. Cryptology ePrint Archive, Paper 2024\/551 (2024), https:\/\/eprint.iacr.org\/2024\/551, https:\/\/eprint.iacr.org\/2024\/551"},{"key":"29_CR16","doi-asserted-by":"publisher","unstructured":"Mondal, P., Kundu, S., Bhattacharya, S., Karmakar, A., Verbauwhede, I.: A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using rowhammer. In: P\u00f6pper, C., Batina, L. (eds.) ACNS 24International Conference on Applied Cryptography and Network Security, Part\u00a0III. LNCS, vol. 14585, pp. 271\u2013300. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-54776-8_11","DOI":"10.1007\/978-3-031-54776-8_11"},{"key":"29_CR17","doi-asserted-by":"publisher","unstructured":"Oder, T., Schneider, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Practical CCA2-secure masked Ring-LWE implementations. IACR TCHES 2018(1), 142\u2013174 (2018). https:\/\/doi.org\/10.13154\/tches.v2018.i1.142-174, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/836","DOI":"10.13154\/tches.v2018.i1.142-174"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-10175-0_17","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"C O\u2019Flynn","year":"2014","unstructured":"O\u2019Flynn, C., Chen, Z.D.: ChipWhisperer: an open-source platform for hardware embedded security research. In: Prouff, E. (ed.) COSADE 2014. LNCS, vol. 8622, pp. 243\u2013260. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10175-0_17"},{"key":"29_CR19","doi-asserted-by":"publisher","unstructured":"Pessl, P., Prokop, L.: Fault attacks on CCA-secure lattice KEMs. IACR TCHES 2021(2), 37\u201360 (2021).https:\/\/doi.org\/10.46586\/tches.v2021.i2.37-60, https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8787","DOI":"10.46586\/tches.v2021.i2.37-60"},{"key":"29_CR20","unstructured":"Ravi, P., Chattopadhyay, A., Baksi, A.: Side-channel and fault-injection attacks over lattice-based post-quantum schemes (Kyber, Dilithium): survey and new results. Cryptology ePrint Archive, Report 2022\/737 (2022). https:\/\/eprint.iacr.org\/2022\/737"},{"key":"29_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-030-16350-1_13","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"P Ravi","year":"2019","unstructured":"Ravi, P., Roy, D.B., Bhasin, S., Chattopadhyay, A., Mukhopadhyay, D.: Number \u201cNot Used\u2019\u2019 Once - practical fault attack on pqm4 Implementations of nist candidates. In: Polian, I., St\u00f6ttinger, M. (eds.) COSADE 2019. LNCS, vol. 11421, pp. 232\u2013250. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16350-1_13"},{"key":"29_CR22","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Tech. rep., National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-92075-3_2","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"K Xagawa","year":"2021","unstructured":"Xagawa, K., Ito, A., Ueno, R., Takahashi, J., Homma, N.: Fault-injection attacks against NIST\u2019s post-quantum cryptography round 3 KEM candidates. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13091, pp. 33\u201361. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_2"},{"key":"29_CR24","doi-asserted-by":"publisher","unstructured":"Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967\u2013970 (2000).https:\/\/doi.org\/10.1109\/12.869328","DOI":"10.1109\/12.869328"}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:33:47Z","timestamp":1767321227000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}