{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T11:07:54Z","timestamp":1775732874150,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226976","type":"print"},{"value":"9783032226983","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22698-3_13","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:43Z","timestamp":1775730283000},"page":"409-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fault Attacks on\u00a0MPCitH Signature Schemes"],"prefix":"10.1007","author":[{"given":"Harrison","family":"Banda","sequence":"first","affiliation":[]},{"given":"Jan","family":"Brinkmann","sequence":"additional","affiliation":[]},{"given":"Juliane","family":"Kr\u00e4mer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"13_CR1","unstructured":"Aaraj, N., et al.: PERK. Tech. rep., National Institute of Standards and Technology (2024). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR2","unstructured":"Adj, G., et al.: Mirath (merger of MIRA\/MiRitH). Tech. rep., National Institute of Standards and Technology (2024). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR3","unstructured":"Aguilar Melchor, C., et al.: SDitH \u2014 Syndrome Decoding in the Head. Tech. rep., National Institute of Standards and Technology (2024). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR4","unstructured":"Aragon, N., et al.: RYDE. Tech. rep., National Institute of Standards and Technology (2024). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Aranha, D.F., et al.: Side-channel protections for picnic signatures. In: IACR Transactions on Cryptographic Hardware and Embedded Systems, pp. 239\u2013282 (2021)","DOI":"10.46586\/tches.v2021.i4.239-282"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Baum, C., et al.: One tree to rule them all: optimizing GGM trees and OWFs for post-quantum signatures. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT\u00a02024, Part\u00a0I. LNCS, vol. 15484, pp. 463\u2013493. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0875-1_15","DOI":"10.1007\/978-981-96-0875-1_15"},{"key":"13_CR7","unstructured":"Baum, C., et al.: FAEST. Tech. rep., National Institute of Standards and Technology (2024). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR8","doi-asserted-by":"publisher","unstructured":"Baum, C., et al.: Publicly verifiable zero-knowledge and post-quantum signatures from VOLE-in-the-head. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO\u00a02023, Part\u00a0V. LNCS, vol. 14085, pp. 581\u2013615. Springer, Cham (2023).https:\/\/doi.org\/10.1007\/978-3-031-38554-4_19","DOI":"10.1007\/978-3-031-38554-4_19"},{"key":"13_CR9","unstructured":"Benadjila, R., Bouillaguet, C., Feneuil, T., Rivain, M.: MQOM \u2014 MQ on my Mind. Tech. rep., National Institute of Standards and Technology (2024). https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-2-additional-signatures"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Bidoux, L., Feneuil, T., Gaborit, P., Neveu, R., Rivain, M.: Dual support decomposition in the head: shorter signatures from rank SD and MinRank. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 38\u201369. Springer (2024)","DOI":"10.1007\/978-981-96-0888-1_2"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Bindel, N., Buchmann, J., Kr\u00e4mer, J.: Lattice-based signature schemes and their sensitivity to fault attacks. In: 2016 Workshop on Fault Diagnosis and Tolerance In Cryptography (FDTC), pp. 63\u201377. IEEE (2016)","DOI":"10.1109\/FDTC.2016.11"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., da\u00a0Silva, R.G., G\u00fcnther, P., Kr\u00e4mer, J., Seifert, J.: A practical second-order fault attack against a real-world pairing implementation. In: FDTC, pp. 123\u2013136. IEEE Computer Society (2014)","DOI":"10.1109\/FDTC.2014.22"},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1006\/jcss.1998.1608","volume":"58","author":"JF Buss","year":"1999","unstructured":"Buss, J.F., Frandsen, G.S., Shallit, J.O.: The computational complexity of some problems of linear algebra. J. Comput. Syst. Sci. 58(3), 572\u2013596 (1999)","journal-title":"J. Comput. Syst. Sci."},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-031-54409-5_4","volume-title":"Smart Card Research and Advanced Applications","author":"A Calle Viera","year":"2024","unstructured":"Calle Viera, A., Berzati, A., Heydemann, K.: Fault attacks sensitivity of public parameters in the dilithium verification. In: Bhasin, S., Roche, T. (eds.) Smart Card Research and Advanced Applications, pp. 62\u201383. Springer Nature Switzerland, Cham (2024)"},{"key":"13_CR15","unstructured":"ChipWhisperer: open source side-channel analysis tools (2020). https:\/\/www.newae.com\/chipwhisperer"},{"key":"13_CR16","unstructured":"Feneuil, T.: The Polynomial-IOP Vision of the Latest MPCitH Frameworks for Signature Schemes. Post-Quantum Algebraic Cryptography - Workshop 2, Institut Henri Poincar\u00e9, Paris, France (2024), presentation"},{"key":"13_CR17","doi-asserted-by":"publisher","unstructured":"Feneuil, T., Rivain, M.: Threshold linear secret sharing to the rescue of MPC-in-the-head. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0I. LNCS, vol. 14438, pp. 441\u2013473. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8721-4_14","DOI":"10.1007\/978-981-99-8721-4_14"},{"issue":"3","key":"13_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-025-09543-8","volume":"38","author":"T Feneuil","year":"2025","unstructured":"Feneuil, T., Rivain, M.: Threshold computation in the head: Improved framework for post-quantum signatures and zero-knowledge arguments. J. Cryptol. 38(3), 1\u201382 (2025)","journal-title":"J. Cryptol."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Feneuil, T., Rivain, M., Warm\u00e9-Janville, A.: Masking-friendly post-quantum signatures in the threshold-computation-in-the-head framework. Cryptology ePrint Archive, Paper 2025\/520 (2025). https:\/\/eprint.iacr.org\/2025\/520","DOI":"10.46586\/tches.v2025.i4.667-710"},{"key":"13_CR20","first-page":"186","volume-title":"Advances in Cryptology \u2013 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) Advances in Cryptology \u2013 CRYPTO\u2019 86, pp. 186\u2013194. Springer, Berlin Heidelberg, Berlin, Heidelberg (1987)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Godard, J., Aragon, N., Gaborit, P., Loiseau, A., Maillard, J.: Single trace side-channel attack on the MPC-in-the-Head framework. In: International Conference on Post-Quantum Cryptography, pp. 267\u2013293. Springer (2025)","DOI":"10.1007\/978-3-031-86602-9_10"},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792\u2013807 (1986). https:\/\/doi.org\/10.1145\/6490.6503","DOI":"10.1145\/6490.6503"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Guo, X., et al.: Half-tree: Halving the cost of tree expansion in COT and DPF. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0I. LNCS, vol. 14004, pp. 330\u2013362. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30545-0_12","DOI":"10.1007\/978-3-031-30545-0_12"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Zero-knowledge from secure multiparty computation. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 21\u201330 (2007)","DOI":"10.1145\/1250790.1250794"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Jendral, S., Dubrova, E.: Side-channel and fault injection attacks on voleith signature schemes: a case study of masked FAEST. IACR Cryptol. ePrint Arch. 378 (2025). https:\/\/eprint.iacr.org\/2025\/378","DOI":"10.62056\/aebngyl7s"},{"key":"13_CR26","doi-asserted-by":"publisher","unstructured":"Jendral, S., Dubrova, E.: MAYO key recovery by fixing vinegar seeds. Cryptology ePrint Archive, Paper 2024\/1550 (2024). https:\/\/doi.org\/10.62056\/ab0ljbkrz, https:\/\/eprint.iacr.org\/2024\/1550","DOI":"10.62056\/ab0ljbkrz"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Jendral, S., Mattsson, J.P., Dubrova, E.: A single-trace fault injection attack on hedged module lattice digital signature algorithm (ML-DSA). In: 2024 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), pp. 34\u201343 (2024). https:\/\/doi.org\/10.1109\/FDTC64268.2024.00013","DOI":"10.1109\/FDTC64268.2024.00013"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Kales, D., Zaverucha, G.: An attack on some signature schemes constructed from five-pass identification schemes. In: International Conference on Cryptology and Network Security, pp. 3\u201322. Springer (2020)","DOI":"10.1007\/978-3-030-65411-5_1"},{"key":"13_CR29","doi-asserted-by":"publisher","unstructured":"Katz, J., Kolesnikov, V., Wang, X.: Improved non-interactive zero knowledge with applications to post-quantum signatures. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) ACM CCS 2018, pp. 525\u2013537. ACM Press (2018). https:\/\/doi.org\/10.1145\/3243734.3243805","DOI":"10.1145\/3243734.3243805"},{"key":"13_CR30","doi-asserted-by":"publisher","unstructured":"Mondal, P., Adhikary, S., Kundu, S., Karmakar, A.: ZKFault: fault attack analysis on zero-knowledge based post-quantum digital signature schemes. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT\u00a02024, Part\u00a0VIII. LNCS, vol. 15491, pp. 132\u2013167. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0944-4_5","DOI":"10.1007\/978-981-96-0944-4_5"},{"key":"13_CR31","unstructured":"Sarde, V., Debande, N.: Differential fault attacks on MQOM, breaking the heart of multivariate evaluation. Cryptology ePrint Archive, Paper 2025\/1895 (2025). https:\/\/eprint.iacr.org\/2025\/1895"},{"issue":"4","key":"13_CR32","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.46586\/tches.v2025.i4.1010-1052","volume":"2025","author":"K Schneider","year":"2025","unstructured":"Schneider, K., Auer, L., Wagner, A.: Fault attacks on ECC signature verification. IACR Trans. Cryptographic Hardw. Embedded Syst. 2025(4), 1010\u20131052 (2025)","journal-title":"IACR Trans. Cryptographic Hardw. Embedded Syst."}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22698-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T10:24:48Z","timestamp":1775730288000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22698-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226976","9783032226983"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22698-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}