{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:35:13Z","timestamp":1775774113840,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819609437","type":"print"},{"value":"9789819609444","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0944-4_5","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T05:57:08Z","timestamp":1733896628000},"page":"132-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["ZKFault: Fault Attack Analysis on\u00a0Zero-Knowledge Based Post-quantum Digital Signature Schemes"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7300-8435","authenticated-orcid":false,"given":"Puja","family":"Mondal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0701-8049","authenticated-orcid":false,"given":"Supriya","family":"Adhikary","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4354-852X","authenticated-orcid":false,"given":"Suparna","family":"Kundu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2594-588X","authenticated-orcid":false,"given":"Angshuman","family":"Karmakar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Abdalla, M., An, J.H., Bellare, M., Namprempre, C.: From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security. In: Knudsen, L.R. (ed.) Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings. Lecture Notes in Computer Science, vol.\u00a02332, pp. 418\u2013433. Springer (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_28,","DOI":"10.1007\/3-540-46035-7_28"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.K., Miller, C., Moody, D., Peralta, R., Perlner, R., Robinson, A., Smith-Tone, D.: Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. Online. Accessed 26th January, 2024 (2022), https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2022\/NIST.IR.8413-upd1.pdf","DOI":"10.6028\/NIST.IR.8413"},{"key":"5_CR3","unstructured":"Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., Stehle, D.: CRYSTALS-Kyber Algorithm Specifications And Supporting Documentation (version 3.02). Online (2021), https:\/\/pq-crystals.org\/kyber\/data\/kyber-specification-round3-20210804.pdf"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Beckwith, L., Wallace, R., Mohajerani, K., Gaj, K.: A High-Performance Hardware Implementation of the LESS Digital Signature Scheme. In: Johansson, T., Smith-Tone, D. (eds.) Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings. Lecture Notes in Computer Science, vol. 14154, pp. 57\u201390. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-40003-2_3,","DOI":"10.1007\/978-3-031-40003-2_3"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., H\u00fclsing, A., K\u00f6lbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS+ Signature Framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 2129-2146. CCS \u201919, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3319535.3363229,","DOI":"10.1145\/3319535.3363229"},{"key":"5_CR6","unstructured":"Beullens, W.: Breaking Rainbow Takes a Weekend on a Laptop. Cryptology ePrint Archive, Paper 2022\/214 (2022), https:\/\/eprint.iacr.org\/2022\/214,"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-030-51938-4_3","volume-title":"Progress in Cryptology - AFRICACRYPT 2020","author":"JF Biasse","year":"2020","unstructured":"Biasse, J.F., Micheli, G., Persichetti, E., Santini, P.: LESS is More: Code-Based Signatures Without Syndromes. In: Nitaj, A., Youssef, A. (eds.) Progress in Cryptology - AFRICACRYPT 2020, pp. 45\u201365. Springer International Publishing, Cham (2020)"},{"key":"5_CR8","unstructured":"Breier, J., Hou, X.: How Practical are Fault Injection Attacks, Really? Cryptology ePrint Archive, Paper 2022\/301 (2022), https:\/\/eprint.iacr.org\/2022\/301,"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Bruinderink, L.G., Pessl, P.: Differential Fault Attacks on Deterministic Lattice Signatures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3), 21\u201343 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I3.21-43,","DOI":"10.13154\/TCHES.V2018.I3.21-43"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An Efficient Key Recovery Attack on SIDH. In: Advances in Cryptology - EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part V. p. 423-447. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15,","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"5_CR11","unstructured":"Cho, J., No, J.S., Lee, Y., Koo, Z., Kim, Y.S.: Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography. Cryptology ePrint Archive, Paper 2022\/1493 (2022), https:\/\/eprint.iacr.org\/2022\/1493,"},{"key":"5_CR12","unstructured":"Chou, T., Niederhagen, R., Persichetti, E., Randrianarisoa, T.H., Reijnders, K., Samardjiska, S., Trimoska, M.: Take your MEDS: Digital Signatures from Matrix Code Equivalence. Cryptology ePrint Archive, Paper 2022\/1559 (2022), https:\/\/eprint.iacr.org\/2022\/1559,"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Clavier, C.: Secret External Encodings Do Not Prevent Transient Fault Analysis. In: Paillier, P., Verbauwhede, I. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings. Lecture Notes in Computer Science, vol.\u00a04727, pp. 181\u2013194. Springer (2007).https:\/\/doi.org\/10.1007\/978-3-540-74735-2_13,","DOI":"10.1007\/978-3-540-74735-2_13"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11496137_12","volume-title":"Applied Cryptography and Network Security","author":"J Ding","year":"2005","unstructured":"Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature Scheme. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) Applied Cryptography and Network Security, pp. 164\u2013175. Springer, Berlin Heidelberg, Berlin, Heidelberg (2005)"},{"key":"5_CR15","unstructured":"Ducas, L., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., Stehle, D.: CRYSTALS \u2013 Dilithium: Digital Signatures from Module Lattices. Cryptology ePrint Archive, Paper 2017\/633 (2017), https:\/\/eprint.iacr.org\/2017\/633,"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science, vol. 10624, pp. 3\u201333. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1,","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"5_CR17","unstructured":"Gen\u00eat, A., Kannwischer, M.J., Pelletier, H., McLauchlan, A.: Practical Fault Injection Attacks on SPHINCS. IACR Cryptol. ePrint Arch. p.\u00a0674 (2018), https:\/\/eprint.iacr.org\/2018\/674"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-662-53140-2_16","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2016","author":"L Groot Bruinderink","year":"2016","unstructured":"Groot Bruinderink, L., H\u00fclsing, A., Lange, T., Yarom, Y.: Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. In: Gierlichs, B., Poschmann, A.Y. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2016, pp. 323\u2013345. Springer, Berlin Heidelberg, Berlin, Heidelberg (2016)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Jao, D., Feo, L.D.: Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies. In: PQCrypto. Lecture Notes in Computer Science, vol.\u00a07071, pp. 19\u201334. Springer (2011)","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"5_CR20","unstructured":"Kundu, S., Chowdhury, S., Saha, S., Karmakar, A., Mukhopadhyay, D., Verbauwhede, I.: Carry Your Fault: A Fault Propagation Attack on Side-Channel Protected LWE-based KEM. IACR Cryptol. ePrint Arch. p.\u00a01674 (2023), https:\/\/eprint.iacr.org\/2023\/1674"},{"key":"5_CR21","unstructured":"LESSProjectSite: LESS project (2023), https:\/\/www.less-project.com\/"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Meyer, C.: Matrix Analysis and Applied Linear Algebra. Other Titles in Applied Mathematics, Society for Industrial and Applied Mathematics (2000), https:\/\/books.google.co.in\/books?id=HoNgdpJWnWMC","DOI":"10.1137\/1.9780898719512"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2013 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) Advances in Cryptology \u2013 CRYPTO \u201985 Proceedings, pp. 417\u2013426. Springer, Berlin Heidelberg, Berlin, Heidelberg (1986)"},{"key":"5_CR24","doi-asserted-by":"publisher","unstructured":"Mondal, P., Kundu, S., Bhattacharya, S., Karmakar, A., Verbauwhede, I.: A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer. CoRR abs\/2311.08027 (2023). https:\/\/doi.org\/10.48550\/ARXIV.2311.08027,","DOI":"10.48550\/ARXIV.2311.08027"},{"key":"5_CR25","unstructured":"NIST: NIST Announces Additional Digital Signature Candidates for the PQC Standardization Process. Online. Accessed 26th January, 2024 (2023), https:\/\/csrc.nist.gov\/news\/2023\/additional-pqc-digital-signature-candidates"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Oder, T., Schneider, T., P\u00f6ppelmann, T., G\u00fcneysu, T.: Practical CCA2-Secure and Masked Ring-LWE Implementation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1), 142\u2013174 (2018). https:\/\/doi.org\/10.13154\/TCHES.V2018.I1.142-174,","DOI":"10.13154\/TCHES.V2018.I1.142-174"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"Persichetti, E., Santini, P.: A New Formulation of the Linear Equivalence Problem and Shorter LESS Signatures, pp. 351\u2013378 (12 2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_12","DOI":"10.1007\/978-981-99-8739-9_12"},{"key":"5_CR28","doi-asserted-by":"publisher","unstructured":"Pessl, P., Prokop, L.: Fault Attacks on CCA-secure Lattice KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(2), 37\u201360 (2021).https:\/\/doi.org\/10.46586\/TCHES.V2021.I2.37-60,","DOI":"10.46586\/TCHES.V2021.I2.37-60"},{"key":"5_CR29","unstructured":"Poddebniak, D., Somorovsky, J., Schinzel, S., Lochter, M., R\u00f6sler, P.: Attacking Deterministic Signature Schemes using Fault Attacks. Cryptology ePrint Archive, Paper 2017\/1014 (2017), https:\/\/eprint.iacr.org\/2017\/1014,"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"Proos, J., Zalka, C.: Shor\u2019s discrete logarithm quantum algorithm for elliptic curves. Quantum Inf. Comput. 3(4), 317\u2013344 (2003). https:\/\/doi.org\/10.26421\/QIC3.4-3,","DOI":"10.26421\/QIC3.4-3"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Qiao, R., Seaborn, M.: A new approach for rowhammer attacks. In: 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). pp. 161\u2013166 (2016). https:\/\/doi.org\/10.1109\/HST.2016.7495576","DOI":"10.1109\/HST.2016.7495576"},{"key":"5_CR32","doi-asserted-by":"publisher","unstructured":"Rennie, B., Dobson, A.: On stirling numbers of the second kind. Journal of Combinatorial Theory 7(2), 116\u2013121 (1969). https:\/\/doi.org\/10.1016\/S0021-9800(69)80045-1, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0021980069800451","DOI":"10.1016\/S0021-9800(69)80045-1"},{"issue":"2","key":"5_CR33","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). https:\/\/doi.org\/10.1145\/359340.359342","journal-title":"Commun. ACM"},{"key":"5_CR34","unstructured":"Schemes, N.P.Q.C.D.S.: CROSS: Codes and Restricted Objects Signature Scheme - Specification Document (Jan 2022), https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/CROSS-spec-web.pdf"},{"key":"5_CR35","unstructured":"Schemes, N.P.Q.C.D.S.: Less: Linear equivalence signature scheme - Specification Document (Jan 2022), https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/less-spec-web.pdf"},{"key":"5_CR36","unstructured":"Schemes, N.P.Q.C.D.S.: WAVE: Round 1 Submission - Specification Document (Jan 2022), https:\/\/csrc.nist.gov\/csrc\/media\/Projects\/pqc-dig-sig\/documents\/round-1\/spec-files\/wave-spec-web.pdf"},{"key":"5_CR37","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994. pp. 124\u2013134. IEEE Computer Society (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700,","DOI":"10.1109\/SFCS.1994.365700"},{"key":"5_CR38","unstructured":"Sullivan, G.A., Sippe, J., Heninger, N., Wustrow, E.: Open to a fault: On the passive compromise of TLS keys via transient errors. In: 31st USENIX Security Symposium (USENIX Security 22). pp. 233\u2013250. USENIX Association, Boston, MA (Aug 2022), https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/sullivan"},{"key":"5_CR39","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-030-92075-3_2","volume-title":"Advances in Cryptology - ASIACRYPT 2021","author":"K Xagawa","year":"2021","unstructured":"Xagawa, K., Ito, A., Ueno, R., Takahashi, J., Homma, N.: Fault-Injection Attacks Against NIST\u2019s Post-Quantum Cryptography Round 3 KEM Candidates. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology - ASIACRYPT 2021, pp. 33\u201361. Springer International Publishing, Cham (2021)"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0944-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T06:11:40Z","timestamp":1733897500000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0944-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819609437","9789819609444"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0944-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}