{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:07:17Z","timestamp":1765112837650},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319893389"},{"type":"electronic","value":"9783319893396"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-89339-6_17","type":"book-chapter","created":{"date-parts":[[2018,4,5]],"date-time":"2018-04-05T01:32:30Z","timestamp":1522891950000},"page":"306-321","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Practical Fault Injection on Deterministic Signatures: The Case of EdDSA"],"prefix":"10.1007","author":[{"given":"Niels","family":"Samwel","sequence":"first","affiliation":[]},{"given":"Lejla","family":"Batina","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,6]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-12510-2_13","volume-title":"Smart Card Research and Advanced Application","author":"M Agoyan","year":"2010","unstructured":"Agoyan, M., Dutertre, J.-M., Naccache, D., Robisson, B., Tria, A.: When clocks fail: on critical paths and clock faults. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol. 6035, pp. 182\u2013193. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-12510-2_13"},{"key":"17_CR2","unstructured":"Ambrose, C., Bos, J.W., Fay, B., Joye, M., Lochter, M., Murray, B.: Differential attacks on deterministic signatures. Cryptology ePrint Archive, Report 2017\/975 (2017). \nhttps:\/\/eprint.iacr.org\/2017\/975.pdf"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C Aum\u00fcller","year":"2003","unstructured":"Aum\u00fcller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: concrete results and practical countermeasures. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 260\u2013275. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-36400-5_20"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., Pelosi, G., Regazzoni, F.: Countermeasures against fault attacks on software implemented AES. In: Proceedings of the 5th Workshop on Embedded Systems Security - WESS 2010. ACM Press (2010)","DOI":"10.1145\/1873548.1873555"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-319-44524-3_11","volume-title":"Advances in Information and Computer Security","author":"A Barenghi","year":"2016","unstructured":"Barenghi, A., Pelosi, G.: A note on fault attacks against deterministic signature schemes (short paper). In: Ogawa, K., Yoshioka, K. (eds.) IWSEC 2016. LNCS, vol. 9836, pp. 182\u2013192. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-44524-3_11"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-43283-0_11","volume-title":"Constructive Side-Channel Analysis and Secure Design","author":"A Beckers","year":"2016","unstructured":"Beckers, A., Balasch, J., Gierlichs, B., Verbauwhede, I.: Design and implementation of a waveform-matching based triggering system. In: Standaert, F.-X., Oswald, E. (eds.) COSADE 2016. LNCS, vol. 9689, pp. 184\u2013198. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-43283-0_11"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11745853_14"},{"issue":"2","key":"17_CR8","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y.: High-speed high-security signatures. J. Crypt. Eng. 2(2), 77\u201389 (2012)","journal-title":"J. Crypt. Eng."},{"issue":"4","key":"17_CR9","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TC.2003.1190590","volume":"52","author":"G Bertoni","year":"2003","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: Error analysis and detection procedures for a hardware implementation of the advanced encryption standard. IEEE Trans. Comput. 52(4), 492\u2013505 (2003)","journal-title":"IEEE Trans. Comput."},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"I Biehl","year":"2000","unstructured":"Biehl, I., Meyer, B., M\u00fcller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 131\u2013146. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-44598-6_8"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/3-540-69053-0_4"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-319-08302-5_16","volume-title":"Smart Card Research and Advanced Applications","author":"RB Carpi","year":"2014","unstructured":"Carpi, R.B., Picek, S., Batina, L., Menarini, F., Jakobovic, D., Golub, M.: Glitch it if you can: parameter search strategies for successful fault injection. In: Francillon, A., Rohatgi, P. (eds.) CARDIS 2013. LNCS, vol. 8419, pp. 236\u2013252. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-08302-5_16"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Maskiewicz, J., Garman, C., Fried, J., Cohney, S., Green, M., Heninger, N., Weinmann, R.P., Rescorla, E., Shacham, H.: A systematic analysis of the Juniper Dual EC incident. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 468\u2013479 (2016). \nhttp:\/\/doi.acm.org\/10.1145\/2976749.2978395","DOI":"10.1145\/2976749.2978395"},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1011214926272","volume":"23","author":"NA Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham, N.A., Smart, N.P.: Lattice attacks on digital signature schemes. Des. Codes Crypt. 23(3), 283\u2013290 (2001). \nhttps:\/\/doi.org\/10.1023\/A:1011214926272","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"17_CR15","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K., Taubin, A.: Robust protection against fault-injection attacks on smart cards implementing the advanced encryption standard. In: 2004 International Conference on Dependable Systems and Networks. IEEE (2004)","DOI":"10.1109\/DSN.2004.1311880"},{"issue":"3","key":"17_CR17","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1145\/2678373.2665726","volume":"42","author":"Y Kim","year":"2014","unstructured":"Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J.H., Lee, D., Wilkerson, C., Lai, K., Mutlu, O.: Flipping bits in memory without accessing them. ACM SIGARCH Comput. Archit. News 42(3), 361\u2013372 (2014)","journal-title":"ACM SIGARCH Comput. Archit. News"},{"key":"17_CR18","unstructured":"Kravitz, D.: Digital signature algorithm. US Patent 5,231,668, 27 July 1993. \nhttps:\/\/www.google.com\/patents\/US5231668"},{"key":"17_CR19","unstructured":"Perrin, T.: The XEdDSA and VXEdDSA Signature Schemes (2017). \nhttps:\/\/signal.org\/docs\/specifications\/xeddsa\/xeddsa.pdf\n\n. Accessed 11 Sept 2017"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Picek, S., Batina, L., Jakobovic, D., Carpi, R.B.: Evolving genetic algorithms for fault injection attacks. In: 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, May 2014","DOI":"10.1109\/MIPRO.2014.6859734"},{"key":"17_CR21","unstructured":"Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., R\u00f6sler, P.: Attacking deterministic signature schemes using fault attacks. Cryptology ePrint Archive, Report 2017\/1014 (2017). \nhttp:\/\/eprint.iacr.org\/2017\/1014"},{"key":"17_CR22","unstructured":"FIPS PUB 180-4: Secure Hash Standard (SHS). Technical report, NIST, July 2015"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Romailler, Y., Pelissier, S.: Practical fault attack against the Ed25519 and EdDSA signature schemes. In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, September 2017","DOI":"10.1109\/FDTC.2017.12"},{"key":"17_CR24","unstructured":"Samwel, N., Batina, L., Bertoni, G., Daemen, J., Susella, R.: Breaking Ed25519 in WolfSSL. Cryptology ePrint Archive, Report 2017\/985 (2017). \nhttp:\/\/eprint.iacr.org\/2017\/985"},{"issue":"3","key":"17_CR25","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Crypt. 4(3), 161\u2013174 (1991). \nhttps:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Crypt."},{"key":"17_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"SP Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski, B.S., Ko\u00e7, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 2\u201312. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-36400-5_2"},{"key":"17_CR27","unstructured":"Velegalati, R., Van Spyk, R., van Woudenberg, J.: Electro magnetic fault injection in practice. In: International Cryptographic Module Conference (ICMC) (2013)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-89339-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T15:12:15Z","timestamp":1523027535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-89339-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319893389","9783319893396"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-89339-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}