{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:11:45Z","timestamp":1775754705320,"version":"3.50.1"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226945","type":"print"},{"value":"9783032226952","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22695-2_11","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:29:38Z","timestamp":1775752178000},"page":"321-354","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Arithmetic to\u00a0Shamir: Secure and\u00a0Efficient Masking Gadgets for\u00a0Multiplications"],"prefix":"10.1007","author":[{"given":"Vladimir","family":"Sarde","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Debande","sequence":"additional","affiliation":[]},{"given":"Louis","family":"Goubin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Akkar, M.L., Bevan, R., Goubin, L.: Two power analysis attacks against one-mask methods. In: FSE 2004. LNCS, vol.\u00a03017, pp. 332\u2013347. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-25937-4_21","DOI":"10.1007\/978-3-540-25937-4_21"},{"key":"11_CR2","doi-asserted-by":"publisher","unstructured":"Akkar, M., Giraud, C.: An implementation of DES and aes, secure against some attacks. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 309\u2013318. Springer (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_26","DOI":"10.1007\/3-540-44709-1_26"},{"key":"11_CR3","doi-asserted-by":"publisher","unstructured":"Aranha, D.F., et al.: Side-channel protections for Picnic signatures. IACR TCHES 2021(4), 239\u2013282 (2021). https:\/\/doi.org\/10.46586\/TCHES.V2021.I4.239-282","DOI":"10.46586\/TCHES.V2021.I4.239-282"},{"key":"11_CR4","doi-asserted-by":"publisher","unstructured":"Arnold, P., Berndt, S., Eisenbarth, T., Orlt, M.: Polynomial sharings on two secrets: Buy one, get one free. IACR TCHES 2024(3), 671\u2013706 (2024). https:\/\/doi.org\/10.46586\/TCHES.V2024.I3.671-706, https:\/\/doi.org\/10.46586\/tches.v2024.i3.671-706","DOI":"10.46586\/TCHES.V2024.I3.671-706"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Barthe, G., et al: Strong non-interference and type-directed higher-order masking. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) ACM SIGSAC Conference on Computer and Communications Security, 2016. pp. 116\u2013129. ACM (2016).https:\/\/doi.org\/10.1145\/2976749.2978427","DOI":"10.1145\/2976749.2978427"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Barthe, G., Dupressoir, F., Faust, S., Gr\u00e9goire, B., Standaert, F., Strub, P.: Parallel implementations of masking schemes and the bounded moment leakage model. In: Coron, J., Nielsen, J.B. (eds.) EUROCRYPT 2017. LNCS, vol. 10210, pp. 535\u2013566 (2017). https:\/\/doi.org\/10.1007\/978-3-319-56620-7_19, https:\/\/doi.org\/10.1007\/978-3-319-56620-7_19","DOI":"10.1007\/978-3-319-56620-7_19"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Battistello, A., Coron, J., Prouff, E., Zeitoun, R.: Horizontal side-channel attacks and countermeasures on the ISW masking scheme. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol.\u00a09813, pp. 23\u201339. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_2","DOI":"10.1007\/978-3-662-53140-2_2"},{"key":"11_CR8","doi-asserted-by":"publisher","unstructured":"Baum, C., et al.: Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023. LNCS, vol. 14085, pp. 581\u2013615. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-38554-4_19","DOI":"10.1007\/978-3-031-38554-4_19"},{"key":"11_CR9","doi-asserted-by":"publisher","unstructured":"Bela\u00efd, S., Benhamouda, F., Passel\u00e8gue, A., Prouff, E., Thillard, A., Vergnaud, D.: Randomness complexity of private circuits for multiplication. In: Fischlin, M., Coron, J. (eds.) EUROCRYPT 2016. LNCS, vol.\u00a09666, pp. 616\u2013648. