{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T11:08:02Z","timestamp":1775732882199,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226976","type":"print"},{"value":"9783032226983","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22698-3_10","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:56Z","timestamp":1775730296000},"page":"311-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Handling Noisy Plaintext Checking Oracles with SPiRiT"],"prefix":"10.1007","author":[{"given":"Paco","family":"Poilbout","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Roche","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Imbert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","unstructured":"Azouaoui, M., Bronchain, O., Hoffmann, C., Kuzovkova, Y., Schneider, T., Standaert, F.X.: Systematic study of decryption and re-encryption leakage: the case of Kyber. In: Balasch, J., O\u2019Flynn, C. (eds.) COSADE 2022. LNCS, vol. 13211, pp. 236\u2013256. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99766-3_11","DOI":"10.1007\/978-3-030-99766-3_11"},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: Kaliski, Jr., B.S., Ko\u00e7, \u00c7etin Kaya., Paar, C. (eds.) CHES\u00a02002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36400-5_3","DOI":"10.1007\/3-540-36400-5_3"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Dong, H., Guo, Q.: Multi-value plaintext-checking and full-decryption oracle-based attacks on HQC from offline templates. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(4), 254\u2014-289 (2025). https:\/\/doi.org\/10.46586\/tches.v2025.i4.254-289. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/12410","DOI":"10.46586\/tches.v2025.i4.254-289"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) CRYPTO\u201999. LNCS, vol.\u00a01666, pp. 537\u2013554. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_34","DOI":"10.1007\/3-540-48405-1_34"},{"key":"10_CR5","doi-asserted-by":"publisher","unstructured":"Guo, Q., Nabokov, D., Nilsson, A., Johansson, T.: SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0IV. LNCS, vol. 14441, pp. 203\u2013236. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8730-6_7","DOI":"10.1007\/978-981-99-8730-6_7"},{"key":"10_CR6","unstructured":"Hermelink, J., M\u00e5rtensson, E., Tran, M.: Noise-tolerant plaintext-checking oracle attacks \u2013 a soft-analytic approach applied to ML-KEM. Cryptology ePrint Archive, Report 2025\/1496 (2025). https:\/\/eprint.iacr.org\/2025\/1496"},{"key":"10_CR7","doi-asserted-by":"publisher","unstructured":"Huguenin-Dumittan, L., Vaudenay, S.: Classical misuse attacks on NIST round 2 PQC - the power of rank-based schemes. In: Conti, M., Zhou, J., Casalicchio, E., Spognardi, A. (eds.) ACNS 2020, Part\u00a0I. LNCS, vol. 12146, pp. 208\u2013227. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57808-4_11","DOI":"10.1007\/978-3-030-57808-4_11"},{"key":"10_CR8","unstructured":"Lehmann, E.L., Romano, J.P.: Testing statistical hypotheses. Springer Texts in Statistics, 3rd edn. Springer, New York (2005)"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Li, J., et al.: Grafted trees bear better fruit: an improved multiple-valued plaintext-checking side-channel attack against kyber. In: 2025 Design, Automation & Test in Europe Conference (DATE), pp.\u00a01\u20137 (2025). https:\/\/doi.org\/10.23919\/DATE64628.2025.10992764","DOI":"10.23919\/DATE64628.2025.10992764"},{"key":"10_CR10","unstructured":"Module-Lattice-Based Key-Encapsulation Mechanism Standard: National Institute of Standards and Technology, NIST FIPS PUB 203. U.S. Department of Commerce (2024)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Neyman, J., Pearson, E.S.: On the problem of the most efficient tests of statistical hypotheses. Philos. Trans. Roy. Soc. London Series A Containing Papers of a Mathematical or Physical Character 231, 289\u2013337 (1933). http:\/\/www.jstor.org\/stable\/91247","DOI":"10.1098\/rsta.1933.0009"},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Ngo, K., Dubrova, E., Guo, Q., Johansson, T.: A side-channel attack on a masked IND-CCA secure Saber KEM implementation. IACR TCHES 2021(4), 676\u2013707 (2021). https:\/\/doi.org\/10.46586\/tches.v2021.i4.676-707. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/9079","DOI":"10.46586\/tches.v2021.i4.676-707"},{"key":"10_CR13","unstructured":"Qin, Y., Cheng, C., Ding, J.: An efficient key mismatch attack on the NIST second round candidate Kyber. Cryptology ePrint Archive, Report 2019\/1343 (2019). https:\/\/eprint.iacr.org\/2019\/1343"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Qin, Y., Cheng, C., Zhang, X., Pan, Y., Hu, L., Ding, J.: A systematic approach and analysis of key mismatch attacks on lattice-based NIST candidate KEMs. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT\u00a02021, Part\u00a0IV. LNCS, vol. 13093, pp. 92\u2013121. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92068-5_4","DOI":"10.1007\/978-3-030-92068-5_4"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Rajendran, G., Ravi, P., D\u2019Anvers, J.P., Bhasin, S., Chattopadhyay, A.: Pushing the limits of generic side-channel attacks on LWE-based KEMs - parallel PC oracle attacks on Kyber KEM and beyond. IACR TCHES 2023(2), 418\u2013446 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i2.418-446","DOI":"10.46586\/tches.v2023.i2.418-446"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Ravi, P., Roy, S.S., Chattopadhyay, A., Bhasin, S.: Generic side-channel attacks on CCA-secure lattice-based PKE and KEMs. IACR TCHES 2020(3), 307\u2013335 (2020). https:\/\/doi.org\/10.13154\/tches.v2020.i3.307-335. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/8592","DOI":"10.13154\/tches.v2020.i3.307-335"},{"key":"10_CR17","unstructured":"Schwabe, P., et al.: CRYSTALS-KYBER. Technical report, National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Shen, M., Cheng, C., Zhang, X., Guo, Q., Jiang, T.: Find the bad apples: an efficient method for perfect key recovery under imperfect SCA oracles - a case study of Kyber. IACR TCHES 2023(1), 89\u2013112 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i1.89-112","DOI":"10.46586\/tches.v2023.i1.89-112"},{"key":"10_CR19","doi-asserted-by":"publisher","unstructured":"Tanaka, Y., Ueno, R., Xagawa, K., Ito, A., Takahashi, J., Homma, N.: Multiple-valued plaintext-checking side-channel attacks on post-quantum KEMs. IACR TCHES 2023(3), 473\u2013503 (2023). https:\/\/doi.org\/10.46586\/tches.v2023.i3.473-503","DOI":"10.46586\/tches.v2023.i3.473-503"},{"key":"10_CR20","doi-asserted-by":"publisher","unstructured":"Ueno, R., Xagawa, K., Tanaka, Y., Ito, A., Takahashi, J., Homma, N.: Curse of re-encryption: a generic power\/EM analysis on post-quantum KEMs. IACR TCHES 2022(1), 296\u2013322 (2022). https:\/\/doi.org\/10.46586\/tches.v2022.i1.296-322","DOI":"10.46586\/tches.v2022.i1.296-322"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Wald, A.: Sequential tests of statistical hypotheses. Ann. Math. Statist. 16(4), 117\u2013186 (1945). http:\/\/dml.mathdoc.fr\/item\/1177731118","DOI":"10.1214\/aoms\/1177731118"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Xagawa, K., Ito, A., Ueno, R., Takahashi, J., Homma, N.: Fault-injection attacks against NIST\u2019s post-quantum cryptography round 3 KEM candidates. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT\u00a02021, Part\u00a0II. LNCS, vol. 13091, pp. 33\u201361. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92075-3_2","DOI":"10.1007\/978-3-030-92075-3_2"},{"key":"10_CR23","doi-asserted-by":"publisher","unstructured":"Xu, Z., Pemberton, O., Roy, S., Oswald, D., Yao, W., Zheng, Z.: Magnifying side-channel leakage of lattice-based cryptosystems with chosen ciphertexts: the case study of kyber. IEEE Trans. Comput. 71, 1 (2021). https:\/\/doi.org\/10.1109\/TC.2021.3122997","DOI":"10.1109\/TC.2021.3122997"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22698-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:59Z","timestamp":1775730299000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22698-3_10"}},"subtitle":["Application to Kyber"],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226976","9783032226983"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22698-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}