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_22","DOI":"10.1007\/978-3-662-49896-5_22"},{"key":"11_CR10","doi-asserted-by":"publisher","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Simon, J. (ed.) ACM Symposium on Theory of Computing, pp. 1\u201310. ACM (1988). https:\/\/doi.org\/10.1145\/62212.62213, https:\/\/doi.org\/10.1145\/62212.62213","DOI":"10.1145\/62212.62213"},{"key":"11_CR11","unstructured":"Benadjila, R., Bouillaguet, C., Feneuil, T., Rivain, M.: MQOM: MQ on my Mind algorithm specifications and supporting documentation (version 2.0). Submission to the NIST\u2019s post-quantum cryptography standardization process (2025). https:\/\/mqom.org\/docs\/mqom-v2.0.pdf"},{"key":"11_CR12","unstructured":"Benadjila, R., Bouillaguet, C., Feneuil, T., Rivain, M.: MQOM: MQ on my Mind algorithm specifications and supporting documentation (version 2.1). Submission to the NIST\u2019s post-quantum cryptography standardization process (2025). https:\/\/mqom.org\/docs\/mqom-v2.1.pdf"},{"key":"11_CR13","doi-asserted-by":"publisher","unstructured":"Benadjila, R., Feneuil, T., Rivain, M.: MQ on my mind: Post-quantum signatures from the non-structured multivariate quadratic problem. In: 9th IEEE European Symposium on Security and Privacy, EuroS&P, pp. 468\u2013485. IEEE (2024). https:\/\/doi.org\/10.1109\/EUROSP60621.2024.00032","DOI":"10.1109\/EUROSP60621.2024.00032"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Berndt, S., Eisenbarth, T., Faust, S., Gourjon, M., Orlt, M., Seker, O.: Combined fault and leakage resilience: Composability, constructions and compiler. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023. LNCS, vol. 14083, pp. 377\u2013409. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-38548-3_13","DOI":"10.1007\/978-3-031-38548-3_13"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Carlet, C., Daif, A., Guilley, S., Tavernier, C.: Quasi-linear masking against SCA and fia, with cost amortization. IACR TCHES 2024(1), 398\u2013432 (2024). https:\/\/doi.org\/10.46586\/TCHES.V2024.I1.398-432","DOI":"10.46586\/TCHES.V2024.I1.398-432"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Cassiers, G., Standaert, F.: Trivially and efficiently composing masked gadgets with probe isolating non-interference. IEEE Trans. Inf. Forensics Secur. 15, 2542\u20132555 (2020)","DOI":"10.1109\/TIFS.2020.2971153"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Castagnos, G., Renner, S., Z\u00e9mor, G.: High-order masking by using coding theory and its application to AES. In: Stam, M. (ed.) Cryptography and Coding - IMACC. LNCS, vol.\u00a08308, pp. 193\u2013212. Springer (2013). https:\/\/doi.org\/10.1007\/978-3-642-45239-0_12","DOI":"10.1007\/978-3-642-45239-0_12"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Coron, J., Prouff, E., Roche, T.: On the use of shamir\u2019s secret sharing against side-channel analysis. In: Mangard, S. (ed.) CARDIS 2012. LNCS, vol.\u00a07771, pp. 77\u201390. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-37288-9_6","DOI":"10.1007\/978-3-642-37288-9_6"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Damg\u00e5rd, I., Keller, M.: Secure multiparty AES. In: Sion, R. (ed.) Financial Cryptography and Data Security, FC 2010. LNCS, vol.\u00a06052, pp. 367\u2013374. Springer (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_31","DOI":"10.1007\/978-3-642-14577-3_31"},{"key":"11_CR20","unstructured":"Feneuil, T., Rivain, M.: Threshold computation in the head: Improved framework for post-quantum signatures and zero-knowledge arguments. IACR Cryptol. ePrint Arch., p.\u00a01573 (2023). https:\/\/eprint.iacr.org\/2023\/1573"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Feneuil, T., Rivain, M.: Threshold linear secret sharing to the rescue of mpc-in-the-head. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. LNCS, vol. 14438, pp. 441\u2013473. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-99-8721-4_14","DOI":"10.1007\/978-981-99-8721-4_14"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/S00145-025-09543-8","volume":"38","author":"T Feneuil","year":"2025","unstructured":"Feneuil, T., Rivain, M.: Threshold computation in the head: Improved framework for post-quantum signatures and zero-knowledge arguments. J. Cryptol. 38(3), 28 (2025). https:\/\/doi.org\/10.1007\/S00145-025-09543-8","journal-title":"J. Cryptol."},{"key":"11_CR23","doi-asserted-by":"publisher","unstructured":"Feneuil, T., Rivain, M., Warm\u00e9-Janville, A.: Masking-friendly post-quantum signatures in the threshold-computation-in-the-head framework. IACR TCHES 2025(4), 667\u2013710 (2025). https:\/\/doi.org\/10.46586\/tches.v2025.i4.667-710","DOI":"10.46586\/tches.v2025.i4.667-710"},{"key":"11_CR24","doi-asserted-by":"publisher","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer (1986). https:\/\/doi.org\/10.1007\/3-540-47721-7_12","DOI":"10.1007\/3-540-47721-7_12"},{"key":"11_CR25","doi-asserted-by":"publisher","unstructured":"Fumaroli, G., Martinelli, A., Prouff, E., Rivain, M.: Affine masking against higher-order side channel analysis. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 262\u2013280. Springer (2010). https:\/\/doi.org\/10.1007\/978-3-642-19574-7_18","DOI":"10.1007\/978-3-642-19574-7_18"},{"key":"11_CR26","unstructured":"Garey, M.R., Johnson, D.S.: Computers and intractability, vol.\u00a029. wh freeman New York (2002)"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"Gellersen, T., Seker, O., Eisenbarth, T.: Differential power analysis of the picnic signature scheme. In: Cheon, J.H., Tillich, J. (eds.) PQCrypto 2021. LNCS, vol. 12841, pp. 177\u2013194. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-81293-5_10","DOI":"10.1007\/978-3-030-81293-5_10"},{"key":"11_CR28","doi-asserted-by":"publisher","unstructured":"Genelle, L., Prouff, E., Quisquater, M.: Secure multiplicative masking of power functions. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 200\u2013217 (2010). https:\/\/doi.org\/10.1007\/978-3-642-13708-2_13","DOI":"10.1007\/978-3-642-13708-2_13"},{"key":"11_CR29","doi-asserted-by":"publisher","unstructured":"Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. In: Coan, B.A., Afek, Y. (eds.) ACM Symposium on Principles of Distributed Computing, PODC 1998, pp. 101\u2013111. ACM (1998). https:\/\/doi.org\/10.1145\/277697.277716","DOI":"10.1145\/277697.277716"},{"key":"11_CR30","doi-asserted-by":"publisher","unstructured":"Godard, J., Aragon, N., Gaborit, P., Loiseau, A., Maillard, J.: Single trace side-channel attack on the mpc-in-the-head framework. In: Niederhagen, R., Saarinen, M.O. (eds.) PQCrypto 2025. LNCS, vol. 15578, pp. 267\u2013293. Springer (2025). https:\/\/doi.org\/10.1007\/978-3-031-86602-9_10","DOI":"10.1007\/978-3-031-86602-9_10"},{"key":"11_CR31","doi-asserted-by":"publisher","unstructured":"Golic, J.D., Tymen, C.: Multiplicative masking and power analysis of AES. In: Jr., B.S.K., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 198\u2013212. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_16","DOI":"10.1007\/3-540-36400-5_16"},{"key":"11_CR32","doi-asserted-by":"publisher","unstructured":"Goubin, L.: A sound method for switching between boolean and arithmetic masking. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 3\u201315. Springer (2001). https:\/\/doi.org\/10.1007\/3-540-44709-1_2","DOI":"10.1007\/3-540-44709-1_2"},{"key":"11_CR33","doi-asserted-by":"publisher","unstructured":"Goubin, L., Martinelli, A.: Protecting AES with shamir\u2019s secret sharing scheme. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 79\u201394. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_6","DOI":"10.1007\/978-3-642-23951-9_6"},{"key":"11_CR34","doi-asserted-by":"publisher","unstructured":"Goudarzi, D., Journault, A., Rivain, M., Standaert, F.: Secure multiplication for bitslice higher-order masking: Optimisation and comparison. In: Fan, J., Gierlichs, B. (eds.) COSADE 2018. LNCS, vol. 10815, pp. 3\u201322. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-89641-0_1","DOI":"10.1007\/978-3-319-89641-0_1"},{"key":"11_CR35","doi-asserted-by":"publisher","unstructured":"Goudarzi, D., Joux, A., Rivain, M.: How to securely compute with noisy leakage in quasilinear complexity. In: Peyrin, T., Galbraith, S.D. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 547\u2013574. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-03329-3_19","DOI":"10.1007\/978-3-030-03329-3_19"},{"key":"11_CR36","doi-asserted-by":"publisher","unstructured":"Goudarzi, D., Prest, T., Rivain, M., Vergnaud, D.: Probing security through input-output separation and revisited quasilinear masking. IACR TCHES 2021(3), 599\u2013640 (2021). https:\/\/doi.org\/10.46586\/TCHES.V2021.I3.599-640","DOI":"10.46586\/TCHES.V2021.I3.599-640"},{"key":"11_CR37","doi-asserted-by":"publisher","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Zero-knowledge from secure multiparty computation. In: Johnson, D.S., Feige, U. (eds.) Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 21\u201330. ACM (2007). https:\/\/doi.org\/10.1145\/1250790.1250794","DOI":"10.1145\/1250790.1250794"},{"key":"11_CR38","doi-asserted-by":"publisher","unstructured":"Ishai, Y., Sahai, A., Wagner, D.A.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 463\u2013481. Springer (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27","DOI":"10.1007\/978-3-540-45146-4_27"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Jendral, S., Dubrova, E.: Side-channel and fault injection attacks on voleith signature schemes: A case study of masked FAEST. IACR Cryptol. ePrint Arch. p.\u00a0378 (2025). https:\/\/eprint.iacr.org\/2025\/378","DOI":"10.62056\/aebngyl7s"},{"key":"11_CR40","doi-asserted-by":"publisher","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO. pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"11_CR41","doi-asserted-by":"publisher","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996, pp. 104\u2013113. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-68697-5_9","DOI":"10.1007\/3-540-68697-5_9"},{"key":"11_CR42","doi-asserted-by":"publisher","unstructured":"Oswald, E., Schramm, K.: An efficient masking scheme for AES software implementations. In: Song, J., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 292\u2013305. Springer (2005). https:\/\/doi.org\/10.1007\/11604938_23","DOI":"10.1007\/11604938_23"},{"key":"11_CR43","doi-asserted-by":"publisher","unstructured":"Plan\u00e7on, M.: Exploiting algebraic structures in probing security. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. LNCS, vol. 14441, pp. 237\u2013267. Springer (2023). https:\/\/doi.org\/10.1007\/978-981-99-8730-6_8","DOI":"10.1007\/978-981-99-8730-6_8"},{"key":"11_CR44","doi-asserted-by":"publisher","unstructured":"Prouff, E., Roche, T.: Higher-order glitches free implementation of the AES using secure multi-party computation protocols. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol.\u00a06917, pp. 63\u201378. Springer (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_5","DOI":"10.1007\/978-3-642-23951-9_5"},{"key":"11_CR45","doi-asserted-by":"publisher","unstructured":"Rivain, M., Prouff, E.: Provably secure higher-order masking of AES. In: Mangard, S., Standaert, F. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 413\u2013427. Springer (2010). https:\/\/doi.org\/10.1007\/978-3-642-15031-9_28","DOI":"10.1007\/978-3-642-15031-9_28"},{"key":"11_CR46","unstructured":"Sarde, V., Debande, N.: Differential fault attacks on MQOM, breaking the heart of multivariate evaluation. IACR Cryptol. ePrint Arch., p.\u00a01895 (2025). https:\/\/eprint.iacr.org\/2025\/1895"},{"key":"11_CR47","doi-asserted-by":"publisher","unstructured":"Seker, O., Fernandez-Rubio, A., Eisenbarth, T., Steinwandt, R.: Extending glitch-free multiparty protocols to resist fault injection attacks. IACR TCHES 2018(3), 394\u2013430 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I3.394-430, https:\/\/doi.org\/10.13154\/tches.v2018.i3.394-430","DOI":"10.13154\/TCHES.V2018.I3.394-430"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","DOI":"10.1145\/359168.359176"},{"key":"11_CR49","doi-asserted-by":"publisher","unstructured":"Trichina, E., Korkishko, L.M.: Secure and efficient AES software implementation for smart cards. In: Lim, C.H., Yung, M. (eds.) WISA 2004. LNCS, vol.\u00a03325, pp. 425\u2013439. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-31815-6_34","DOI":"10.1007\/978-3-540-31815-6_34"},{"key":"11_CR50","doi-asserted-by":"publisher","unstructured":"Trichina, E., Seta, D.D., Germani, L.: Simplified adaptive multiplicative masking for AES. In: Jr., B.S.K., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 187\u2013197. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-36400-5_15","DOI":"10.1007\/3-540-36400-5_15"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22695-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:29:41Z","timestamp":1775752181000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22695-2_11"}},"subtitle":["Applications to the Post-Quantum Signature Scheme MQOM"],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226945","9783032226952"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22695-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}